Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6IMo1kM9CC.exe

Overview

General Information

Sample name:6IMo1kM9CC.exe
renamed because original name is a hash value
Original sample name:811a28d373d02ae481e4858dfb8b1d15.exe
Analysis ID:1466591
MD5:811a28d373d02ae481e4858dfb8b1d15
SHA1:74ca1efcd4d1f41691f0cd005662cc56537b04a8
SHA256:7e92a078f6f875b189bc4b2bca87f4f737eb2048356a51a1962f359b645d1b0f
Tags:exe
Infos:

Detection

LummaC, Poverty Stealer, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected LummaC Stealer
Yara detected Poverty Stealer
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 6IMo1kM9CC.exe (PID: 6232 cmdline: "C:\Users\user\Desktop\6IMo1kM9CC.exe" MD5: 811A28D373D02AE481E4858DFB8B1D15)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • F817.exe (PID: 4168 cmdline: C:\Users\user\AppData\Local\Temp\F817.exe MD5: BD2EAC64CBDED877608468D86786594A)
      • 218A.exe (PID: 3060 cmdline: C:\Users\user\AppData\Local\Temp\218A.exe MD5: 60172CA946DE57C3529E9F05CC502870)
        • setup.exe (PID: 3352 cmdline: "C:\Users\user\AppData\Local\Temp\setup.exe" MD5: FF2293FBFF53F4BD2BFF91780FABFD60)
          • GamePall.exe (PID: 2132 cmdline: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6456 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6668 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6656 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6752 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 340 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 1472 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 2360 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 1308 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 3688 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 6524 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 1712 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6232 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6012 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 3208 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 1120 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5224 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 3596 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 1156 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 2212 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 4268 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5848 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 644 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6800 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6968 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6600 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 6052 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
      • 500D.exe (PID: 3684 cmdline: C:\Users\user\AppData\Local\Temp\500D.exe MD5: DA4B6F39FC024D2383D4BFE7F67F1EE1)
      • GamePall.exe (PID: 6096 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
  • feuiuvb (PID: 3452 cmdline: C:\Users\user\AppData\Roaming\feuiuvb MD5: 811A28D373D02AE481E4858DFB8B1D15)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "potterryisiw.shop"], "Build id": "bOKHNM--"}
{"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
{"C2 url": "146.70.169.164:2227"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
    00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
    • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
    00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
    • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
    00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
      00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        9.2.500D.exe.130dd40.1.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          9.2.500D.exe.3950000.3.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            9.2.500D.exe.12c72e0.2.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              9.2.500D.exe.3950000.3.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                9.2.500D.exe.130dd40.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  Click to see the 1 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\setup.exe, ProcessId: 3352, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePall
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\feuiuvb, CommandLine: C:\Users\user\AppData\Roaming\feuiuvb, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\feuiuvb, NewProcessName: C:\Users\user\AppData\Roaming\feuiuvb, OriginalFileName: C:\Users\user\AppData\Roaming\feuiuvb, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\feuiuvb, ProcessId: 3452, ProcessName: feuiuvb
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: https://foodypannyjsud.shop/api3Avira URL Cloud: Label: malware
                  Source: https://foodypannyjsud.shop/taAvira URL Cloud: Label: malware
                  Source: http://cx5519.com/tmp/index.phpAvira URL Cloud: Label: malware
                  Source: https://foodypannyjsud.shop/piL4Avira URL Cloud: Label: malware
                  Source: http://evilos.cc/tmp/index.phpAvira URL Cloud: Label: malware
                  Source: ellaboratepwsz.xyzAvira URL Cloud: Label: malware
                  Source: swellfrrgwwos.xyzAvira URL Cloud: Label: malware
                  Source: foodypannyjsud.shopAvira URL Cloud: Label: malware
                  Source: https://foodypannyjsud.shop/apiXAvira URL Cloud: Label: malware
                  Source: https://foodypannyjsud.shop/HHAvira URL Cloud: Label: malware
                  Source: https://foodypannyjsud.shop/api##Avira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAvira: detection malicious, Label: HEUR/AGEN.1313486
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeAvira: detection malicious, Label: HEUR/AGEN.1352426
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].datAvira: detection malicious, Label: HEUR/AGEN.1359405
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                  Source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
                  Source: 9.2.500D.exe.130dd40.1.raw.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "146.70.169.164:2227"}
                  Source: F817.exe.4168.6.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "potterryisiw.shop"], "Build id": "bOKHNM--"}
                  Source: http://cx5519.com/tmp/index.phpVirustotal: Detection: 11%Perma Link
                  Source: http://evilos.cc/tmp/index.phpVirustotal: Detection: 12%Perma Link
                  Source: ellaboratepwsz.xyzVirustotal: Detection: 13%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeReversingLabs: Detection: 20%
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeReversingLabs: Detection: 16%
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeReversingLabs: Detection: 50%
                  Source: C:\Users\user\AppData\Roaming\feuiuvbReversingLabs: Detection: 65%
                  Source: 6IMo1kM9CC.exeReversingLabs: Detection: 65%
                  Source: 6IMo1kM9CC.exeVirustotal: Detection: 38%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\GamePall\Del.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeJoe Sandbox ML: detected
                  Source: 6IMo1kM9CC.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03951C94 CryptUnprotectData,CryptProtectData,9_2_03951C94

                  Compliance

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeUnpacked PE file: 9.2.500D.exe.3950000.3.unpack
                  Source: 6IMo1kM9CC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: Binary string: ntkrnlmp.pdbx, source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256f source: Newtonsoft.Json.dll.11.dr
                  Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdb source: widevinecdmadapter.dll.11.dr
                  Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: Newtonsoft.Json.dll.11.dr
                  Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb6 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\* source: 500D.exe, 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000C.00000000.3356056040.0000000000102000.00000002.00000001.01000000.00000010.sdmp
                  Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000014.00000002.3467073879.0000000005E22000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb3 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000014.00000002.3467073879.0000000005E22000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdbGCTL source: widevinecdmadapter.dll.11.dr
                  Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exeewall.dllll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exemePalll source: setup.exe, 0000000B.00000002.3671509644.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                  Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: 500D.exe, 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 500D.exe, 00000009.00000000.2259206208.0000000000489000.00000002.00000001.01000000.0000000C.sdmp, 500D.exe, 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb5 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000B.00000002.3672231762.00000000006C9000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000B.00000002.3672231762.00000000006C9000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 500D.exe, 00000009.00000000.2259206208.0000000000489000.00000002.00000001.01000000.0000000C.sdmp, 500D.exe, 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmp
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1460
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,8_2_00405B4A
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004066FF FindFirstFileA,FindClose,8_2_004066FF
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004027AA FindFirstFileA,8_2_004027AA
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0048256E FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0048256E
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03951000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,9_2_03951000
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03954E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,9_2_03954E27
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03951D3C FindFirstFileW,FindNextFileW,9_2_03951D3C
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_039540BA FindFirstFileW,FindNextFileW,9_2_039540BA
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03953EFC FindFirstFileW,FindNextFileW,9_2_03953EFC
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00417563 GetLogicalDriveStringsW,lstrcatW,InterlockedExchangeAdd,WriteConsoleA,lstrcpynW,GetAtomNameA,AreFileApisANSI,ReadConsoleOutputA,SetVolumeMountPointW,GetModuleFileNameW,EnumCalendarInfoExW,GetBoundsRect,EnumDependentServicesA,GlobalAlloc,AddAtomA,GetCommProperties,GetTickCount,GetLastError,ZombifyActCtx,GetConsoleAliasesW,FoldStringA,LoadLibraryA,0_2_00417563
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior

                  Networking

                  barindex
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.98.23.157 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.126 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 185.68.16.7 443Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80Jump to behavior
                  Source: Malware configuration extractorURLs: pedestriankodwu.xyz
                  Source: Malware configuration extractorURLs: towerxxuytwi.xyz
                  Source: Malware configuration extractorURLs: ellaboratepwsz.xyz
                  Source: Malware configuration extractorURLs: penetratedpoopp.xyz
                  Source: Malware configuration extractorURLs: swellfrrgwwos.xyz
                  Source: Malware configuration extractorURLs: contintnetksows.shop
                  Source: Malware configuration extractorURLs: foodypannyjsud.shop
                  Source: Malware configuration extractorURLs: potterryisiw.shop
                  Source: Malware configuration extractorURLs: potterryisiw.shop
                  Source: Malware configuration extractorURLs: http://evilos.cc/tmp/index.php
                  Source: Malware configuration extractorURLs: http://gebeus.ru/tmp/index.php
                  Source: Malware configuration extractorURLs: http://office-techs.biz/tmp/index.php
                  Source: Malware configuration extractorURLs: http://cx5519.com/tmp/index.php
                  Source: Malware configuration extractorURLs: 146.70.169.164:2227
                  Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                  Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewASN Name: TelecommunicationcompanySuriname-TeleSurSR TelecommunicationcompanySuriname-TeleSurSR
                  Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00415B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,FreeLibrary,task,9_2_00415B80
                  Source: GamePall.exe, 00000014.00000002.3437085284.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activity
                  Source: GamePall.exe, 0000001A.00000002.3761658883.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activity.0
                  Source: GamePall.exe, 00000014.00000002.3437085284.0000000003261000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001A.00000002.3761658883.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/installs
                  Source: GamePall.exe, 00000014.00000002.3437085284.0000000003261000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001A.00000002.3761658883.00000000033D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bageyou.xyz
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/1352358
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/275944
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/378067
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/437891.
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/456214
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/497301
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/510270
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/514696
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/642141
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/672186).
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/717501
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/775961
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/819404
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/839189
                  Source: resources.pak.11.drString found in binary or memory: http://crbug.com/957772
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://james.newtonking.com/projects/json
                  Source: log4net.xml.11.drString found in binary or memory: http://logging.apache.org/log4j
                  Source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp, log4net.xml.11.drString found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
                  Source: log4net.xml.11.drString found in binary or memory: http://logging.apache.org/log4net/schemas/log4net-events-1.2&gt;
                  Source: 218A.exe, 218A.exe, 00000008.00000000.2187003469.000000000040A000.00000008.00000001.01000000.00000008.sdmp, 218A.exe, 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmp, setup.exe, 0000000B.00000003.3356152523.0000000000726000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000B.00000002.3671509644.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000B.00000000.3042548770.000000000040A000.00000008.00000001.01000000.0000000E.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
                  Source: 218A.exe, 00000008.00000000.2187003469.000000000040A000.00000008.00000001.01000000.00000008.sdmp, 218A.exe, 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmp, setup.exe, 0000000B.00000003.3356152523.0000000000726000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000B.00000002.3671509644.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000B.00000000.3042548770.000000000040A000.00000008.00000001.01000000.0000000E.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.000000000982D000.00000004.00000001.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://ocsp.digicert.com0C
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://ocsp.digicert.com0K
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://ocsp.digicert.com0N
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: http://ocsp.digicert.com0O
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                  Source: explorer.exe, 00000001.00000000.1763786428.000000000CA42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.mi
                  Source: explorer.exe, 00000001.00000000.1763786428.000000000CA42000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.micr
                  Source: explorer.exe, 00000001.00000000.1759504745.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1760851188.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1759863974.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                  Source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/).
                  Source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/
                  Source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C964000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
                  Source: log4net.xml.11.drString found in binary or memory: http://www.connectionstrings.com/
                  Source: log4net.xml.11.drString found in binary or memory: http://www.faqs.org/rfcs/rfc3164.html.
                  Source: log4net.xml.11.drString found in binary or memory: http://www.iana.org/assignments/multicast-addresses
                  Source: GamePall.exe, 00000010.00000002.3528948654.00000000062C0000.00000002.00000001.00040000.00000022.sdmp, GamePall.exe, 00000010.00000002.3528948654.0000000006763000.00000002.00000001.00040000.00000022.sdmp, GamePall.exe, 00000010.00000002.3528948654.0000000006585000.00000002.00000001.00040000.00000022.sdmpString found in binary or memory: http://www.unicode.org/copyright.html
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                  Source: F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                  Source: 218A.exe, 00000008.00000002.3692884368.000000000067C000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681961444.000000000067A000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000002.3692808692.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3682044502.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681754297.0000000000675000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/
                  Source: 218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat
                  Source: 218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.date
                  Source: 218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datl
                  Source: 218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datlEq
                  Source: 218A.exe, 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
                  Source: 218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datyq
                  Source: 218A.exe, 00000008.00000002.3692808692.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3682044502.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681754297.0000000000675000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/b6e4-4079-b30a-7368302a1ad4
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                  Source: explorer.exe, 00000001.00000000.1760250620.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                  Source: explorer.exe, 00000001.00000000.1760250620.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
                  Source: explorer.exe, 00000001.00000000.1757887093.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1757276311.0000000001248000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: explorer.exe, 00000001.00000000.1760250620.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
                  Source: explorer.exe, 00000001.00000000.1760250620.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                  Source: explorer.exe, 00000001.00000000.1760250620.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
                  Source: 500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
                  Source: 500D.exe, 00000009.00000002.3030907075.0000000001250000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
                  Source: 500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeetP
                  Source: 500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeewP
                  Source: F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: resources.pak.11.drString found in binary or memory: https://chrome.google.com/webstore
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chrome.google.com/webstore/category/extensions
                  Source: bg.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=bg&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: bg.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=bgCtrl$1
                  Source: GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enCtrl$1
                  Source: hi.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=hi&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: hi.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=hiCtrl$1
                  Source: it.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=it&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: it.pak.11.drString found in binary or memory: https://chrome.google.com/webstore?hl=itCtrl$1
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ukCtrl$1
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=urCtrl$2
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=viCtrl$1
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CNCtrl$1
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TWCtrl$1
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
                  Source: resources.pak.11.drString found in binary or memory: https://chromewebstore.google.com/
                  Source: resources.pak.11.drString found in binary or memory: https://codereview.chromium.org/25305002).
                  Source: F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                  Source: F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                  Source: resources.pak.11.drString found in binary or memory: https://crbug.com/1201800
                  Source: resources.pak.11.drString found in binary or memory: https://crbug.com/1245093):
                  Source: resources.pak.11.drString found in binary or memory: https://crbug.com/1446731
                  Source: 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
                  Source: 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                  Source: F817.exe, 00000006.00000002.2218701659.0000000001123000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2171241114.00000000011A1000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118943069.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2157103537.00000000011A3000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2215782574.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2170576082.0000000003547000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2153986587.00000000011A3000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2172078849.00000000011A2000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2215674715.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2153223179.00000000011A1000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173956861.0000000003548000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2159125091.00000000011A3000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174224504.00000000011A2000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2216285725.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2153364555.00000000011A2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/
                  Source: F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/2
                  Source: F817.exe, 00000006.00000003.2141086583.0000000003540000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2140276053.0000000003540000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/33
                  Source: F817.exe, 00000006.00000003.2215782574.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2216285725.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/F9W4
                  Source: F817.exe, 00000006.00000003.2130297912.000000000353E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/HH
                  Source: F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173126785.000000000118A000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2184556180.0000000001179000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.0000000001182000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173199372.0000000001180000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.0000000001182000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2215782574.0000000001182000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174040064.0000000001138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api
                  Source: F817.exe, 00000006.00000003.2173227406.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174163041.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174040064.0000000001138000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api##
                  Source: F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api3
                  Source: F817.exe, 00000006.00000003.2118943069.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173227406.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174106668.0000000001121000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apiX
                  Source: F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/c
                  Source: F817.exe, 00000006.00000003.2215782574.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2216285725.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/pi
                  Source: F817.exe, 00000006.00000003.2215782574.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2216285725.000000000118D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/piL4
                  Source: F817.exe, 00000006.00000003.2173705453.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173126785.000000000118A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/s75
                  Source: F817.exe, 00000006.00000003.2173705453.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173126785.000000000118A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/sv5
                  Source: F817.exe, 00000006.00000003.2173705453.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173126785.000000000118A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/ta
                  Source: F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/u
                  Source: F817.exe, 00000006.00000003.2173227406.0000000001102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop:443/api
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
                  Source: F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://myactivity.google.com/
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, bg.pak.11.drString found in binary or memory: https://passwords.google.com
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, it.pak.11.drString found in binary or memory: https://passwords.google.comGoogle
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.comT
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://photos.google.com/settings?referrer=CHROME_NTP
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://policies.google.com/
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://support.google.com/chrome/a/answer/9122284
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://support.google.com/chrome/answer/6098869
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drString found in binary or memory: https://support.google.com/chromebook?p=app_intent
                  Source: F817.exe, 00000006.00000003.2119337544.000000000358F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                  Source: F817.exe, 00000006.00000003.2119337544.000000000358D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                  Source: F817.exe, 00000006.00000003.2119337544.000000000358D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                  Source: GamePall.exe, 00000015.00000002.3460007644.0000000005206000.00000002.00000001.01000000.00000012.sdmp, GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
                  Source: 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
                  Source: explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: https://www.digicert.com/CPS0
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                  Source: resources.pak.11.drString found in binary or memory: https://www.google.com/
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, hi.pak.11.dr, bg.pak.11.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html&
                  Source: it.pak.11.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlG&uidaGestito
                  Source: GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlT&r
                  Source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlYar&d
                  Source: F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                  Source: F817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: https://www.newtonsoft.com/json
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: https://www.newtonsoft.com/jsonschema
                  Source: Newtonsoft.Json.dll.11.drString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004055E7 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_004055E7
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03954BA2 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,9_2_03954BA2
                  Source: GamePall.exeProcess created: 54

                  System Summary

                  barindex
                  Source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000005.00000002.2052896799.0000000002740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                  Source: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000005.00000002.2053174181.00000000028E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                  Source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                  Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401538
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,0_2_00402FE9
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014DE
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401496
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401543
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401565
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401579
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040157C
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401538
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,5_2_00402FE9
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014DE
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401496
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401543
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401565
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401579
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_0040157C
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,8_2_100010D0
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,8_2_004034CC
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_00406A888_2_00406A88
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_004714909_2_00471490
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0047D5159_2_0047D515
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0047BE099_2_0047BE09
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: String function: 00470310 appears 51 times
                  Source: 6IMo1kM9CC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000005.00000002.2052896799.0000000002740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                  Source: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000005.00000002.2053174181.00000000028E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                  Source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                  Source: 6IMo1kM9CC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: feuiuvb.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Ionic.Zip.dll.11.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformBlock'
                  Source: Ionic.Zip.dll.11.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock'
                  Source: Ionic.Zip.dll.11.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                  Source: GamePall.exe.11.dr, Program.csBase64 encoded string: 'pizR9uKkcZIkMW+F1cRjYV0LMt6eYXmLuiNCndESDPkTO3eY1Mjv7Hs2Qvo+t26G', 'ZTDMzZVpdA1FSa2RiY6ZCl2QGyLDtQ3OBRa/N40wO2xxcvcDsATtLRGwKtaEB36dqPJnDF8qXNs92JbMBlsOyg==', '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', 'T7BWwqrn4yISEECEAnARpwE8R+3lDHSc+RlcJT90an1SNsS27lGBQjOx4RmDHlrj7oJnnzx1IWXOkbTfLzBeCfU6UJhOIoQKhcWidAxAKIxvqZnoB6AujIU0F7dEj65vahyTdEvkIxzFaV2+akbl53KcDi5RPBOP16iXVi0WJdHV5AbSCI9WCEcSX/fUpmukBh4bjVF/T/P/B6TFVtNZintCOSO2Ha+2va2CJMOnJ020zYskwuvcH9d1rGD3Zf9RBC2obzrhRNK2LXTEIYnifs6L2UdqFhw5aANXILziQtzKvsTQKvc15hvHCCoeXJCyyK7/WgA/oRu7bdrTs2DwCQ==', 'ZY0WCEgzqiLEU8ZUVJwGTpbkuL9KoMwYVloBqJXjur8rfBZEXTysQNKRQ1H7/vn7o0wyHAux60SVy06r4v6So5WWxddei09LXvL6ZwK/tyY=', 's7iS2XfzyI+IBoARaZQlTINg1kEy7qT7EopaSHQzpqktZBtc7UiOYrPdv/6f4cNI', 'o2ZleBui4P9C2ZjnB98Vuesy1C+WucHiXjQJ8RANoX6TheGfnLYAWDsXRfSeNCDHWdkBP2RBrkWPBy/nuM2NFLMETMUsPFeG3JHWafvGKzaNEjYO3Up9m61SnaY5tINvLCYJ/TKITszJ9H1YSm2chnmQGLUzbz4pwvWvvKfH8m7z585W73/QZrtw3l/30vcZaVocgwemYusDJYsOTgeWc0okiDahD7qtJcBYZ0aOzxZZmHDMBYigkRVf8GTJ/xucA/i7EHBFpaWoLVZVcuGFMA==', 'T7BWwqrn4yISEECEAnARp+JyVgG3cZc2/9+3VbyOjc4PuRSCU7ZfXuXpIIH8uj2roUU+W7nSmXHqTuxLhe6DBfNVh8PFZrhNX/YhIexDxrk=', 'G4TxOgdwfNBdU+6bscw2hqt3kZYZMfoEuKZtmCxRLrF8xJCK1+L0ocd8eSQjty7d', 'PcG64iM3U1vDIVDm7HuwTSvKhuz45f/WPqYoWZvzLHcapbEfkynZkUjmDgg30eof', 'XGcq7Js3+2f2oGHGFzxJPiYsrodwK+bTw/0lKjiUd0tSWMHEjdVqzAclD1/nPksq3sGhVTN8oFeHMRE7wAt3mCLVCEXKF9JLnNeWw9vvCbs=', 'T7BWwqrn4yISEECEAnARp8UQ6kvfa8mDiwe39obQZ+Rxfj5bbo//kf+4mlTsZUEg0QM/4QBKb6sUDMsk9OTdYg==', 'T7BWwqrn4yISEECEAnARp/U1NCwfjpQ4K5UKuMbDqXSrjfU6Tf/pOCpHlHXtYnU5', 'Gg/rFkGmnFrfPAny9sQ3qerPGxlC7+cuu92x2tgXrCRkqABwTbbIR8+hJN0krbBD9OJX8s2JqeR+xICuD2u17N7KjlWCZwpg4+c7mG1xAahALfXXbu/EvJy+KsAzQlzR9bu8P4wbyuM6r6/7kdf+VQ==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLT3pudJg4gGhcEax3IHwBI0R5vZR7J9mjUQ8R9MdKz/Fw==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLTcCwJrbTmNGWmZutw1Di2FSZ+3JxFtC00BiemuQuq2+A=='
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@268/115@0/9
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,8_2_004034CC
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_00404897 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,8_2_00404897
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_029053F3 CreateToolhelp32Snapshot,Module32First,0_2_029053F3
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_00402173 CoCreateInstance,MultiByteToWideChar,8_2_00402173
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\feuiuvbJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_rendLog.txt
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeMutant created: \Sessions\1\BaseNamedObjects\1e7f31ac-1494-47cc-9633-054c20e7432e
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_mainLog.txt
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F817.tmpJump to behavior
                  Source: 6IMo1kM9CC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: F817.exe, 00000006.00000003.2119457470.0000000003565000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119597922.0000000003549000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 6IMo1kM9CC.exeReversingLabs: Detection: 65%
                  Source: 6IMo1kM9CC.exeVirustotal: Detection: 38%
                  Source: unknownProcess created: C:\Users\user\Desktop\6IMo1kM9CC.exe "C:\Users\user\Desktop\6IMo1kM9CC.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\feuiuvb C:\Users\user\AppData\Roaming\feuiuvb
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F817.exe C:\Users\user\AppData\Local\Temp\F817.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\218A.exe C:\Users\user\AppData\Local\Temp\218A.exe
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\500D.exe C:\Users\user\AppData\Local\Temp\500D.exe
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\F817.exe C:\Users\user\AppData\Local\Temp\F817.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\218A.exe C:\Users\user\AppData\Local\Temp\218A.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\500D.exe C:\Users\user\AppData\Local\Temp\500D.exeJump to behavior
                  Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" Jump to behavior
                  Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: windows.internal.shell.broker.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
                  Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: msimg32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: msvcr100.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: oleacc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: acgenral.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: samcli.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: msacm32.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: mpr.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: oleacc.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: shfolder.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: firewallapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwbase.dll
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwpolicyiomgr.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: apphelp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mmdevapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: devobj.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: audioses.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: powrprof.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: umpdc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.ui.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windowmanagementapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: textinputframework.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: inputhost.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coreuicomponents.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coreuicomponents.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasapi32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasman.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rtutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mswsock.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ondemandconnroutehelper.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc6.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dnsapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winnsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasadhlp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: fwpuclnt.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: nlaapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: gpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wkscli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wtsapi32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winsta.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: omadmapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dmcmnutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iri.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netapi32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dsreg.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscms.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coloradapterclient.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dxgi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: resourcepolicyclient.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mf.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mfplat.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rtworkq.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwmapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                  Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                  Source: Binary string: ntkrnlmp.pdbx, source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256f source: Newtonsoft.Json.dll.11.dr
                  Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdb source: widevinecdmadapter.dll.11.dr
                  Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: Newtonsoft.Json.dll.11.dr
                  Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ntkrnlmp.pdb6 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\* source: 500D.exe, 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000C.00000000.3356056040.0000000000102000.00000002.00000001.01000000.00000010.sdmp
                  Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000014.00000002.3467073879.0000000005E22000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb3 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000014.00000002.3467073879.0000000005E22000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdbGCTL source: widevinecdmadapter.dll.11.dr
                  Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exeewall.dllll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exemePalll source: setup.exe, 0000000B.00000002.3671509644.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                  Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\* source: 500D.exe, 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 500D.exe, 00000009.00000000.2259206208.0000000000489000.00000002.00000001.01000000.0000000C.sdmp, 500D.exe, 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb5 source: 500D.exe, 00000009.00000002.3201827147.000000000A96B000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000B.00000002.3672231762.00000000006C9000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000B.00000002.3672231762.00000000006C9000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 500D.exe, 00000009.00000000.2259206208.0000000000489000.00000002.00000001.01000000.0000000C.sdmp, 500D.exe, 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmp

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeUnpacked PE file: 0.2.6IMo1kM9CC.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Roaming\feuiuvbUnpacked PE file: 5.2.feuiuvb.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeUnpacked PE file: 9.2.500D.exe.3950000.3.unpack
                  Source: Newtonsoft.Json.dll.11.drStatic PE information: 0xF68F744F [Mon Jan 31 06:35:59 2101 UTC]
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,8_2_100010D0
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .vmpLp
                  Source: F817.exe.1.drStatic PE information: section name: .vmpLp
                  Source: F817.exe.1.drStatic PE information: section name: .vmpLp
                  Source: F817.exe.1.drStatic PE information: section name: .vmpLp
                  Source: libEGL.dll.11.drStatic PE information: section name: .00cfg
                  Source: libEGL.dll.11.drStatic PE information: section name: .voltbl
                  Source: libGLESv2.dll.11.drStatic PE information: section name: .00cfg
                  Source: libGLESv2.dll.11.drStatic PE information: section name: .voltbl
                  Source: chrome_elf.dll.11.drStatic PE information: section name: .00cfg
                  Source: chrome_elf.dll.11.drStatic PE information: section name: .crthunk
                  Source: chrome_elf.dll.11.drStatic PE information: section name: CPADinfo
                  Source: chrome_elf.dll.11.drStatic PE information: section name: malloc_h
                  Source: libEGL.dll0.11.drStatic PE information: section name: .00cfg
                  Source: libGLESv2.dll0.11.drStatic PE information: section name: .00cfg
                  Source: libcef.dll.11.drStatic PE information: section name: .00cfg
                  Source: libcef.dll.11.drStatic PE information: section name: .rodata
                  Source: libcef.dll.11.drStatic PE information: section name: CPADinfo
                  Source: libcef.dll.11.drStatic PE information: section name: malloc_h
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00408616 push eax; retf 0000h0_2_00408619
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401CD1 push ecx; ret 0_2_00401CD2
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_004084E6 push FFFFFFFBh; iretd 0_2_004084FC
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00401C91 push 00000076h; iretd 0_2_00401C93
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00402E96 push B92A2F4Ch; retf 0_2_00402E9B
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0278867D push eax; retf 0000h0_2_02788680
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_02781CF8 push 00000076h; iretd 0_2_02781CFA
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_02782EFD push B92A2F4Ch; retf 0_2_02782F02
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0278854D push FFFFFFFBh; iretd 0_2_02788563
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_02781D38 push ecx; ret 0_2_02781D39
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0290CEC3 push FFFFFFFBh; iretd 0_2_0290CED9
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0290AE45 push edx; ret 0_2_0290AE46
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00408616 push eax; retf 0000h5_2_00408619
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401CD1 push ecx; ret 5_2_00401CD2
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_004084E6 push FFFFFFFBh; iretd 5_2_004084FC
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00401C91 push 00000076h; iretd 5_2_00401C93
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_00402E96 push B92A2F4Ch; retf 5_2_00402E9B
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_0274867D push eax; retf 0000h5_2_02748680
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_02742EFD push B92A2F4Ch; retf 5_2_02742F02
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_02741CF8 push 00000076h; iretd 5_2_02741CFA
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_0274854D push FFFFFFFBh; iretd 5_2_02748563
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_02741D38 push ecx; ret 5_2_02741D39
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_028EDB88 push 2895EEC3h; ret 5_2_028EDB8F
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_028EB2D3 push FFFFFFFBh; iretd 5_2_028EB2E9
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_028E9255 push edx; ret 5_2_028E9256
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0047004B push ecx; ret 9_2_0047005E
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_004789AD push cs; ret 9_2_004789AE
                  Source: 6IMo1kM9CC.exeStatic PE information: section name: .text entropy: 7.491897638969264
                  Source: feuiuvb.1.drStatic PE information: section name: .text entropy: 7.491897638969264
                  Source: Ionic.Zip.dll.11.drStatic PE information: section name: .text entropy: 6.821349263259562
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\F817.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeFile created: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\nsProcess.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\feuiuvbJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\218A.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nshE60F.tmp\liteFirewall.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeFile created: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeFile created: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\blowfish.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\500D.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeFile created: C:\Users\user\AppData\Local\Temp\setup.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].datJump to dropped file
                  Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\feuiuvbJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\6imo1km9cc.exeJump to behavior
                  Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\feuiuvb:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_9-144959
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeSystem information queried: FirmwareTableInformationJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
                  Source: C:\Users\user\AppData\Roaming\feuiuvbAPI/Special instruction interceptor: Address: 7FFE2220E814
                  Source: C:\Users\user\AppData\Roaming\feuiuvbAPI/Special instruction interceptor: Address: 7FFE2220D584
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 56AA71
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 646310
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 69522F
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 5776F5
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: A57E15
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 694080
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: AD4DE8
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeAPI/Special instruction interceptor: Address: 654E89
                  Source: feuiuvb, 00000005.00000002.2053064169.00000000028CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                  Source: 6IMo1kM9CC.exe, 00000000.00000002.1769547128.00000000028EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK4
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 23B0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 25A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 45A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 13E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3000000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1340000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2E30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4E30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1490000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 30C0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3010000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2CC0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1450000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2FE0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D80000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F10000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2DA0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 16E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3260000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3010000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 10A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D90000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2AC0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: B60000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 27A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 24E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: B40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 26D0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: BB0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1210000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B60000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F70000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 30C0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 50C0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1880000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 33D0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3230000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1260000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C70000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4C70000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1110000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4C30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1210000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D70000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BB0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D00000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B30000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 880000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 21B0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 41B0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1070000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4A40000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: BD0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 27D0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2620000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1040000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BA0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 28A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 21B0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 23A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 43A0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 17E0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3300000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3160000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2800000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 28D0000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2800000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1270000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C20000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4C20000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: D20000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2800000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2600000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1650000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3170000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 5170000 memory reserve | memory write watch
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 433Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4712Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 965Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 878Jump to behavior
                  Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 871Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nshE60F.tmp\liteFirewall.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\nsProcess.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\blowfish.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                  Source: C:\Windows\explorer.exe TID: 6320Thread sleep time: -471200s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 6304Thread sleep time: -96500s >= -30000sJump to behavior
                  Source: C:\Windows\explorer.exe TID: 1028Thread sleep time: -31800s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exe TID: 4904Thread sleep time: -150000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exe TID: 4904Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe TID: 796Thread sleep time: -600000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe TID: 6764Thread sleep count: 34 > 30
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,8_2_00405B4A
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004066FF FindFirstFileA,FindClose,8_2_004066FF
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004027AA FindFirstFileA,8_2_004027AA
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0048256E FindFirstFileExW,FindNextFileW,FindClose,FindClose,9_2_0048256E
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03951000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,9_2_03951000
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03954E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,9_2_03954E27
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03951D3C FindFirstFileW,FindNextFileW,9_2_03951D3C
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_039540BA FindFirstFileW,FindNextFileW,9_2_039540BA
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03953EFC FindFirstFileW,FindNextFileW,9_2_03953EFC
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_00417563 GetLogicalDriveStringsW,lstrcatW,InterlockedExchangeAdd,WriteConsoleA,lstrcpynW,GetAtomNameA,AreFileApisANSI,ReadConsoleOutputA,SetVolumeMountPointW,GetModuleFileNameW,EnumCalendarInfoExW,GetBoundsRect,EnumDependentServicesA,GlobalAlloc,AddAtomA,GetCommProperties,GetTickCount,GetLastError,ZombifyActCtx,GetConsoleAliasesW,FoldStringA,LoadLibraryA,0_2_00417563
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_03952054 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,9_2_03952054
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                  Source: explorer.exe, 00000001.00000000.1760695301.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                  Source: F817.exe, 00000006.00000002.2218701659.0000000001123000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118943069.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2215674715.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173227406.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2184396052.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2184556180.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174106668.0000000001121000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW'f
                  Source: explorer.exe, 00000001.00000000.1760250620.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
                  Source: explorer.exe, 00000001.00000000.1760250620.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
                  Source: 500D.exe, 00000009.00000002.3030907075.000000000125E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(F+
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}'
                  Source: explorer.exe, 00000001.00000000.1760695301.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                  Source: explorer.exe, 00000001.00000000.1757276311.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: explorer.exe, 00000001.00000000.1760695301.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                  Source: explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
                  Source: explorer.exe, 00000001.00000000.1760250620.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
                  Source: explorer.exe, 00000001.00000000.1760250620.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173227406.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2215674715.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218495807.00000000010DE000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2184396052.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174106668.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000112B000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3682044502.0000000000662000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: explorer.exe, 00000001.00000000.1760695301.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                  Source: 500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
                  Source: 218A.exe, 00000008.00000002.3692884368.000000000067C000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681961444.000000000067A000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681754297.0000000000675000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW}
                  Source: explorer.exe, 00000001.00000000.1758639287.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
                  Source: explorer.exe, 00000001.00000000.1760250620.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
                  Source: explorer.exe, 00000001.00000000.1757276311.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                  Source: explorer.exe, 00000001.00000000.1757276311.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeAPI call chain: ExitProcess graph end nodegraph_8-3604
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSystem information queried: ModuleInformationJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSystem information queried: CodeIntegrityInformationJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00474383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00474383
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,8_2_100010D0
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_0278092B mov eax, dword ptr fs:[00000030h]0_2_0278092B
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_02780D90 mov eax, dword ptr fs:[00000030h]0_2_02780D90
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeCode function: 0_2_02904CD0 push dword ptr fs:[00000030h]0_2_02904CD0
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_0274092B mov eax, dword ptr fs:[00000030h]5_2_0274092B
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_02740D90 mov eax, dword ptr fs:[00000030h]5_2_02740D90
                  Source: C:\Users\user\AppData\Roaming\feuiuvbCode function: 5_2_028E30E0 push dword ptr fs:[00000030h]5_2_028E30E0
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00485891 GetProcessHeap,9_2_00485891
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00474383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00474383
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00470495 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00470495
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_00470622 SetUnhandledExceptionFilter,9_2_00470622
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_004706F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_004706F0
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\explorer.exeFile created: 500D.exe.1.drJump to dropped file
                  Source: C:\Windows\explorer.exeNetwork Connect: 190.98.23.157 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.126 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 185.68.16.7 443Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                  Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80Jump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeThread created: C:\Windows\explorer.exe EIP: 11F19D0Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbThread created: unknown EIP: 87E19D0Jump to behavior
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: pedestriankodwu.xyz
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: towerxxuytwi.xyz
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: ellaboratepwsz.xyz
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: penetratedpoopp.xyz
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: swellfrrgwwos.xyz
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: contintnetksows.shop
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: foodypannyjsud.shop
                  Source: F817.exe, 00000006.00000002.2216933024.000000000022D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: potterryisiw.shop
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\Desktop\6IMo1kM9CC.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\feuiuvbSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (iphone; cpu iphone os 16_4 like mac os x) applewebkit/605.1.15 (khtml, like gecko) version/17.0 mobile/15e148 safari/604.1" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                  Source: explorer.exe, 00000001.00000000.1757542799.00000000018A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1758487871.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1760250620.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                  Source: explorer.exe, 00000001.00000000.1757542799.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                  Source: explorer.exe, 00000001.00000000.1757276311.0000000001248000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
                  Source: explorer.exe, 00000001.00000000.1757542799.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                  Source: explorer.exe, 00000001.00000000.1757542799.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0047013C cpuid 9_2_0047013C
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: EnumSystemLocalesW,9_2_00485051
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_004850DC
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetLocaleInfoW,9_2_0047E096
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetLocaleInfoW,9_2_0048532F
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_00485458
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetLocaleInfoW,9_2_0048555E
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00485634
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: EnumSystemLocalesW,9_2_0047DBC7
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: EnumSystemLocalesW,9_2_00484F69
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: EnumSystemLocalesW,9_2_00484F6B
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: EnumSystemLocalesW,9_2_00484FB6
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\spool\drivers\color\sRGB Color Space Profile.icm VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeCode function: 9_2_0047038F GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_0047038F
                  Source: C:\Users\user\AppData\Local\Temp\218A.exeCode function: 8_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,8_2_004034CC
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: F817.exe, 00000006.00000003.2184396052.000000000112B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Process Memory Space: F817.exe PID: 4168, type: MEMORYSTR
                  Source: Yara matchFile source: 9.2.500D.exe.130dd40.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.3950000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.12c72e0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.3950000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.130dd40.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.12c72e0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 500D.exe PID: 3684, type: MEMORYSTR
                  Source: Yara matchFile source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                  Source: F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                  Source: F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                  Source: F817.exe, 00000006.00000003.2173227406.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                  Source: F817.exe, 00000006.00000003.2173227406.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                  Source: F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                  Source: F817.exe, 00000006.00000002.2218701659.000000000112B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                  Source: F817.exe, 00000006.00000003.2173227406.0000000001102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                  Source: F817.exe, 00000006.00000003.2118679811.0000000001180000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "m": ["keystore"],
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\500D.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla\Notes9.dbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\F817.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                  Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1460
                  Source: Yara matchFile source: Process Memory Space: F817.exe PID: 4168, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Process Memory Space: F817.exe PID: 4168, type: MEMORYSTR
                  Source: Yara matchFile source: 9.2.500D.exe.130dd40.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.3950000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.12c72e0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.3950000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.130dd40.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.500D.exe.12c72e0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 500D.exe PID: 3684, type: MEMORYSTR
                  Source: Yara matchFile source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts11
                  Native API
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  111
                  Deobfuscate/Decode Files or Information
                  LSASS Memory24
                  File and Directory Discovery
                  Remote Desktop Protocol41
                  Data from Local System
                  2
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts1
                  Exploitation for Client Execution
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  31
                  Obfuscated Files or Information
                  Security Account Manager137
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Screen Capture
                  1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts1
                  Command and Scripting Interpreter
                  Login Hook312
                  Process Injection
                  22
                  Software Packing
                  NTDS651
                  Security Software Discovery
                  Distributed Component Object Model1
                  Clipboard Data
                  Protocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud Accounts1
                  PowerShell
                  Network Logon Script1
                  Registry Run Keys / Startup Folder
                  1
                  Timestomp
                  LSA Secrets241
                  Virtualization/Sandbox Evasion
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials3
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  File Deletion
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                  Masquerading
                  Proc Filesystem1
                  Remote System Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt241
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                  Hidden Files and Directories
                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1466591 Sample: 6IMo1kM9CC.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 103 Multi AV Scanner detection for domain / URL 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 109 10 other signatures 2->109 12 6IMo1kM9CC.exe 2->12         started        15 feuiuvb 2->15         started        process3 signatures4 143 Detected unpacking (changes PE section rights) 12->143 145 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->145 147 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->147 155 2 other signatures 12->155 17 explorer.exe 59 10 12->17 injected 149 Multi AV Scanner detection for dropped file 15->149 151 Maps a DLL or memory area into another process 15->151 153 Checks if the current machine is a virtual machine (disk enumeration) 15->153 process5 dnsIp6 89 185.68.16.7 UKRAINE-ASUA Ukraine 17->89 91 190.98.23.157 TelecommunicationcompanySuriname-TeleSurSR Suriname 17->91 93 3 other IPs or domains 17->93 73 C:\Users\user\AppData\Roaming\feuiuvb, PE32 17->73 dropped 75 C:\Users\user\AppData\Local\Temp\F817.exe, PE32 17->75 dropped 77 C:\Users\user\AppData\Local\Temp\500D.exe, PE32 17->77 dropped 79 2 other malicious files 17->79 dropped 113 System process connects to network (likely due to code injection or exploit) 17->113 115 Benign windows process drops PE files 17->115 117 Deletes itself after installation 17->117 119 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->119 22 218A.exe 3 35 17->22         started        26 F817.exe 17->26         started        29 500D.exe 12 17->29         started        31 GamePall.exe 17->31         started        file7 signatures8 process9 dnsIp10 81 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 22->81 dropped 83 C:\Users\user\AppData\Local\...\blowfish.dll, PE32 22->83 dropped 85 C:\Users\user\AppData\Local\...\huge[1].dat, PE32 22->85 dropped 87 2 other files (none is malicious) 22->87 dropped 125 Antivirus detection for dropped file 22->125 127 Multi AV Scanner detection for dropped file 22->127 33 setup.exe 112 22->33         started        97 188.114.96.3 CLOUDFLARENETUS European Union 26->97 129 Query firmware table information (likely to detect VMs) 26->129 131 Machine Learning detection for dropped file 26->131 133 Found many strings related to Crypto-Wallets (likely being stolen) 26->133 141 4 other signatures 26->141 99 146.70.169.164 TENET-1ZA United Kingdom 29->99 101 104.192.141.1 AMAZON-02US United States 29->101 135 Detected unpacking (creates a PE file in dynamic memory) 29->135 137 Found evasive API chain (may stop execution after checking mutex) 29->137 139 Tries to harvest and steal browser information (history, passwords, etc) 29->139 file11 signatures12 process13 file14 65 C:\Users\user\AppData\...\vulkan-1.dll, PE32 33->65 dropped 67 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 33->67 dropped 69 C:\Users\user\AppData\...\libGLESv2.dll, PE32 33->69 dropped 71 16 other files (13 malicious) 33->71 dropped 111 Antivirus detection for dropped file 33->111 37 GamePall.exe 33->37         started        signatures15 process16 dnsIp17 95 172.67.221.174 CLOUDFLARENETUS United States 37->95 121 Antivirus detection for dropped file 37->121 123 Machine Learning detection for dropped file 37->123 41 GamePall.exe 37->41         started        43 GamePall.exe 37->43         started        45 GamePall.exe 37->45         started        47 5 other processes 37->47 signatures18 process19 process20 49 GamePall.exe 41->49         started        51 GamePall.exe 41->51         started        53 GamePall.exe 41->53         started        55 10 other processes 41->55 process21 57 GamePall.exe 49->57         started        59 GamePall.exe 49->59         started        61 GamePall.exe 49->61         started        63 2 other processes 49->63

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  6IMo1kM9CC.exe66%ReversingLabsWin32.Trojan.SmokeLoader
                  6IMo1kM9CC.exe38%VirustotalBrowse
                  6IMo1kM9CC.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\setup.exe100%AviraHEUR/AGEN.1359405
                  C:\Users\user\AppData\Local\Temp\F817.exe100%AviraHEUR/AGEN.1313486
                  C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%AviraHEUR/AGEN.1352426
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat100%AviraHEUR/AGEN.1359405
                  C:\Users\user\AppData\Local\Temp\218A.exe100%AviraHEUR/AGEN.1359405
                  C:\Users\user\AppData\Local\Temp\F817.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\GamePall\Del.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\500D.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat3%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Local\Temp\218A.exe21%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\500D.exe16%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\F817.exe50%ReversingLabsWin32.Trojan.Smokeloader
                  C:\Users\user\AppData\Local\Temp\nshE60F.tmp\liteFirewall.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\blowfish.dll5%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\nsProcess.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\setup.exe3%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Roaming\GamePall\Del.exe7%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\GamePall.exe3%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll3%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\libEGL.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\libcef.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\log4net.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll0%ReversingLabs
                  C:\Users\user\AppData\Roaming\feuiuvb66%ReversingLabsWin32.Trojan.SmokeLoader
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
                  http://schemas.micro0%URL Reputationsafe
                  http://x1.c.lencr.org/00%URL Reputationsafe
                  http://x1.i.lencr.org/00%URL Reputationsafe
                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
                  https://aka.ms/odirmr0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=hiCtrl$10%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%Avira URL Cloudsafe
                  http://api.install-stat.debug.world/clients/activity.00%Avira URL Cloudsafe
                  https://support.google.com/chrome/answer/60988690%Avira URL Cloudsafe
                  https://foodypannyjsud.shop/api3100%Avira URL Cloudmalware
                  https://aka.ms/odirmr0%VirustotalBrowse
                  https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u0%VirustotalBrowse
                  https://api.msn.com:443/v1/news/Feed/Windows?0%VirustotalBrowse
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%VirustotalBrowse
                  https://support.google.com/chrome/answer/60988690%VirustotalBrowse
                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                  https://api.msn.com:443/v1/news/Feed/Windows?0%Avira URL Cloudsafe
                  http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=urCtrl$20%Avira URL Cloudsafe
                  http://crbug.com/5102700%Avira URL Cloudsafe
                  https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%Avira URL Cloudsafe
                  https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%Avira URL Cloudsafe
                  https://photos.google.com/settings?referrer=CHROME_NTP0%Avira URL Cloudsafe
                  http://crbug.com/3780670%Avira URL Cloudsafe
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%Avira URL Cloudsafe
                  http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%VirustotalBrowse
                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl0%Avira URL Cloudsafe
                  http://crbug.com/3780670%VirustotalBrowse
                  https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
                  https://foodypannyjsud.shop/ta100%Avira URL Cloudmalware
                  http://cx5519.com/tmp/index.php100%Avira URL Cloudmalware
                  http://crbug.com/5102700%VirustotalBrowse
                  https://photos.google.com/settings?referrer=CHROME_NTP0%VirustotalBrowse
                  http://www.iana.org/assignments/multicast-addresses0%Avira URL Cloudsafe
                  http://cx5519.com/tmp/index.php12%VirustotalBrowse
                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl0%VirustotalBrowse
                  http://crbug.com/4973010%Avira URL Cloudsafe
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
                  http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd0%Avira URL Cloudsafe
                  http://bageyou.xyz0%Avira URL Cloudsafe
                  http://www.iana.org/assignments/multicast-addresses0%VirustotalBrowse
                  http://crbug.com/6421410%Avira URL Cloudsafe
                  https://foodypannyjsud.shop/piL4100%Avira URL Cloudmalware
                  http://evilos.cc/tmp/index.php100%Avira URL Cloudmalware
                  http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
                  http://crbug.com/4973010%VirustotalBrowse
                  https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%Avira URL Cloudsafe
                  http://bageyou.xyz0%VirustotalBrowse
                  https://wns.windows.com/L0%Avira URL Cloudsafe
                  http://crbug.com/6421410%VirustotalBrowse
                  https://chrome.google.com/webstore0%Avira URL Cloudsafe
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%Avira URL Cloudsafe
                  https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win0%Avira URL Cloudsafe
                  http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%VirustotalBrowse
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                  http://evilos.cc/tmp/index.php13%VirustotalBrowse
                  https://chrome.google.com/webstore0%VirustotalBrowse
                  https://www.google.com/chrome/privacy/eula_text.html&0%Avira URL Cloudsafe
                  https://www.google.com/chrome/privacy/eula_text.htmlT&r0%Avira URL Cloudsafe
                  http://logging.apache.org/log4j0%Avira URL Cloudsafe
                  ellaboratepwsz.xyz100%Avira URL Cloudmalware
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                  https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-0%Avira URL Cloudsafe
                  https://www.google.com/chrome/privacy/eula_text.html&1%VirustotalBrowse
                  http://logging.apache.org/log4j0%VirustotalBrowse
                  swellfrrgwwos.xyz100%Avira URL Cloudmalware
                  https://www.google.com/chrome/privacy/eula_text.htmlT&r1%VirustotalBrowse
                  http://xiexie.wf/22_551/huge.dat0%Avira URL Cloudsafe
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee0%Avira URL Cloudsafe
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu0%Avira URL Cloudsafe
                  ellaboratepwsz.xyz14%VirustotalBrowse
                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                  https://crbug.com/14467310%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=ukCtrl$10%Avira URL Cloudsafe
                  foodypannyjsud.shop100%Avira URL Cloudmalware
                  https://www.rd.com/list/polite-habits-campers-dislike/0%Avira URL Cloudsafe
                  https://foodypannyjsud.shop/apiX100%Avira URL Cloudmalware
                  https://chromewebstore.google.com/0%Avira URL Cloudsafe
                  https://support.google.com/chrome/a/answer/91222840%Avira URL Cloudsafe
                  https://outlook.com_0%Avira URL Cloudsafe
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeewP0%Avira URL Cloudsafe
                  https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at0%Avira URL Cloudsafe
                  https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC10%Avira URL Cloudsafe
                  https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl0%Avira URL Cloudsafe
                  http://xiexie.wf/0%Avira URL Cloudsafe
                  http://www.unicode.org/copyright.html0%Avira URL Cloudsafe
                  http://crbug.com/7759610%Avira URL Cloudsafe
                  https://codereview.chromium.org/25305002).0%Avira URL Cloudsafe
                  http://api.install-stat.debug.world/clients/activity0%Avira URL Cloudsafe
                  https://chrome.google.com/webstore?hl=zh-TWCtrl$10%Avira URL Cloudsafe
                  http://www.apache.org/).0%Avira URL Cloudsafe
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://cx5519.com/tmp/index.phptrue
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://evilos.cc/tmp/index.phptrue
                  • 13%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  ellaboratepwsz.xyztrue
                  • 14%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  swellfrrgwwos.xyztrue
                  • Avira URL Cloud: malware
                  unknown
                  foodypannyjsud.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  146.70.169.164:2227true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1758639287.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabF817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore?hl=hiCtrl$1hi.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://api.install-stat.debug.world/clients/activity.0GamePall.exe, 0000001A.00000002.3761658883.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.google.com/chrome/answer/6098869setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://foodypannyjsud.shop/api3F817.exe, 00000006.00000003.2119084013.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000112B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1760250620.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.F817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://logging.apache.org/log4net/release/faq.html#trouble-EventLogGamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmp, log4net.xml.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/510270resources.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore?hl=urCtrl$2setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/378067resources.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://photos.google.com/settings?referrer=CHROME_NTPsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrlsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://foodypannyjsud.shop/taF817.exe, 00000006.00000003.2173705453.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173126785.000000000118A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.iana.org/assignments/multicast-addresseslog4net.xml.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/497301resources.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd218A.exe, 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://bageyou.xyzGamePall.exe, 00000014.00000002.3437085284.0000000003261000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001A.00000002.3761658883.00000000033D1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/642141resources.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://foodypannyjsud.shop/piL4F817.exe, 00000006.00000003.2215782574.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000002.2218781942.000000000118D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2216285725.000000000118D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000001.00000000.1762348499.000000000C964000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1762348499.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstoreresources.pak.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.rootca1.amazontrust.com0:F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/chrome/privacy/eula_text.html&setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://logging.apache.org/log4jlog4net.xml.11.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/chrome/privacy/eula_text.htmlT&rsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.ecosia.org/newtab/F817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000002.3050703788.000000000A169000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xiexie.wf/22_551/huge.dat218A.exe, 00000008.00000002.3692458413.00000000005F8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee500D.exe, 00000009.00000002.3030907075.0000000001250000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrlsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nsis.sf.net/NSIS_Error218A.exe, 218A.exe, 00000008.00000000.2187003469.000000000040A000.00000008.00000001.01000000.00000008.sdmp, 218A.exe, 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmp, setup.exe, 0000000B.00000003.3356152523.0000000000726000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000B.00000002.3671509644.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000B.00000000.3042548770.000000000040A000.00000008.00000001.01000000.0000000E.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://crbug.com/1446731resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore?hl=ukCtrl$1setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://foodypannyjsud.shop/apiXF817.exe, 00000006.00000003.2118943069.0000000001121000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173227406.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2118709626.000000000111F000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174106668.0000000001121000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://chromewebstore.google.com/resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.google.com/chrome/a/answer/9122284setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://outlook.com_explorer.exe, 00000001.00000000.1762348499.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeewP500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-atexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1GamePall.exe, 00000015.00000002.3460007644.0000000005206000.00000002.00000001.01000000.00000012.sdmp, GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xiexie.wf/218A.exe, 00000008.00000002.3692884368.000000000067C000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681961444.000000000067A000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000002.3692808692.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3682044502.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681754297.0000000000675000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-clexplorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.unicode.org/copyright.htmlGamePall.exe, 00000010.00000002.3528948654.00000000062C0000.00000002.00000001.00040000.00000022.sdmp, GamePall.exe, 00000010.00000002.3528948654.0000000006763000.00000002.00000001.00040000.00000022.sdmp, GamePall.exe, 00000010.00000002.3528948654.0000000006585000.00000002.00000001.00040000.00000022.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/775961resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://codereview.chromium.org/25305002).resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.microexplorer.exe, 00000001.00000000.1759504745.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1760851188.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1759863974.0000000008720000.00000002.00000001.00040000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://api.install-stat.debug.world/clients/activityGamePall.exe, 00000014.00000002.3437085284.0000000003261000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore?hl=zh-TWCtrl$1setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.apache.org/).GamePall.exe, 00000015.00000002.3458150672.00000000051C2000.00000002.00000001.01000000.00000012.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/275944resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://x1.c.lencr.org/0F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://x1.i.lencr.org/0F817.exe, 00000006.00000003.2140881074.000000000355F000.00000004.00000800.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.3017498794.000000000AA1F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.google.com/chrome/privacy/eula_text.htmlH&elpManagedGamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://xiexie.wf/b6e4-4079-b30a-7368302a1ad4218A.exe, 00000008.00000002.3692808692.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3682044502.0000000000675000.00000004.00000020.00020000.00000000.sdmp, 218A.exe, 00000008.00000003.3681754297.0000000000675000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-miexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chromeenterprise.google/policies/#BrowserSwitcherUrlListsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://policies.google.com/setup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.mozilla.org/products/firefoxgro.allF817.exe, 00000006.00000003.2142108209.0000000003652000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svgexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-darkexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-Aexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1758639287.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://logging.apache.org/log4net/schemas/log4net-events-1.2&gt;log4net.xml.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://foodypannyjsud.shop/api##F817.exe, 00000006.00000003.2173227406.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174163041.000000000113D000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2173732761.000000000112B000.00000004.00000020.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2174040064.0000000001138000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://foodypannyjsud.shop/HHF817.exe, 00000006.00000003.2130297912.000000000353E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://chrome.google.com/webstore/category/extensionssetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgF817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoF817.exe, 00000006.00000003.2119970825.0000000003578000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119728485.000000000357A000.00000004.00000800.00020000.00000000.sdmp, F817.exe, 00000006.00000003.2119805294.0000000003578000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://passwords.google.comTsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://web-security-reports.services.atlassian.com/csp-report/bb-website500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headereventexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://d136azpfpnge1l.cloudfront.net/;500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crbug.com/672186).resources.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupeetP500D.exe, 00000009.00000002.3030907075.000000000129D000.00000004.00000020.00020000.00000000.sdmp, 500D.exe, 00000009.00000003.2803440508.00000000012B1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svgexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgF817.exe, 00000006.00000003.2142413842.00000000011A5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelistsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmp, hi.pak.11.dr, bg.pak.11.dr, it.pak.11.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://chrome.google.com/webstore?hl=enCtrl$1GamePall.exe, 0000000F.00000002.3582265044.00000000059D0000.00000002.00000001.00040000.00000023.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-dexplorer.exe, 00000001.00000000.1758639287.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/chrome/privacy/eula_text.htmlYar&dsetup.exe, 0000000B.00000002.3672736118.000000000282F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.192.141.1
                  unknownUnited States
                  16509AMAZON-02USfalse
                  188.114.97.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUStrue
                  190.98.23.157
                  unknownSuriname
                  27775TelecommunicationcompanySuriname-TeleSurSRtrue
                  141.8.192.126
                  unknownRussian Federation
                  35278SPRINTHOSTRUtrue
                  188.114.96.3
                  unknownEuropean Union
                  13335CLOUDFLARENETUSfalse
                  172.67.221.174
                  unknownUnited States
                  13335CLOUDFLARENETUSfalse
                  185.68.16.7
                  unknownUkraine
                  200000UKRAINE-ASUAtrue
                  146.70.169.164
                  unknownUnited Kingdom
                  2018TENET-1ZAtrue
                  IP
                  127.0.0.127
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1466591
                  Start date and time:2024-07-03 07:44:03 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 17m 36s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:40
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:1
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Sample name:6IMo1kM9CC.exe
                  renamed because original name is a hash value
                  Original Sample Name:811a28d373d02ae481e4858dfb8b1d15.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@268/115@0/9
                  EGA Information:
                  • Successful, ratio: 80%
                  HCA Information:
                  • Successful, ratio: 56%
                  • Number of executed functions: 120
                  • Number of non-executed functions: 83
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Connection to analysis system has been lost, crash info: Unknown
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Execution Graph export aborted for target F817.exe, PID 4168 because there are no executed function
                  • Not all processes where analyzed, report is missing behavior information
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Report size getting too big, too many NtOpenKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Skipping network analysis since amount of network traffic is too extensive
                  TimeTypeDescription
                  01:45:10API Interceptor122776x Sleep call for process: explorer.exe modified
                  01:45:37API Interceptor9x Sleep call for process: F817.exe modified
                  01:47:46API Interceptor1x Sleep call for process: GamePall.exe modified
                  06:45:20Task SchedulerRun new task: Firefox Default Browser Agent EA402C2D8014DFC8 path: C:\Users\user\AppData\Roaming\feuiuvb
                  06:47:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  06:47:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.192.141.1A662vmc5co.exeGet hashmaliciousUnknownBrowse
                  • bitbucket.org/kennethoswald1/aoz918/downloads/LEraggt.exe
                  lahPWgosNP.exeGet hashmaliciousAmadeyBrowse
                  • bitbucket.org/alex222111/testproj/downloads/s7.exe
                  SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                  SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                  SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets
                  SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets
                  Paid invoice.ppaGet hashmaliciousAgentTeslaBrowse
                  • bitbucket.org/!api/2.0/snippets/warzonepro/Egjbp5/1b96dd9b300f88e62e18db3170d33bf037793d72/files/euromanmain
                  PO#1487958_10.ppaGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets/warzonepro/KME7g4/7678df565d5a8824274645a03590fc72588243f0/files/orignalfinal
                  Purchase Inquiry_pdf.ppaGet hashmaliciousAgentTeslaBrowse
                  • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                  Purchase Inquiry_pdf.ppaGet hashmaliciousUnknownBrowse
                  • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                  188.114.97.3http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12Get hashmaliciousUnknownBrowse
                  • sp.26skins.com/favicon.ico
                  Inquiry No PJO-4010574.exeGet hashmaliciousFormBookBrowse
                  • www.oc7o0.top/2zff/?iHmHOtK=4L8xoD0W4Zo4sy88OPxzXkM4Et1OXrliZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk7znic/DfJyEGJbg1Pv28u2ofuxZkWteJjYs=&L480=nFsp
                  30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                  • filetransfer.io/data-package/TbaYPT0S/download
                  nJ8mJTmMf0.exeGet hashmaliciousFormBookBrowse
                  • www.coinwab.com/efdt/
                  hkLFB22XxS.exeGet hashmaliciousFormBookBrowse
                  • www.cavetta.org.mt/yhnb/
                  QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  • filetransfer.io/data-package/mJcm5Gfa/download
                  http://url.usb.m.mimecastprotect.com/s/SPnzCDwVznT7kyA0HkOsZj?domain=linkscan.ioGet hashmaliciousHTMLPhisherBrowse
                  • emmalee.sa.com/favicon.ico
                  file.exeGet hashmaliciousFormBookBrowse
                  • www.cavetta.org.mt/yhnb/
                  6Z4Q4bREii.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                  • 000366cm.nyashka.top/phpflowergenerator.php
                  DHL Arrival Notice.exeGet hashmaliciousFormBookBrowse
                  • www.coinwab.com/efdt/
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 172.67.221.174
                  http://differentia.ruGet hashmaliciousUnknownBrowse
                  • 1.1.1.1
                  Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  Safeguard and Grow Your Assets.htmlGet hashmaliciousUnknownBrowse
                  • 172.64.152.241
                  roger.exeGet hashmaliciousAgentTeslaBrowse
                  • 172.67.74.152
                  https://townsvilleucc.com.auGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  https://emea.dcv.ms/xAUEwUn0yq&c=E,1,toHboUmwDMlhwr-wc7dBvpYkcIiHsLy6ICiYedy6zqFMHJPZP4VPyK8zV2e78vqw1ZiSYyf8djJ0Qg64xCBVUCvFvYwJhqpWb_urHJ65A88aoiyybtSIFaPo&typo=1Get hashmaliciousUnknownBrowse
                  • 104.21.55.70
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.21.45.251
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 172.67.221.174
                  https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
                  • 104.17.25.14
                  TelecommunicationcompanySuriname-TeleSurSRx86.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.66
                  nxz1JLFrc3.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.51
                  8DR4MV2b0i.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.16
                  rhdbGGdfoq.elfGet hashmaliciousMiraiBrowse
                  • 200.2.160.107
                  x8bQ5T4284.elfGet hashmaliciousUnknownBrowse
                  • 186.179.177.13
                  wsr3iUW0I0.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, Mars Stealer, PureLog StealerBrowse
                  • 190.98.23.157
                  zEtEDBaBLY.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.26
                  Ce52ywXgr8.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.74
                  dalkWORHPI.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.13
                  mlwGURqvam.elfGet hashmaliciousMiraiBrowse
                  • 186.179.177.44
                  SPRINTHOSTRUfile.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  https://kawak.com.coGet hashmaliciousUnknownBrowse
                  • 185.251.91.91
                  S#U0435tup.exeGet hashmaliciousCopperShrimpBrowse
                  • 185.185.70.98
                  S#U0435tup.exeGet hashmaliciousCopperShrimpBrowse
                  • 185.185.70.98
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                  • 141.8.192.6
                  https://www.asarco.com/Get hashmaliciousUnknownBrowse
                  • 185.251.91.91
                  AMAZON-02USwatchdog.elfGet hashmaliciousMiraiBrowse
                  • 54.97.145.12
                  spc.elfGet hashmaliciousMiraiBrowse
                  • 54.103.155.145
                  watchdog.elfGet hashmaliciousMiraiBrowse
                  • 52.89.222.207
                  file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.192.141.1
                  https://emea.dcv.ms/xAUEwUn0yq&c=E,1,toHboUmwDMlhwr-wc7dBvpYkcIiHsLy6ICiYedy6zqFMHJPZP4VPyK8zV2e78vqw1ZiSYyf8djJ0Qg64xCBVUCvFvYwJhqpWb_urHJ65A88aoiyybtSIFaPo&typo=1Get hashmaliciousUnknownBrowse
                  • 52.222.236.94
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.192.141.1
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 185.166.143.48
                  https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
                  • 13.224.189.122
                  https://metamesklogni.webflow.io/Get hashmaliciousUnknownBrowse
                  • 108.156.2.28
                  http://pub-2e7429ed1f544f43a4684eeceb978dbb.r2.dev/home.htmlGet hashmaliciousUnknownBrowse
                  • 18.239.94.85
                  No context
                  No context
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):107232830
                  Entropy (8bit):7.999946456161068
                  Encrypted:true
                  SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                  MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                  SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                  SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                  SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):293869
                  Entropy (8bit):5.61569579822855
                  Encrypted:false
                  SSDEEP:3072:lFi6z/VXzAf3ocMNqB3r1Josf+OMhERMlm+twHBumSYyDgIoIPM7l0UGHM7:lxFSIjs+OM2eLFmSFgIZk7+HM7
                  MD5:60172CA946DE57C3529E9F05CC502870
                  SHA1:DE8F59D6973A5811BB10A9A4410801FA63BC8B56
                  SHA-256:42CEB2252FEC41FD0ACC6874B41C91E0BA07C367045D6A9A7850D59781C2584C
                  SHA-512:15D37AF3CAB96FC9026A1898E09C775FE0D277098A3FE20C2E591272DE996A243850D43F3B48B4C037C5FED359E57795A7CF1652547D7AD8B16B186AB9508792
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 21%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........`..X............................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...X....`......................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:modified
                  Size (bytes):578048
                  Entropy (8bit):6.297510031778876
                  Encrypted:false
                  SSDEEP:12288:No4ykJuqlLJop9G3/AmAGWn7sfPJYQIMt8KHsTH:NoBsLaDKAmAbUJ+M2K2
                  MD5:DA4B6F39FC024D2383D4BFE7F67F1EE1
                  SHA1:7CC975D9FF785E269163897907D0B9B3CEE29956
                  SHA-256:544697A024ABAEA1B24EAA3D89869B2C8A4C1ACF96D4E152F5632D338D054C9E
                  SHA-512:D73CC4D911D9E61711B97CB9212D5BC93CB1B1314A39945934EB92239A31728FCCA7FEFBEC0143BAD915B0A7A6B93DF11D0AB7F559737AA7EC920BD24243FFFE
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 16%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I..I..I...1..I...1...I...1..I..l...I..l...I..l....I...1..I..I...I..]...I..]...I..Rich.I..................PE..L...w;.f...............'.....\....................@.......................................@.....................................(................................2..Xh..p....................i.......g..@...............@............................text....~.......................... ..`.rdata..4...........................@..@.data...............................@....reloc...2.......4..................@..B........................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):6642176
                  Entropy (8bit):7.866419732571782
                  Encrypted:false
                  SSDEEP:98304:LqhZ67opwYckx35SF2XKgxVvHuCPU8GSbO3JAXV1LrA+ZlL9CxpzTp2:LgErupSgKORuCT43JeV1LE+/s3p
                  MD5:BD2EAC64CBDED877608468D86786594A
                  SHA1:778AD44AFD5629F0A5B3B7DF9D6F02522AE94D91
                  SHA-256:CAE992788853230AF91501546F6EAD07CFD767CB8429C98A273093A90BBCB5AD
                  SHA-512:3C8F43045F27ADDCB5FB23807C2CE1D3F247CC30DD1596134A141B0BBC7FA4D30D138791214D939DC4F34FD925B9EC450EA340E5871E2F4F64844226ED394312
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 50%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....U~f..............................M...........@...................................e...@..................................O......P......................@.......................................................@3..............................text...+........................... ..`.rdata...*..........................@..@.data.... ..........................@....vmpL.p.....0...................... ..`.vmpL.p@....@3.....................@....vmpL.p..]..P3...]................. ..`.reloc.......@........].............@..@.rsrc.......P...f....].............@..@........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):82944
                  Entropy (8bit):6.389604568119155
                  Encrypted:false
                  SSDEEP:1536:Dli3i1jKfTV0LzYpAzMk2nACScLw5jPAT:j9KLQ+ScLw5jPAT
                  MD5:165E1EF5C79475E8C33D19A870E672D4
                  SHA1:965F02BFD103F094AC6B3EEF3ABE7FDCB8D9E2A5
                  SHA-256:9DB9C58E44DFF2D985DC078FDBB7498DCC66C4CC4EB12F68DE6A98A5D665ABBD
                  SHA-512:CD10EAF0928E5DF048BF0488D9DBFE9442E2E106396A0967462BEF440BF0B528CDF3AB06024FB6FDAF9F247E2B7F3CA0CEA78AFC0CE6943650EF9D6C91FEE52A
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W=.e9n.e9n.e9n...n.e9n...n.e9n..Bn.e9n.e8n.e9n.7.n.e9n...n.e9n...n.e9n...n.e9nRich.e9n........PE..L...,.N...........!.........^.......%...............................................3..................................`...$'..d....`.......................p...................................... ...@...............h............................text...1........................... ..`.rdata..P/.......0..................@..@.data........0......................@....rsrc........`.......*..............@..@.reloc.......p.......,..............@..B........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):22016
                  Entropy (8bit):5.668346578219837
                  Encrypted:false
                  SSDEEP:384:VpOSdCjDyyvBwRlX+ODbswYM2s74NS0v0Ac9khYLMkIX0+Gzyekx:rdCjW/lX1PfYM2X1
                  MD5:92EC4DD8C0DDD8C4305AE1684AB65FB0
                  SHA1:D850013D582A62E502942F0DD282CC0C29C4310E
                  SHA-256:5520208A33E6409C129B4EA1270771F741D95AFE5B048C2A1E6A2CC2AD829934
                  SHA-512:581351AEF694F2489E1A0977EBCA55C4D7268CA167127CEFB217ED0D2098136C7EB433058469449F75BE82B8E5D484C9E7B6CF0B32535063709272D7810EC651
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9<.EXR.EXR.EXR.b.).LXR.EXS..XR.b. .FXR.b.(.DXR.b...DXR.b.*.DXR.RichEXR.................PE..L....I6V...........!.....8...P......Q?.......P...................................................................... G..l....?..d.......(...............................................................................P............................text....7.......8.................. ..`.data...<<...P.......<..............@....rsrc...(............D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):22528
                  Entropy (8bit):6.674611218414922
                  Encrypted:false
                  SSDEEP:384:yTxz0Cv0hqd+1TjQmd9YWrSUEc//////OD5hF92IJpJgLa0MpoYfAz6S:jCvsqdS3QGBREc//////Q53NgLa1ub
                  MD5:5AFD4A9B7E69E7C6E312B2CE4040394A
                  SHA1:FBD07ADB3F02F866DC3A327A86B0F319D4A94502
                  SHA-256:053B4487D22AACF8274BAB448AE1D665FE7926102197B47BFBA6C7ED5493B3AE
                  SHA-512:F78EFE9D1FA7D2FFC731D5F878F81E4DCBFAF0C561FDFBF4C133BA2CE1366C95C4672D67CAE6A8BD8FCC7D04861A9DA389D98361055AC46FC9793828D9776511
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 5%
                  Reputation:unknown
                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................6..........dD.......P....@.....................................................................Y.......................................p...................................................................................CODE....|4.......6.................. ..`DATA....8....P.......:..............@...BSS..........p.......L...................idata...............L..............@....edata..Y............P..............@..P.reloc..p............R..............@..P.rsrc................V..............@..P.....................X..............@..P................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4608
                  Entropy (8bit):4.666004851298707
                  Encrypted:false
                  SSDEEP:48:iYXzAm8HGJLvwM8GJFd6I7W4JtT2bxNNAa4GsNf+CJ8aYqmtlKdgAtgma1QvtCSJ:lz2mJkpGR6GY74GQ1YqmstgGCtR
                  MD5:FAA7F034B38E729A983965C04CC70FC1
                  SHA1:DF8BDA55B498976EA47D25D8A77539B049DAB55E
                  SHA-256:579A034FF5AB9B732A318B1636C2902840F604E8E664F5B93C07A99253B3C9CF
                  SHA-512:7868F9B437FCF829AD993FF57995F58836AD578458994361C72AE1BF1DFB74022F9F9E948B48AFD3361ED3426C4F85B4BB0D595E38EE278FEE5C4425C4491DBF
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........s.I...I...I...n|f.L...I...Q...@..K...@..H...@..H...RichI...........PE..L...`..N...........!......................... ...............................`.......................................#....... ..<....@.......................P..|.................................................... ..`............................text............................... ..`.rdata....... ......................@..@.data... ....0......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):358363995
                  Entropy (8bit):6.972150585647623
                  Encrypted:false
                  SSDEEP:3145728:KTzytRGD/CYRNIPKYTFBhfmOS9KBaVzTx9OSsKV97nM:KnUs4tvaVzTD99M
                  MD5:5F9D89B40243E83C0B48206CE4EB77D1
                  SHA1:477A019AB11E5793168B3E41D83B80A8AC8F1D43
                  SHA-256:2BF31800E731EF63E7E5BDEECD87B50B349EC8F5C9D752AACB807AC0E82E95B9
                  SHA-512:5B812C2D341FE8A9296EF68E416E0EFA8185FB3ECCEC0917AB206CD7639E1810E6444538B61583E2260F1A46D4209E1995CFBF940A1D9836C4155ADF0504940B
                  Malicious:false
                  Reputation:unknown
                  Preview:........,.......................H...........................................................................................................................................................................................................................................................e...i...............j.......................3.......................................................................................................................t....V..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):60466
                  Entropy (8bit):5.603640719549413
                  Encrypted:false
                  SSDEEP:1536:akqg31kqY3Q4Oc//////Q0LatojW/lX1Xb41:3qg323Sc//////Q3tojW/XXy
                  MD5:DE806154A80E3916669C466B6D001BD6
                  SHA1:B85BD0EC436125772A9C5403162628B7AAB35F49
                  SHA-256:10D9B7F2238EFFEB71990F979B9DFE4F3BE3D212B05232EF34C39F9578CC11E3
                  SHA-512:63CC5D6865C89AE2C41EEE3C76FD865D9461E96DBC570270982EB6DB5A15FB234098286CEE3FF9DB2255FEDA5207A222AB67743475AD60CCFD89A86B881BCB94
                  Malicious:false
                  Reputation:unknown
                  Preview:",......,..................."...|%......H+......",..............................................................................................................................................................................................................................................................j.......,.../...5.......3.......................................................................................................................N.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\218A.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):107232830
                  Entropy (8bit):7.999946456161068
                  Encrypted:true
                  SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                  MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                  SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                  SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                  SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.01057775872642915
                  Encrypted:false
                  SSDEEP:3:MsFl:/F
                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                  Malicious:false
                  Reputation:unknown
                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012096502606932763
                  Encrypted:false
                  SSDEEP:3:MsEllllkXl:/M/6
                  MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                  SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                  SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                  SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.011852361981932763
                  Encrypted:false
                  SSDEEP:3:MsHlDll:/H
                  MD5:0962291D6D367570BEE5454721C17E11
                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:modified
                  Size (bytes):8192
                  Entropy (8bit):0.012340643231932763
                  Encrypted:false
                  SSDEEP:3:MsGl3ll:/y
                  MD5:41876349CB12D6DB992F1309F22DF3F0
                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                  Category:dropped
                  Size (bytes):262512
                  Entropy (8bit):9.553120663130604E-4
                  Encrypted:false
                  SSDEEP:3:LsNl7N+l/:Ls30l
                  MD5:E57C119D4CDF6D2976F874424A49C57E
                  SHA1:67E21C5414B859B321D25CF0CE08D339D9D3B8BF
                  SHA-256:C8234BBD3DB2865D706D0742F242F53F52A65393054A1D532391FB72A25707CB
                  SHA-512:C2C2661EFF9363082FD4DDFB913B5D6B353E0880E842EFB23E946BD5A1D1180FD2C585470C5FB3496864D407DDC67624D5C9EFD9BC22FFEA00C2E1411D9A8FD4
                  Malicious:false
                  Reputation:unknown
                  Preview:.............................................z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):4.622398838808078
                  Encrypted:false
                  SSDEEP:96:QPjzIyfbInD3W0IwrBmEH7UewW4ORIhmY5XO40uK8DDzNt:pQIS0IwrJbU7W4kIX5e4kgF
                  MD5:97D4D47D539CB8171BE2AEFD64C6EBB1
                  SHA1:44ABF82DD553CCE0C1F41B9B78D853075DDD1F16
                  SHA-256:8D996D5F68BF2248F223C4F3549303BC6A8EC58CC97FCB63B7BB7D8068850273
                  SHA-512:7D402847B093E208410C695095DE815A3F5D5DA81630FD51C88C009C48C269D0EA5016D626351BB9D38862163FAD930645072C50ACCCD743DC0E19531A592FDE
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 7%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....&.].........."...0.............64... ...@....@.. ....................................@..................................3..O....@.......................`.......2............................................... ............... ..H............text...<.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................4......H........#...............1...............................................0..-.......(....r...p(.....(.......(....,...(....*(....*....0..T........~....(.....~....(.....(....s....%.o....%.o....%.o....%.o....%~....o....(....&..&..*........PP.......0..6.......(....(......( ...r...p~....r...p(!.....("...,...(#...*...0..........r...p.~$.....o%.....,..~....o&......,..o'....ra..p.~$.....o%.....,..~....o(......,..o'....r...p.~$.....o%.....,..~....o(......,..o'......&..*....4.......#..
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.01057775872642915
                  Encrypted:false
                  SSDEEP:3:MsFl:/F
                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                  Malicious:false
                  Reputation:unknown
                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012096502606932763
                  Encrypted:false
                  SSDEEP:3:MsEllllkXl:/M/6
                  MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                  SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                  SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                  SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.011852361981932763
                  Encrypted:false
                  SSDEEP:3:MsHlDll:/H
                  MD5:0962291D6D367570BEE5454721C17E11
                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012340643231932763
                  Encrypted:false
                  SSDEEP:3:MsGl3ll:/y
                  MD5:41876349CB12D6DB992F1309F22DF3F0
                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                  Category:dropped
                  Size (bytes):262512
                  Entropy (8bit):9.553120663130604E-4
                  Encrypted:false
                  SSDEEP:3:LsNlU6r:Ls3U
                  MD5:9DB0FA0D95D072D600BA1F8A3B7923A4
                  SHA1:80064696A06635178A2A1B87E0A4763EA1218561
                  SHA-256:224BCBE4AF0611D7E46C9E5D08DECDD52A19E6E567C71C0C63E26E6D7ED40559
                  SHA-512:13050C204330DB6EC0532F459EAF84EED9EE2D86BCBF8DFE61F4913CE40C920C89C2FFE5101DBEE069C5A50972D1404C22606F0A657A31109C36C9BD1EDCBE17
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................?*...z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):296448
                  Entropy (8bit):5.660420770467009
                  Encrypted:false
                  SSDEEP:3072:xTpjI4TptgvmHMaellnhblkK0m2QEk0xjo4OVzdvayfvYn6A:ppbVtsg1e5b2Px2zdyyq
                  MD5:7A3502C1119795D35569535DE243B6FE
                  SHA1:DA0D16BC66614C7D273C47F321C5EE0652FB5575
                  SHA-256:B18FEFB56ED7B89E45CEC8A5494FBEC81E36A5CB5538CCBB8DE41CCE960FAA30
                  SHA-512:258B111AC256CD8145CBE212D59DFF5840D67E70EFFD7CDDC157B2A3461B398BBC3446004980131FAA6A8762C19305F56E7B793F045331B56B8BD17D85B884C4
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....rf..............0.............>.... ........@.. ....................................@....................................O.......t............................................................................ ............... ..H............text...d.... ...................... ..`.rsrc...t...........................@..@.reloc..............................@..B................ .......H....... ...$...........D...p............................................(....s....*Z..(....,...(....(....*.(....*..(....*..(....*.......*.~....*....0..W.......(....".....(......,..o....-..*.o.....+...( .....o....&..(!...-...........o"....."...BZ*.......%..A.......0..Q.......(....(........,..o....-..*.o.....+...( .....o....&.._...(!...-...........o".....*.........!. A.......0..V.......(....(......,..o....-.*~#.....o.....+...( ...."...B[..o....&..(!...-...........o"....*......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):462336
                  Entropy (8bit):6.803831500359682
                  Encrypted:false
                  SSDEEP:6144:leSYvQAd10GtSV41OJDsTDDVUMle6ZjxLV/rHo0Oaaz2R9IY:oJBdBS4msNUCe65frHMnz2R9
                  MD5:6DED8FCBF5F1D9E422B327CA51625E24
                  SHA1:8A1140CEBC39F6994EEF7E8DE4627FB7B72A2DD9
                  SHA-256:3B3E541682E48F3FD2872F85A06278DA2F3E7877EE956DA89B90D732A1EAA0BD
                  SHA-512:BDA3A65133B7B1E2765C7D07C7DA5103292B3C4C2F0673640428B3E7E8637B11539F06C330AB5D0BA6E2274BD2DCD2C50312BE6579E75C4008FF5AE7DAE34CE4
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=N...........!................N#... ...@....@.. ..............................T.....@.................................."..O....@..P....................`......."............................................... ............... ..H............text...T.... ...................... ..`.rsrc...P....@......................@..@.reloc.......`......................@..B................0#......H.......0U..l...........P%.../..P ......................................6..`N.?O...%.C.k_..d...I......5a.......9x......R...gg8...JM...`.[. .o..eE1$_.M.h.q.oz..1..........@....s.c/J..wk.D.....t..&...(....*...0..2........r...p(....}.......}"....(........(.........(....*..r...p(....}.......}"....(........(....*..0..j.........o....-..s#...+..}......(......(......}.....(....s....}......}......}......(......%-.&r...p}......j(#...*rr!..p.{.....{.....B...(....*..0..A........{..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):574376
                  Entropy (8bit):5.8881470355864725
                  Encrypted:false
                  SSDEEP:12288:ZzfhypmNGgHA37YyUD1AboTf3xnpJbC8VGSBJjRuz7:ZoI1AbQf3xnpJbC8VLBJjRuz7
                  MD5:8F81C9520104B730C25D90A9DD511148
                  SHA1:7CF46CB81C3B51965C1F78762840EB5797594778
                  SHA-256:F1F01B3474B92D6E1C3D6ADFAE74EE0EA0EBA6E9935565FE2317686D80A2E886
                  SHA-512:B4A66389BF06A6611DF47E81B818CC2FCD0A854324A2564A4438866953F148950F59CD4C07C9D40CC3A9043B5CE12B150C8A56CCCDF98D5E3F0225EDF8C516F3
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Ot............" ..0.............6.... ........... ....................................@....................................O.......................................T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........f...P............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X.+....b...aX...X...2.....cY.....cY....cY...{...._..{........+,..{E....3...{D......(....,...{D...*..{F.......-..*...0...........-.r...ps....z.o......-.~....*.~....X...+....b..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):561424
                  Entropy (8bit):4.606896607960262
                  Encrypted:false
                  SSDEEP:6144:XqqUmk/Rik2rH6dl0/IaHNpOVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QyMYFLse:DUK
                  MD5:928ED37DB61C1E98A2831C8C01F6157C
                  SHA1:98103C2133EBDA28BE78BFE3E2D81D41924A23EE
                  SHA-256:39F6A4DB1BE658D6BAFF643FA05AAE7809139D9665475BFCA10D37DCA3384F21
                  SHA-512:F59387BFA914C7DB234161E31AD6075031ACA17AAEF4B8D4F4B95C78C7A6A8D0E64211566CA2FD4549B9DA45231F57A4191FBCD3809404653F86EE2ABD4937A4
                  Malicious:false
                  Reputation:unknown
                  Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>Newtonsoft.Json</name>.. </assembly>.. <members>.. <member name="T:Newtonsoft.Json.Bson.BsonObjectId">.. <summary>.. Represents a BSON Oid (object id)... </summary>.. </member>.. <member name="P:Newtonsoft.Json.Bson.BsonObjectId.Value">.. <summary>.. Gets or sets the value of the Oid... </summary>.. <value>The value of the Oid.</value>.. </member>.. <member name="M:Newtonsoft.Json.Bson.BsonObjectId.#ctor(System.Byte[])">.. <summary>.. Initializes a new instance of the <see cref="T:Newtonsoft.Json.Bson.BsonObjectId"/> class... </summary>.. <param name="value">The Oid value.</param>.. </member>.. <member name="T:Newtonsoft.Json.Bson.BsonReader">.. <summary>.. Represents a reader that provides fast, non-cached, forward-only access to s
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):215862
                  Entropy (8bit):5.849338245796311
                  Encrypted:false
                  SSDEEP:3072:rFi6z/VXzAf3oc8+vat7fvYnDAdOVz5kNx:rxFSI+y1qk6zuNx
                  MD5:9D21A25AA1B5985A2C8CBCE7F7007295
                  SHA1:86EBF56352B4DBB831FAE0CCA180B4ADD951240D
                  SHA-256:E41F984C39183BA4FD1578134D71E203F4A7A8C23F278924562876326FC40EE2
                  SHA-512:EE4A1AC97968F2DDA3C54A49AC33D3FCE28C4DAE72032D9FDD1F8D8BA41B07A1D78D15E11586DA54AD5E0F2BD4A48C79A0CBAC84DE3D957B2AC6C1B5F41A33BB
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):875520
                  Entropy (8bit):5.621956468920589
                  Encrypted:false
                  SSDEEP:12288:jsRfnBqqvFXWesd2HiZ9fyn+5FHrvUR1Qnzx7LuQ:jsRITeWAQ5vtu
                  MD5:B03C7F6072A0CB1A1D6A92EE7B82705A
                  SHA1:6675839C5E266075E7E1812AD8E856A2468274DD
                  SHA-256:F561713347544E9D06D30F02A3DFCEC5FE593B38894593AEEDF5700666B35027
                  SHA-512:19D6792EB9BA8584B94D0D59E07CE9D1C9C4DA5516490F4ABCE5AE0D7D55B357BDA45B2093B3E9EB9D6858061E9D3F530A6655C4779A50C911501AE23925C566
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..R...........p... ........... ....................................@..................................p..O.......x............................o..T............................................ ............... ..H............text....P... ...R.................. ..`.rsrc...x............T..............@..@.reloc...............Z..............@..B.................p......H....... .................................................................(....*..(....*..(....*^.(.......=...%...}....*:.(......}....*:.(......}....*^.(.......>...%...}....*:.(......}....*.(.........*....0..,.......(....o.......3..*....... ....3.(....-..*.*.*.0..L.......~..... . ..(......(....-..(....r...p( ...,.......&...~....(!...,..(".....*.*........+1...........4.......~....*.~....*..(....*.~....,.*.(#...-.(....-..(....+.r...ps$...z(..........*b.r...p(%...~.....(....&*.r
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1946739
                  Entropy (8bit):7.989700491058983
                  Encrypted:false
                  SSDEEP:49152:fpXzD2VLpS71ycdao6LreGCL/0jJZWOiBiXkbEia9T:xjyFgZ0Lr2/0jJU5BiIEN
                  MD5:96AD47D78A70B33158961585D9154ECC
                  SHA1:149BF6F6905A76B0CC9E9ACA580357BD6C3497A2
                  SHA-256:C861117D1F1DBF02867B46FA87CB8C65C3213D196029EE81A02B617D131236E2
                  SHA-512:6A971F742B5754EEF39C6C2C64DB13DFDCB74D8CB23833404E9EF5AD89E142278E5DF789F508DB561C5E957013AE0C60D002CDFA93BCD87CA4967D610DF1579B
                  Malicious:false
                  Reputation:unknown
                  Preview:........V...f.....g.7........................!.....%....o8...).>...).F...).H...).X...).a...)*i...).k...).q...)Lt...).v...)Tw...).x...).}...).....)I....)i....)....).....).....)L....)....)....)t....).....).....).....)s....).... )....!)....")....#)....$)}...%)+...&)h#..').'..().-..)).>..*).A..+).C..,).Q..-)CU...).]..<).d..=).l..>)i...?)G...@)H...A)r...B)....C)z...T)....U)....V)+...W)....X)....Y)....Z)....[)#...\)}...]).!..^)R1.._).2..`).;..a).=..b)mE..c)QG..d).H..e)qL..f).U..g).]..h).b..i))d..j).e..k).g..l)Pi..m).p..n).z..s).z...).....)b....).....)'....).....)....)....).....).....)....).....)s....)F....)j....)....).....)....)....)....)h....)H....)....).....).....)k....).....)L....)q....)2....).....).....).....).....).....)N....)|....).....).....).....).!...).)...).6...).C...)RE...).L...).N...).O...).U...)bV...).W...).^...)o_...)(g...)Si...).v...).....)0....)/....).....),....).....*.....*F....*]....*3....*v....*....*v....*.....*.....*.....*$... *....!*8..."*....#*....$*....%*..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):214119
                  Entropy (8bit):7.955451054538398
                  Encrypted:false
                  SSDEEP:6144:m5S+8U5mtp0ra7rFrJzw95T9OHCZg0Gb0OveGe04mExhLY:mWU5OGUFoqoORehrQ
                  MD5:391F512173ECEC14EB5CE31299858DE1
                  SHA1:3A5A41A190C1FB682F9D9C84F500FF50308617FC
                  SHA-256:E0F5C754C969CCA0AC4594A6F3F2C23D080A09EEA992AF29E19F4291FD1E0B06
                  SHA-512:44D7B9BCB3544C3F5550150EF3522BF6A0B36900695E6A13E44F5616E16A058548189D4FEA4A22248B1CB2B273B0EAA7D559EB2D8F013BED520E4097BD45D800
                  Malicious:false
                  Reputation:unknown
                  Preview:........................#.b...&.....:.g....7.....7.....7.....7|(...7.-...7t5...7.6...7.9...7s:...7hB...7.E...7.G...7.K...7qN...7.Q...7yR...7.S...7.W...7.\...7.b...7.i...7.k...76m...7Vq...7.r...7.v...7.y...7.{...7.~...7Z....75....7;....7W....7.....7c....7u....7b....7.....7.....7.....7Q....7*....7\....8."...8,)..<FqG..=F7I..>F.L..?F$O..@F.P..AFaQ..BFnT..CF.W..DF.Y..EFJ\..FF.^..MF(b..NF.c..QF.e..RF.f..YFZg..ZF.p..[F.x..\F.{..]F.{...L.|...L.....L....Ni....N.....NJ....N2....N+....N^....No....N9....NK....N....N1....N$....N....Nh....N.....N.....U.....U.....U.....U.....U.....U[....U.&...Uh(...U?/...U.4...U.:...U.@...U.B...U,G...U.K...U)N...U.R...UF\...U.`...U.b...U.j...U]s...UEt...U.u...U.w...U.z...Uh{...U.}...U#....U.....U^....U.....U|....U.....U.....U.....U.....U.....U.....U.....U.....U.....U]....U?....U.....U9....U....U.....Um....U<....U!....U.....U.....U....Uq....U3....U!....U.....U....U.....Uu....UJ....U.....U.....U.....U.....U`....U'....U.....U.....Ul....U%....U7....U.....U.....UW.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):290001
                  Entropy (8bit):7.9670215100557735
                  Encrypted:false
                  SSDEEP:6144:tS+8U5mtp0ra7rFriDQYaF+9bQHgs4jTlmOHCZVWGMRe8InVXYopym74:CU5OGUFrfs4gs4jTQ6ebVIo374
                  MD5:BF59A047984EAFC79E40B0011ED4116D
                  SHA1:DF747125F31F3FF7E3DFE5849F701C3483B32C5E
                  SHA-256:CD9BE67AA0527F16E309189FA2369E1A2596D0601A7D55C405F8A619F4D095E9
                  SHA-512:85A545758E8C89EF47BF11B553C57D23ED7DA6AE89A8BCCB262F509AABE61A1121C3F87EC9200791F2670225BAEECC3C92AED6AFDA86C08CA0FD611DA2E595D2
                  Malicious:false
                  Reputation:unknown
                  Preview:........................#.....&.....:......7.....7.....7.....7.+...7.1...7.8...7.9...7)<...7.=...7xE...7.H...7.J...7'N...7.Q...7.T...7.U...7.W...7.Z...7._...7.e...7.l...7.n...7Fp...7ft...7.v...7)y...7.|...7.~...7.....7j....7E....7K....7g....7.....7s....7.....7r....7.....7.....7.....7a....7:....7l"...8.%...8<,..<F.J..=F.N..>FtV..?F9\..@Fw_..AFr`..BF0g..CFll..DF|o..EF.v..FF){..MF....NF...QFf...RF....YF`...ZF...[F....\F....]F....L*....L.....L.....N.....N.....N.....N.....N.....N.....N.#...N.&...N.'...N.)...N.*...N.+...Nv,...N.-...N;r...N.|...Um....U.....UM....UV....U.....U....UC....U.....U....UM....U.....U.....Um....U.....U.....U.....U.....UQ....U.....U7....U.....U.....Uk....U.....U.....U.....U.....U.....U.....U.....U.....U.....U{....U.....U.....U.....U~&...U.)...U.Q...U.Q...U.V...U.[...U.\...U._...U.`...U?a...U.a...Uic...U.d...U\f...U.g...U.i...U1l...U.p...U.u...U.}...U.....U.....U^....U.....U.....Ux....U....U.....Uy....U6....U.....U....UR....Uq....U.....U.....U_....U.....U.....U..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1305142
                  Entropy (8bit):7.99463351416358
                  Encrypted:true
                  SSDEEP:24576:8AkckSbnVLjWG13xdT0b+SLzRYt2k+lbG9EjJNH/osm22O+EcRfPLP:88zVXWG1hdAKSxY4k5EFNHgvPPLP
                  MD5:20DDA02AF522924E45223D7262D0E1ED
                  SHA1:378E88033A7083AAC24E6CD2144F7BC706F00837
                  SHA-256:8448C2BA10A3D7DC8CA3FB24F580BF99D91F746107B1A06E74932749CC1CAB01
                  SHA-512:E71320B2AA0CB52938206EC00187D78274646C4C7D3579B33A0163262C063B7813FE7ACD0D2E5807082ADE772069AA577FED7F594964790C2F7C061CE38467B6
                  Malicious:false
                  Reputation:unknown
                  Preview:........i...f+....i+....l+....m+{...n+q...o+7(..p+.1..q+X3..r+~5..s+aI..t+.]..u+.f..v+Ui..w+'k..x+.l..y+.q..z+.s..{+O{..|+...}+=...~+.....+....+-....+.....+.....+.....+.....+.....+.....+.....+.....+.....+%....+.....+&(...+.Q...+.Y...+Xe...+Bj...+cv...+.}...+....+H....+....+Q....+l....+I....+.....+ ....+T....+!....+m....+.....+.....+U....+.....+.....+.....+l....+~....+.....+=....+w....+.....+-"...+.(...+.0...+.2...+.4...+.G...+uS...+.....+9....+y....+.....+.....+N....+....+0....+.....+.....+.....+_....+.....+.....+.....+.....+.....+.....+.....+.....+S....7`....7R...(7/...)7.....L.m...LO....L.....Mk....M.....M.....M>....M.....M.....Mq....M.....M.....M\....M.....M.....M.....M.....M.....M.....M.....M.....M.....MO....M.....M.....M.!...M.(...Mf5...M.;...M&E...M.P...M.T...M<]...M.`...M.j.. M.k..!M2v.."M.w..#M.z..$M....%M...&M...'M#...(M@...)M....*M(...+MY...,Mu...-M$....M..../MV...0M;...1Mx...2M....3M....4Mi...5M....6M....7MP...8M"...DM....EM.....Mi....M.~...M.~...Mb....M_....M....M.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:current ar archive
                  Category:dropped
                  Size (bytes):87182312
                  Entropy (8bit):5.477474753748716
                  Encrypted:false
                  SSDEEP:196608:v0b1XAJ5V8XYcrfCNJsTtU0ZhdYHbgMnn6d25JOcLRiLnIrBcnK0EAeg1GF:78JaNJyZhdE6383rWEAR8
                  MD5:FFD456A85E341D430AFA0C07C1068538
                  SHA1:59394310B45F7B2B2882D55ADD9310C692C7144F
                  SHA-256:F188B96639B5157E64222BB8483D76CD21A99141FC2614EF275E20639C739264
                  SHA-512:EB4CB388383CB37B1D89531D560169985A80DF9335F005AFBBFDE56F9031821A933D735138B1086CF81D006E480FF14711A8A95B3DB8A0FD4037AA6EFD926B50
                  Malicious:false
                  Reputation:unknown
                  Preview:!<arch>./ 1696073295 0 1940897 `...Y..:.t.:.>.:...:...:...:...:...;/..;/..;/..;/..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..@...@...@...@...@...A...A...A...A...A...A...A...A...A...A...A...A...Co..Co..Co..Co..Co..Co..Co..Co..Co..Co..E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...G..G..G..G..G..G..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):656926
                  Entropy (8bit):7.964275415195004
                  Encrypted:false
                  SSDEEP:
                  MD5:3404DD2B0E63D9418F755430336C7164
                  SHA1:0D7D8540FDC056BB741D9BAF2DC7A931C517C471
                  SHA-256:0D3FCA7584613EB1A38BAF971A7DD94F70803FC130135885EC675E83D16A4889
                  SHA-512:685D63633DB8A57D84225C2B92C92016E1CE98BA2BF8D3DDACE2EB120B3BCF84C718787D59DB6EC61F34CF91CB651500B4E4FF0AC37AEB89561CDCC586946C80
                  Malicious:false
                  Reputation:unknown
                  Preview:..........+...........................&..........;.....;N....;.....;"....;.....;.....;N....;.....;.....;s....;....;.....;.....;....;4....;.....;.....;0....;.....;c....;7....;.....;.....;.....;.....;?....;:....;G....;.....;n....;x....;.....;.....;.....;#....;.....;.....;B....;.....;.....;.....;N....;.....;.....;+....;.....;% ...;c!...;.!...;."...;E+...;t4...;qH...;I\...;.]...;.^...;>a...;.c...;.g...;.o...;pw...;.|...;h....;.....;.....;....;.....;....;o....;.....;.....;.....;*....;y....;.....;.....;3....;9....;h....;.....;.....;.....;F....;."...;.+...;.0...;.8...;?:...;'X...;.q...;.....;....;.....;t....;.....;.....;.....;./...;.X...; m...;....;.....;.....;.....;+....;.....<O....<.....<.....<=....<2$...<y+...<.3...<.<...<aA...<.L...<.W...<.[...<._...<.d...<Dv...<t....<!....<....<....<.....<.....<.....<V....<.....<.#...<.8...<|F...<hP...<bW.. <i^..!<ts.."<(...#<{...)<`...*<c...+<d...,<"...;<x...<<k...=<....><-...?<....@<....A<'...B<g...C<....D<U...E<....F<....G<....J<....K<....L<v%
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1017158
                  Entropy (8bit):7.951759131641406
                  Encrypted:false
                  SSDEEP:
                  MD5:3FBF52922588A52245DC927BCC36DBB3
                  SHA1:EF3C463C707A919876BF17C3E1CD05C0D2C28CA9
                  SHA-256:C6FE346106C5E4950161ED72EB0A81FE3537A94E4A59461AAF54E750D1904F76
                  SHA-512:682EB6D61B564C878FDB971A6439FCDA9F1E108BD021A32E8990B68B1338986A4866A0965DEA62567501C8826D43CEBF2B7C8BE8323DE415A75E8D89A9D592E7
                  Malicious:false
                  Reputation:unknown
                  Preview:..........+.....................b................;.....;&....;.....;.....;.....;.....;b....;....;8....;.....;.....;o....;....;<....;.....;.....;l....;....;/....;.....;[....;Q....;.....;j....;.....;.....;L'...;.E...;lZ...;.o...;.q...;.r...;.s...;.{...;.{...;.~...;"....;.....;U....;.....;.....;.....;....;d....;.....;.....;i....;.....;f....;....;0....;.....;.....;.(...;+*...;.+...;A....;54...;.9...;,O...;.`...;.n...;.~...;.....;.....;M....;....;;....;q....;Z....;.....;.....;.-...;\=...;.P...;.d...;@|...;.....;Y....;#....;_....;/....;.....;.#...;.;...;.J...;gc...;cf...;W....;....;W....;.....;.....;.....;7....;.-...;.I...;Y\...;W....;....;.....;S....;.....;t....;.....;.....<W....<.&...<9<...<iG...<jQ...<.X...</a...<gi...<.n...<Pz...<.....<f....<.....<I....<.....<.....<.....<4C...<4d...<....<....<.....<.....<.....<D8...<.e...<_....<....<.... <I...!<...."<.E..#<.E..)<.G..*<%j..+<N...,<....;<....<<v...=<....><....?<....@<y...A<....B<....C<....D<....E<"F..F<.J..G<.O..J<.X..K<.e..L<.r
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):1174528
                  Entropy (8bit):6.475826085865088
                  Encrypted:false
                  SSDEEP:
                  MD5:207AC4BE98A6A5A72BE027E0A9904462
                  SHA1:D58D2C70EA0656D81C627D424F8F4EFCCEF57C86
                  SHA-256:2BA904DA93ACC4766639E7018AC93CC32AA685DB475F3A59B464C6BC8B981457
                  SHA-512:BFB6C58774829DB3D5FADC92CB51477FF4EAC8FB934DB6583A312BB1157468F6DD3A4A3AFAF25A687B74890DC8A69857A12D0B38B18D83E82836E92E02046FF3
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....v...p......P.....................................................@A........................vT......AX..<.......x...........................<<.......................;......(...............<[.......O.......................text....u.......v.................. ..`.rdata..\............z..............@..@.data...H...........................@....00cfg...............F..............@..@.crthunk.............H..............@..@.tls.................J..............@...CPADinfo(............L..............@...malloc_h.............N.............. ..`.rsrc...x............P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):2106216
                  Entropy (8bit):6.4563314852745375
                  Encrypted:false
                  SSDEEP:
                  MD5:1C9B45E87528B8BB8CFA884EA0099A85
                  SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
                  SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
                  SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4127200
                  Entropy (8bit):6.577665867424953
                  Encrypted:false
                  SSDEEP:
                  MD5:3B4647BCB9FEB591C2C05D1A606ED988
                  SHA1:B42C59F96FB069FD49009DFD94550A7764E6C97C
                  SHA-256:35773C397036B368C1E75D4E0D62C36D98139EBE74E42C1FF7BE71C6B5A19FD7
                  SHA-512:00CD443B36F53985212AC43B44F56C18BF70E25119BBF9C59D05E2358FF45254B957F1EC63FC70FB57B1726FD8F76CCFAD8103C67454B817A4F183F9122E3F50
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!7P.OdP.OdP.Od..NeR.OdP.Nd..OdY..dU.Od.Jem.Od.KeQ.Od...dQ.Od..Leo.Od..Je..Od..OeQ.Od..Ge..Od..Kec.Od...dQ.Od..MeQ.OdRichP.Od................PE..L..................!.....2<..*...............P<...............................?.......?...@A.........................<<.u.....=.P.....=.@.............>..%....=.........T....................u..........@.............=..............................text...e0<......2<................. ..`.data...`"...P<......6<.............@....idata........=.......<.............@..@.rsrc...@.....=.......<.............@..@.reloc........=.......<.............@..B........................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):2205743
                  Entropy (8bit):7.923318114432295
                  Encrypted:false
                  SSDEEP:
                  MD5:54D4E14BFF05C268248CAB2EEDFB61DD
                  SHA1:33AF472176F6E5FB821FFE23C9FBCCC7C735B5B9
                  SHA-256:2CAC401BFFA9FD4DFFE11E05EE18FC5CA7A30EC5BF7EF6A3EA8518A4F3344790
                  SHA-512:5A6893E7EA30EAA0EFF44687B0D15366A8224E476E4AE8FE0D5C7EF2B3C62E6B0184F73EAD36C4E4E08D6936524CEF8429660B3EC29453EED128E3C5368CE78C
                  Malicious:false
                  Reputation:unknown
                  Preview:........K....[.....[.....[.....[Y....[.....[.....[.....[.....[P ...[.!...[."...[.#...[.$...[.%...[.%...[T&...[0'...[/(...[.(...[.(...[.*...[.+...[{,...[1-...[.-...[3....[b/...[.0...[.1...[.2...[.3...[,4...[.4...[P5...[.5...[#6...[!8...[.8...[.9...[.9...[::...[q;...[Y=...[.=...[ ?...[.@...[0A...[iB...[?D...[.E...[pE...[UF...[.G...[.H...[)I...[.I...[.M...[.M...[DN...[.N...[FO...[.O...[.Q...[oV...[uW...[cX...[[\...[.]...[Ea...[bc...[.c...[ d...[.d...[oe...[.f...[.h...[.i...[Xj...[.k...[.l...[An...[.o...[.p...[.....[....[.....[.....[.....[.....[[!...[.%...[d....[x1...[.4...[.4...[.9...[.C...[.Q...[KS...[#V...[=]...\.b...\.z...\Q}...\.....\.....\*....\`....\.^...\7b...\uy...\g....\.....\.....\=....\....\....\....\'....\.....\....\.... \....!\...."\....$\....%\....&\....)\....*\....+\.Q..,\.S..-\.U...\..../\w...0\....1\8...2\....3\....4\....5\....6\....7\.T..8\.z..9\6...:\....;\c...<\)&..=\.*..>\>5..?\JU..@\.r..A\....B\9...C\....D\S...E\....F\\y..G\Y...H\%...I\....J\M...K\.a..L\.j..M\.n
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):10717392
                  Entropy (8bit):6.282534560973548
                  Encrypted:false
                  SSDEEP:
                  MD5:E0F1AD85C0933ECCE2E003A2C59AE726
                  SHA1:A8539FC5A233558EDFA264A34F7AF6187C3F0D4F
                  SHA-256:F5170AA2B388D23BEBF98784DD488A9BCB741470384A6A9A8D7A2638D768DEFB
                  SHA-512:714ED5AE44DFA4812081B8DE42401197C235A4FA05206597F4C7B4170DD37E8360CC75D176399B735C9AEC200F5B7D5C81C07B9AB58CBCA8DC08861C6814FB28
                  Malicious:false
                  Reputation:unknown
                  Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ......E.......E.......E..P/...E.../...E..P7...E...7...E...h...F...h.. F..Pi..0F......DF.....WF.....jF..P...}F.......F..`....F.......F.. ....F.......F..0....F.......G......G......(G.....;G..@...NG......aG.....tG.......G.......G..@....G.......G.......G.......G..P....G.......H.......H..P...2H......EH..`...UH......hH......yH..P....H.......H.......H..`....H.......H.......H..P....I.......I......-I..@...=I......PI......aI..@...uI.......I...0...I.. 1...I..p1...I...e...I...e...I...i...I..`i...J...i..)J...K..BJ..p...^J..."'.uJ..P.'..J....'..J...5'..J..06'..J...>'..J..P?'..K...D'..K...F'.0K...H'.IK...V'.hK....(..K....(..K..P.)..K....)..K..pW*..K..P.*..L...*+.?L..p.+.bL....+..L...U,..L....,..L....,..L....,..L..@.,..M....,.-M..P.-.IM.. e-.`M...e-.~M...R/..M.../..M..0.0..M..@.0..M..P.0..M....0..N....0.!N...,0.9N...,0.NN..0-0.fN...-0.vN...Y0..N...Z0..N..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):377856
                  Entropy (8bit):6.602916265542373
                  Encrypted:false
                  SSDEEP:
                  MD5:8BC03B20348D4FEBE6AEDAA32AFBBF47
                  SHA1:B1843C83808D9C8FBA32181CD3A033C66648C685
                  SHA-256:CBEE7AC19C7DCCCA15581BD5C6AD037A35820DDFE7C64E50792292F3F2E391E6
                  SHA-512:3F9EEC2C75D2A2684C5B278A47FB0E78B57F4F11591FAC4F61DE929F716BBAA8F7DF05E10390408AD6628538611541548C26869822372E9C38D2C9C43881651E
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....`...`............................................... ............@A........................8,..h....:..(.......x........................>..........................D........p..............(<..`............................text....^.......`.................. ..`.rdata..L....p.......d..............@..@.data....4...p.......`..............@....00cfg...............|..............@..@.tls.................~..............@....rsrc...x...........................@..@.reloc...>.......>..................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):6635008
                  Entropy (8bit):6.832077162910607
                  Encrypted:false
                  SSDEEP:
                  MD5:63988D35D7AB96823B5403BE3C110F7F
                  SHA1:8CC4D3F4D2F1A2285535706961A26D02595AF55C
                  SHA-256:E03606B05EEAED4D567EA0412350721C0D566B3096B18C23BD0B3FCDE239E45A
                  SHA-512:D5F5ACA00BE9E875FCD61531CC7F04F520FB12999E36E4FE06BEAAE491B47D2E9FE182015DB1CBFBB8E78CF679F2EB49E20ECDF1B16D1D42058D6F2D91BC3359
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!......L...........@.......................................e...........@A.........................].......^.d.....a.......................a.."...U]......................T].....X.L.............H.^.@.....].@....................text.....L.......L................. ..`.rdata...I....L..J....L.............@..@.data...X....._.......^.............@....00cfg........a.......a.............@..@.tls..........a.......a.............@....rsrc.........a.......a.............@..@.reloc..."....a..$....a.............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):176517632
                  Entropy (8bit):7.025874989859836
                  Encrypted:false
                  SSDEEP:
                  MD5:F5259CC7721CA2BCC8AC97B76B1D3C7A
                  SHA1:C2FC0C8396D8CD6764809A2A592972E2EBCA64BA
                  SHA-256:3FE6A262EF01CB8FD4DC2D4373DE0F1F0A89EE51953452ED4557CB55F1DA9AB4
                  SHA-512:2D01B1F2B24717EFF37965BBC32D167434A65F3DFFF74342D2E2FA8FBB0E97C3F61FDF673A13AD63031D630D9CE46A6F9F0C4F89EBD30C31F3EA55817B9D1331
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.........N.......k....................................................@A........................#..........h....0J.(C....................L.|.\.P................................?..............`.......LY..@....................text............................... ..`.rdata...%2..0...&2.................@..@.data...dr+..`.......>..............@....00cfg........I.......&.............@..@.rodata.@.....I.......&............. ..`.tls..........J.......&.............@...CPADinfo(.....J.......&.............@...malloc_h..... J.......&............. ..`.rsrc...(C...0J..D....&.............@..@.reloc..|.\...L..0\..B).............@..B........................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:current ar archive
                  Category:dropped
                  Size (bytes):40258
                  Entropy (8bit):4.547436244061504
                  Encrypted:false
                  SSDEEP:
                  MD5:310744A0E10BD9C2C6F50C525E4447F9
                  SHA1:9BA62D6AC2CB8EFF46C9B21051677FC1DC66D718
                  SHA-256:E9C55CFF925E26812139CDCAD6612E0D69E317CB7BB1435C9EB5113D338ACCE7
                  SHA-512:6DF9E3F9AFD7CDEC750B006987E5AEC445E163DD0B9CF1A9EA53F78DB2EE5FD654E3B4F82BCA3E1F4BEDB189F5DFA51189C820905676AD048DBE2E0AD405BF5B
                  Malicious:false
                  Reputation:unknown
                  Preview:!<arch>./ 0 0 0 0 14390 `.......8z..:&..:...;...;...<&..<&..<...<...=...=...=...=...>...>...>...>...>...>...?f..?f..?...?...@B..@B..@...@...A$..A$..A...A...B"..B"..B...B...C...C...C...C...D...D...D...D...D...D...E...E...E...E...Fn..Fn..F...F...GZ..GZ..G...G...HJ..HJ..H...H...I$..I$..I...I...J...J...J...J...K ..K ..K...K...L...L...L...L...M...M...M...M...N...N...N|..N|..N...N...Od..Od..O...O...P`..P`..P...P...QP..QP..Q...Q...RT..RT..R...R...S@..S@..S...S...T...T...T...T...U...U...Un..Un..U...U...VP..VP..V...V...W,..W,..W...W...X...X...X...X...X...X...Y\..Y\..Y...Y...ZB..ZB..Z...Z...[,..[,..[...[...\...\...\...\...\...\...]b..]b..]...]...^N..^N..^...^..._6.._6.._..._...`$..`$..`...`...a...a...a...a...b...b...b...b...c...c...c...c...c...c...dj..dj..d...d...e^..e^..e...e...fV..fV..f...f...g8..g8..g...g...h*..h*..h...h...i"..i"..i...i...j...j...j...j...k...k...k...k...l...l...l...l...l...l...mh..mh..m...m...nN..nN..n...n...o2..o2..o...o...p...p...p.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):470498
                  Entropy (8bit):5.409080468053459
                  Encrypted:false
                  SSDEEP:
                  MD5:64F46DC20A140F2FA3D4677E7CD85DD1
                  SHA1:5A4102E3E34C1360F833507A48E61DFD31707377
                  SHA-256:BA5CA0A98E873799A20FD0DF39FDB55AAB140E3CC6021E0B597C04CCE534246D
                  SHA-512:F7D789427316595764C99B00AF0EF1861204F74B33F9FAB0450F670CB56290C92BFB06EF7D1D3B3BF0B6ACDC6295E77F842C49579BD9973E3D5805920CDB2527
                  Malicious:false
                  Reputation:unknown
                  Preview:........$$..e.>...h.F...i.N...j.Z...k.i...l.t...n.|...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................&...........5.....<.....C.....D.....E.....J.....W.....f.....w.................x.................A.......................S.........................................%.....{.......................V.......................J.......................Y.......................e.......................a.......................l...................................O.....f.......................).....z.......................6.....u.......................Q.......................E.....w.................!.....I.....R.............................l.......................f.................+.............................f.......................D.......................<......................._.......................2.....~.................2.....v.................X...........$.....8.................P.....r...........6.....j.....}.................1.....?...................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):763010
                  Entropy (8bit):4.909167677028143
                  Encrypted:false
                  SSDEEP:
                  MD5:3B0D0F3EC195A0796A6E2FAB0C282BFB
                  SHA1:6FCFCD102DE06A0095584A0186BD307AA49E49BD
                  SHA-256:F9F620F599BC00E84A9826948C3DA985AC9ADB7A6FFB4C6E4FBEFEAF6A94CF85
                  SHA-512:CA9217F22C52EF44E4F25142D1AD5DD9D16E4CCC3B6641609E1F4C2650944E35BA4CAB59CA5CD9EA6FEFD6BE1D3E8227FC0E3E6BDEDD14B059CA2C72D096D836
                  Malicious:false
                  Reputation:unknown
                  Preview:........>${.e.r...h.z...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.(...|.....}.@.....H.....M.....U.....].....e.....l.....s.....z.....{.....|...............................................F.....f.....'...........V...........Y.............................5.................F.................!.................d.....z...............................................C...........\.................z...........h...........3...........$.....C.................e.................i.................,.......................X.............................h.......................!.....|...........$.............................1.....}.........................................Z.................|...........'.....N...........F.................;.............................G.................v............ ....4 ..... ....X!.....!.....!....x"....."....Z#.....#....M$.....%.....%.....%.....&....+'.....'.....'.....(....D).....).....)....2*.....*.....*.....*.....+....",.....,
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):838413
                  Entropy (8bit):4.920788245468804
                  Encrypted:false
                  SSDEEP:
                  MD5:C70B71B05A8CA5B8243C951B96D67453
                  SHA1:DEED73A89F0B3EDAB8FF74117CC6B31CB4F426E8
                  SHA-256:5E0D4BC0893A334B6FFF610F66E4A00920530D73EC3257EB9D37A96EBD555C13
                  SHA-512:E000FD3592AC5FE700C4CE117868915C066AC66D5954A1DE4F5AFF0F4559C93F7DFF47623F1837CE827FFF94E91ECD89A974037BE9CCCC8E672E229A1E8115E9
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.!...n.)...o.....p.;...q.A...r.M...s.^...t.g...v.|...w.....y.....z.....|.....}.........................................................................-.....d.................n...........A...........u.......................O.......................D.................Y...........3.....J...........=.....g.....~.....&.................O.......................B.....!...........u...........5...........).....W.................3.....N.....U.....B...........!.........../.....Y........... .......................g...........).....I.................#.....A...........@.................6........... .....D...........I.................%.............................=.................?...................................G...................................).....t............ ..... ..... ..... ....o!.....!....6"....\"....."....S#.....#.....#.....$.....%....V&.....&....5'.....'.....(....J(.....(....X).....).....).....*....z*.....*.....*....t+.....,....{,.....,....--
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):869469
                  Entropy (8bit):4.677916300869337
                  Encrypted:false
                  SSDEEP:
                  MD5:12A9400F521EC1D3975257B2061F5790
                  SHA1:100EA691E0C53B240C72EAEC15C84A686E808067
                  SHA-256:B7FD85B33B69D7B50F6C3FDC4D48070E8D853C255F2711EEDAA40D1BA835F993
                  SHA-512:31EAA1CBF13BC711750B257C6B75813ACC8E4E04E9262815E399A88B96BA7B5BE64CE2450638B5521D5CB36750C64848944168C3234D2CE15A7E3E844A1E1667
                  Malicious:false
                  Reputation:unknown
                  Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....L.....n...................................I...........Q...........q.......................T.................E.......................7.....~...........<.................:.....&...........F.................X...........$.................Z...........X...........m.................C.........................................{...........:.....a...................................8................._...........O.....}...................................$.....h.........................................2.............................3 ....e .....!.....!.....!.....".....".....#....W#.....#....{$....-%.....%.....%.....&....k'.....'....T(.....).....).....).....).....*....`+.....+.....+.....,....p-.....-....&....../...../.....0.....0.....1....o2.....2....73.....4.....4.....4....-5.....5....X6.....6.....6.....7.....8.....9
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1118348
                  Entropy (8bit):4.2989199535081895
                  Encrypted:false
                  SSDEEP:
                  MD5:89A24AF99D5592AB8964B701F13E1706
                  SHA1:2177122C6DCC20E1D07EF43AF5A112E8E5C6B95B
                  SHA-256:5BDBBCD0D07B6AE3A7F96F07871EE541F4111D90D73FD6E112C5ABE040025C96
                  SHA-512:60F6CD73BF35886EF54FA6200F86BCED78DD11F612C8071F63EB31108F109C166D45609879E8E5107024A025BAFCFCF1C80051B6D8FF650D92DCF17136384EB1
                  Malicious:false
                  Reputation:unknown
                  Preview:........($..e.F...h.N...i._...j.k...k.z...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......#.....(.....0.....8.....=.....E.....L.....S.....Z.....[.....\.....a.............................=.....G...........?.....4...........................................................B.....}.....>...........k...........X...........].............................q.....W...................................W...........S...........e.............................I.....m.....e..........._.....(.................9...........q.................p...........5.....X.....8...........Q...........M...........I.....u.....-...........!.....G............ ..... ..... .....!....P".....".....".....#.....%.....%.....&.....'.....'....^(.....(....;).....).....*....6*.....+.....+....1,....],....E-................-/...../....x0.....0.....0.....1.....2.....2.....3...."4.....4....x5.....5.....6....78....*9....]9.....:.....;....;<.....<.....=....?>.....>.....>.....?....y@.....@.... A....&B.....B
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):537139
                  Entropy (8bit):5.397688491907634
                  Encrypted:false
                  SSDEEP:
                  MD5:37B54705BD9620E69E7E9305CDFAC7AB
                  SHA1:D9059289D5A4CAB287F1F877470605ED6BBDA2C8
                  SHA-256:98B2B599C57675EFC1456B38B23CE5657B142E0547F89AB1530870652C8EB4BA
                  SHA-512:42D667FEB59BB5FA619AC43DC94629ED1157CBE602643FB21378A2C524EF1F6E32098E7C62D3F3DE35D9FEDEF6607FE034908601AE3C49156CD0916E2514D2F9
                  Malicious:false
                  Reputation:unknown
                  Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....I.....c.....|................._...........[.....z...........O.................D...........(.....G.................B....._.................A.....T.................8.....I...........3.....u...........(.......................p.................,.......................1.................T.....o.............................v.......................b.......................@.......................@.......................O.......................<.............................`.......................P.........................................M.......................H......................._.........................................n.......................Q.......................[.............................1.................>.........................................6.............................|...........".....>.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):545011
                  Entropy (8bit):5.844949195905198
                  Encrypted:false
                  SSDEEP:
                  MD5:65A2C2A73232AB1073E44E0FB6310A5F
                  SHA1:F3158AA527538819C93F57E2C778198A94416C98
                  SHA-256:E9A1610AFFCA9F69CD651C8D2EDD71B5A0F82CB3910A8A9D783F68E701DB5BB0
                  SHA-512:20ED527F3BBBA2CECE03D7B251B19D6DCC9D345B5425291D8139FCDD5646EC34D585891160CC4BD96C668D18FFFFDD56F4D159880CFC0D538749F429F7F65512
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.&...i.....j.:...k.I...l.T...n.\...o.a...p.n...q.t...r.....s.....t.....v.....w.....y.....z.....|.....}.................................................#.....$.....%.....'.....7.....I.....[.....p.............................|.................%...........(.........................................3......................./.......................2.......................z...........I.....k...........R.......................v................./.......................z...........=.....W.................&.....=....................... .....o.......................^.......................r.......................m.......................b.......................z.................0...........%.....i.......................3.....G.......................(.......................1.................R................./.....J.....^...........A.....q.................`.................,...................................V.....w...........Z.......................O.....t.................b.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):496165
                  Entropy (8bit):5.446061543230436
                  Encrypted:false
                  SSDEEP:
                  MD5:A44EC6AAA456A6129FD820CA75E968BE
                  SHA1:9B5B17AFD57ADB8513D2DA9A72223E8A003975A5
                  SHA-256:F01F9C3E4E6204425F2969F77BF6241D1111CE86CDD169BDF27E5D2D4B86C91A
                  SHA-512:947DB81EA64009CC301CD2DCE06384202E56446F6D75E62390334B91D09B564CB0681E06BF7A945033BD6C28C2171346A91EE16693262C4E373A31B51AD42A9E
                  Malicious:false
                  Reputation:unknown
                  Preview:........,$..e.N...h.V...i.g...j.s...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.".....*...../.....7.....?.....G.....N.....U.....\.....].....^.....`.....n.....~.........................................Q.............................*.....q.................].......................P.....w.................8.....b.....p...........9.....h.................n.................7.......................^............................. .....p...................................q.......................X.......................1...............................................".............................{.......................Z.......................C.....p.....~...........y.................4.............................l.......................I.....f.....v...........^.................................................................F.......................B...................................O.....~...........J.....z.................$.....@.....M.................F.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):534726
                  Entropy (8bit):5.49306456316532
                  Encrypted:false
                  SSDEEP:
                  MD5:49CA708EBB7A4913C36F7461F094886B
                  SHA1:13A6B5E8DC8B4DF7A976A0859684DC0AA70F1B12
                  SHA-256:8AE7D6B77C51A4FE67459860ABDAE463F10766FAF2BA54F2BB85FD9E859D2324
                  SHA-512:6908F96BFDF7499B33E76697AA96103E89ACB3E25EDBD6156B610564AF14D4ED474C547A760503490B6327A801478E223039836BEEF2B938AF76827A15C0F751
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.~...h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.%...y.+...z.:...|.@...}.R.....Z....._.....g.....o.....w.....~.................................................................X.................E...................................^.....x...........n................./.......................Z...................................U.....w.............................h...........&.....7...........9.....w........... ................. ..........._.................D.......................U.......................h...................................a.....x...........f.........................................F.......................u...........).....;...........j.................A.......................;.......................9.......................t...........,.....`...........-.....K.....b...........G.....s.................}.................T...........,.....6...........S................./.......................K.......................t...........*.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):950999
                  Entropy (8bit):4.76377388695373
                  Encrypted:false
                  SSDEEP:
                  MD5:9CBC320E39CFF7C29F61BD367C0BF3BB
                  SHA1:2AF07EFFF54A0CF916CF1C0A657F7B7ADF2029FF
                  SHA-256:E8837DEFA908EB2FD8B4EB6344412C93403A4258F75EC63A69547EB06A8E53B3
                  SHA-512:F7D84185F4520E7AAF3F3CACF38B53E9638BB7D5023FA244020EC8D141FFD5C10B198FF089824D69671FE8350F931B0BB19B6CAF14AF47B0838953367A146DD0
                  Malicious:false
                  Reputation:unknown
                  Preview:........)$..e.H...h.P...i.X...j.b...k.q...l.|...n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...................&...........6.....=.....D.....K.....L.....M.....O.....v.......................5...................................V.................h...........F.....i...........~...........{...........a...........'.................&.......................M.....U.....O............................./.....J.....1..........._...........{.....6................. .............................g.......................<.................J...........8.....t.....O.....).......................U............................................................ ..... .....!.....!.....".....#.....$.....$.....$.....%....|&.....&.....'.....'....;(....t(.....(....M).....)....;*....h*....U+.....,.....,.....,.....-....8.....t...........f/....(0.....0.....0.....1....S2.....2.....3....64....Q5.....6....@6....A7....(8.....8.....8.....9.....:....o;.....;....[<....%=.....=.....=.....>.....?....6@
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):430665
                  Entropy (8bit):5.517246002357965
                  Encrypted:false
                  SSDEEP:
                  MD5:0F1E2BC597771A8DB11D1D3AC59B84F3
                  SHA1:C1F782C550AC733852C6BED9AD62AB79FC004049
                  SHA-256:E4798E5FF84069C3BFD7D64734CCD9FF5C8A606315B44A714ACDCABDDAF3CA6E
                  SHA-512:07E9B98357C880995576059AD4E91E0F145DC0F2FFF2DFDAD8649FA42EB46FA86F7F093503C41019EAD4550784E26C553D171518355FBBF995E38B1F6D7ABFF0
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$ .e.(...h.0...i.>...j.J...k.Y...l.d...n.l...o.q...p.~...q.....r.....s.....t.....v.....w.....y.....z.....|.....}.....................................%.....,.....3.....4.....5.....:.....G.....V.....f.....w...........J.......................H.....y.................I.......................@.....o.......................?.....M............................._.......................B.......................8.............................[.......................*.....V.....a...........*.....l............................. .....^.............................A.....b.....n.................H.....[.......................+.....t.......................5.....y.......................:.....c.....n...........'.....d.....y.................).....?.............................G.............................].......................4.....O.....^.................6.....F.................#.....;.................V.....d...........$.....[.....x.................F.....U.............................k.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):434598
                  Entropy (8bit):5.509004494756697
                  Encrypted:false
                  SSDEEP:
                  MD5:FEAB603B4C7520CCFA84D48B243B1EC0
                  SHA1:E04138F1C2928D8EECE6037025B4DA2995F13CB4
                  SHA-256:C5B8FBDBB26F390A921DCACC546715F5CC5021CD7C132FD77D8A1562758F21F4
                  SHA-512:E6B3970A46D87BFD59E23743B624DA8116D0E1A9912D014557C38FD2664F513E56317AFA536DF52E7E703863FBD92136BE57EE759A2FFC2958AB028F6287E8B7
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.,...y.2...z.A...|.G...}.Y.....a.....f.....n.....v.....~.................................................................G.......................\.......................Q.......................T......................./.....t.......................7.....^.....k.................".....9.................!.....9.............................i.......................7.......................!.............................K.....f.....u.............................Y.............................k.......................G.....t.......................7.....B.............................J.......................$.....~.......................^.............................=.....R.............................q.......................X.............................X.......................7.....o.................X.......................k.......................a.......................!.....C.....S.................,.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):524728
                  Entropy (8bit):5.377464936206393
                  Encrypted:false
                  SSDEEP:
                  MD5:32A59B6D9C8CA99FBD77CAA2F586509A
                  SHA1:7E8356D940D4D4CC2E673460483656915AA59893
                  SHA-256:AA4A5AA83DD5F8476867005844F54664DB1F5464A855EF47EC3A821DAF08E8F2
                  SHA-512:860BA06228BBA31EEC7EB8BD437DDB6E93BABD0129033FB6EFF168F2FB01B54E2B93D2AB50A5D4F5D2FB7B04A5D0DD5541999D708CC2613B74AADD17B3E98735
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....j.....|.......................J...........>.....Y...........1.....v..........."...................................L.....g.................4.....G.................,.....=...........7.....}...........6...................................6.....I.................\.....s..........._.................Z...........2.....Y.......................:.......................".......................0.................R.....e...........).....g.....s.................P.....[.................4.....>.................L.....\...........O.................!.....v.................+.....x.................i.................:.................2.......................!.......................0.................I.....c...........x.............................B.....p...........V.......................G.....j.....}...........n.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):523181
                  Entropy (8bit):5.356449408331279
                  Encrypted:false
                  SSDEEP:
                  MD5:3D1720FE1D801D54420438A54CBE1547
                  SHA1:8B1B0735AE0E473858C59C54111697609831D65A
                  SHA-256:AE32D66C0329104B9624BA0811FE79149D1680D28299440EC85835DBA41C7BD2
                  SHA-512:C033BBB5261EC114DCB076EDB5E4B3293F37D60C813674A947F996606A6289204C04D2E4315356D92EEEB43FF41D534997DBEBBF960B17F2F24AA731AFE4B7E1
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.p...j.|...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.+.....3.....8.....@.....H.....P.....W.....^.....e.....f.....g.....i.....|.......................O...........G.....b...........D.................0........... .....:.................Y.....t.........../.....^.....n...........0.....X.....i...........c.................W...................................I.....Z...........*.....f.....{...........o.................g...........+.....P.................8.....N.................".....1.................*.....@.................?.....R.................;.....G.................%.....0.............................y...................................D.....^.................@.....].................5.....T...........;.....`.....s...........h.................M.......................A.......................W.............................&.................)...................................A.....U................. .....3.................D.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):475733
                  Entropy (8bit):5.456553040437113
                  Encrypted:false
                  SSDEEP:
                  MD5:C00D66D3FD4FD9D777949E2F115F11FB
                  SHA1:A8EAAD96CABCDFB7987AF56CB53FA5E16143EC48
                  SHA-256:26C438935E3F666329EE8D1DABA66B39179BCF26EBAC902F9B957A784BDC9B4A
                  SHA-512:E7E8C083B556DD05874AC669B58A4D1CD05D1E1B771EB4C32942869E387C6FA2B317B5F489138BD90135117DAEB051D96A7823B531DF0303BD4245A036F25A20
                  Malicious:false
                  Reputation:unknown
                  Preview:........@$y.e.v...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................S...........J.....e...........4.....d.....w...........Y.......................u.......................m.......................\.......................[.........................................7.......................;.......................K.......................x...........;.....R.................9.....T................. .....,.............................w...........#......................./.....=.................'...../.................".....1.................$.....,.................O.....g.................4.....J.................,.....O.................4.....A.................=.....i.................&.....7.................#.....;.................?.....Z...........U.................C...................................@.....M...........................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):773397
                  Entropy (8bit):5.04618630633187
                  Encrypted:false
                  SSDEEP:
                  MD5:C998140F7970B81117B073A87430A748
                  SHA1:8A6662C3AABDAC68083A4D00862205689008110C
                  SHA-256:182F18E4EFCA13CA59AFD1DF2A49B09733449D42526EE4700B11A9C5E6AAC357
                  SHA-512:5A947A44F674F9556FDD44D2E4FF8CF0E0AAC4475FFA12480CA1BD07CFE7514961B7CACE6760189432B4B4BEB5EA5816701158EB3CB827A806F3063853C46D5E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.#...s.4...t.=...v.R...w._...y.e...z.t...|.z...}...............................................................................-.....T.....9.......................^...........u..........._.............................H.................a...........S.....f...................................?.................j..........._.............................'...........f.......................I.......................v.............................Q.....u...........}.................S...........).....@...........x.................m...........M.....d...........p.................H.................:...........`.................`...........l...............................................s...........C...........0.....P.......................;...........1 ....V ....q ....+!.....!....'"....I"....."....|#.....#.....#.....$.....%.....&.....&....j'.....(....l(.....(....W).....)....M*....p*.....*....n+.....+.....+....d,.....-....P-....x-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):483378
                  Entropy (8bit):5.428549632880935
                  Encrypted:false
                  SSDEEP:
                  MD5:1CFD31A6B740D95E4D5D53432743EBF1
                  SHA1:20CEEEA204150BD2F7AAE5866C09A3B0AE72D4C5
                  SHA-256:F821E06B4BACD9E7660A2D6912A049591FFD56C6D2A0A29B914648589B17B615
                  SHA-512:C483B7347F91BE8EE515DCF352A1D7502B9A159EDE35EACCEBAA763B93A625BCE2D0C7D598C2A6111092257D6DAC7A167102E956697210D4694B9812D70C8A94
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.%...v.:...w.G...y.M...z.\...|.b...}.t.....|.....................................................................................................^.....q...........7.....j.....}...........Z.......................~.......................s.......................D.....d.....t........... .....F.....`...........C.......................Q.....}.................S.......................T.........................................E.............................k......................./.....P.....\.................).....3.............................p.......................L.......................0.......................%.......................B.............................g.......................e.......................d.......................M.....d.....s...........*.....T.....f...........".....[.....u...........x.................I.......................Y.......................4.....v.......................S.....~.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):546749
                  Entropy (8bit):5.197094281578282
                  Encrypted:false
                  SSDEEP:
                  MD5:6EDA0CD3C7D513AAB9856EC504C7D16F
                  SHA1:BA24C4B994E7866F2C012CCEC6C22DFC1A4FCFF6
                  SHA-256:3CD2BC9E887663C5E093E0334BC60CF684655A815E3DE7AD9A34BAD5EBB858B1
                  SHA-512:47000F5EA882CB9EDDCF4FB42ED229423EE55AA18B4A4353D7EF85ADFA7E1B0BBB33C2469887224D7146B3E33FB2296749CD053D68D7DAF26980BC710A27C63E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.@...h.H...i.^...j.j...k.y...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......!.....&...........6.....>.....E.....L.....S.....T.....U.....Z.....g.....|.................K...........:.....X...........O.................Q...........>.....e...........Z.......................~.................%.......................h.................H...........^.................M.................!.................H.....b...........].................V...........B.....d...........#.....N.....k.................A.....N.................,.....;.................S.....i...........5.....k.....z...........=.....o.....}...........>.....o.....}...........@.....r...................................R.......................L.......................<.......................e.................U.................F.....`...........>.....q.........................................%.................4.................4.................J.....b.................B.....X...........N.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):568277
                  Entropy (8bit):5.380723339968972
                  Encrypted:false
                  SSDEEP:
                  MD5:D185162DF4CAC9DCE7D70926099D1CF1
                  SHA1:46594ADB3FC06A090675CA48FFA943E299874BBD
                  SHA-256:E40C07183A32B75930242F166C5AAE28F4CD769BB2268391BEAA241814E7D45A
                  SHA-512:987D9CC6AD5F2ED6A87537FDADF105F6EB31A97B11156E70814FE021047E5D8D08398F008812038DF3CCDCB6254BF5B744D9982FE04F79D407AC2F53BB046E25
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e. ...h.(...i.9...j.E...k.T...l._...n.g...o.l...p.y...q.....r.....s.....t.....v.....w.....y.....z.....|.....}..................................... .....'.........../.....0.....2.....B.....P.....b.....q.................6.....X...........?.................'.................(.................W.................4.....`.....p...........D.........................................{...........(.....L...........*.....i.....{...........S.........................................}...........i.................N.......................H.....r.................N.......................f.......................}.......................x.......................e.......................d.................+.................&.......................8.....~.......................k.................0...........;.......................f.........................................d.................6...........4................."...................................R.....k.................G.....[...........G.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1103776
                  Entropy (8bit):4.336526106451521
                  Encrypted:false
                  SSDEEP:
                  MD5:44F704DB17F0203FA5195DC4572C946C
                  SHA1:205CBCC20ADCCCF40E80AA53272FBA8CD07389CA
                  SHA-256:4B073F08F0C8C035974B5EC43AA500F8BDD50E6CFE91A2FB972A39E0F15ECEDD
                  SHA-512:3CFD4501556845141EE9B461C831CA59779AD99F0E83E8D03433DE78D774378E87DE752DD9711C112A0C584259AD1DA6DC891D92F3F447F63A4D84263CD5BFCE
                  Malicious:false
                  Reputation:unknown
                  Preview:........4$..e.^...h.f...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.#...|.)...}.;.....C.....H.....P.....X.....`.....g.....n.....u.....v.....w.....|.......................&.....b....._.....0.....l....._..... ...............................................a.......................G.................r...........\.....|....._...........z.......................V...........n.....B...................................7.....4...../.......................".......................4.....p...........P...........E.....m.......................................................................'...........}.......................C.................j .....!....u!.....!.....".....#....\$.....$....K%.....%....R&....{&.....'.....'.....'.....'.....(....b).....).....*....'+.....+....t,.....,.....-....9.....|............/....W0.....0.....0.....1.....2....33....f3.....4.....5.....6.....6.....7.....8....<9.....9....|:....H;.....;.....;.....<....s=.....=.....=.....?.....?.....@
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):681555
                  Entropy (8bit):4.658620623200349
                  Encrypted:false
                  SSDEEP:
                  MD5:E75086A24ECAA25CD18D547AB041C65A
                  SHA1:C88CE46E6321E4A21032308DFD72C272FB267DBD
                  SHA-256:55BE8A5ED9FB9C129AC45B7FC99574B9907350AFD024BAA5D07525F43E995F6B
                  SHA-512:01D7FDD90B8D0D3779B8442250E2AA767481B2E581F880BF9C3DCBB15FCE52E477B1881F3704FBCB3172DB77DB10241BCB24851BFE30066D1E9B66244B3C6877
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.'...k.6...l.A...n.I...o.N...p.[...q.a...r.m...s.~...t.....v.....w.....y.....z.....|.....}.........................................................................+.....D.....].....z.....?...........~...........).............................O.................T...........#.....E...........:.......................w.................W................./...........F.................V...........5.....T...........K.................3.............................o...................................E.........../.....a.....t.............................z...........,.....?...........5.....v.................q.................5.......................r.................1...........X.................I.......................y.................$.................k...........).................!.......................#.................7.....P...........e.......................e.............................w...........W ..... ....$!....K!.....!....7"....g"....."....@#.....#....-$
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1167065
                  Entropy (8bit):4.308980564019689
                  Encrypted:false
                  SSDEEP:
                  MD5:1FF8A0B82218A956D2701A5E4BFA84EF
                  SHA1:56BB8218963E14ADCC435F2455891F3A0453D053
                  SHA-256:62E7C3ABC317931723BE11ADD3712DD15EAAB0A35A4D8E7DB0B6347104EC5733
                  SHA-512:3330D983401953AA5ED4856A8D10FFCBEEFC2A4E594CF850566A0AD38837BC1164870BB1270B6BBE5D7DD6FB1ECA29CDE85869A5C51808B901CDC282E04764E4
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.%...n.-...o.2...p.?...q.E...r.Q...s.b...t.k...v.....w.....y.....z.....|.....}...............................................................................?.....j.............................................../.....j.........................................N.....}.....P...........^...........F...........A.....d.....K...........N.............................L.....&...........V...........f...................................L.....~.................{.................A.................y.....*.....}...........;...................................*.....[.................,.....K...................................j ..... ..... .....!....J".....".....".....#.....$....T%.....%....@&.....&....8'....d'.....'.....(.....(.....(.....)....6*.....*.....*.....+.....,.....-....c-......................%/.....0.....0.....1.....1.....2....i3.....4....B4.....5.....6.....7.....7.....9.....9....S:.....:.....;.....<....F=.....=.....>....N?.....?.....@.....@.....A....LB
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):526575
                  Entropy (8bit):5.518614920030561
                  Encrypted:false
                  SSDEEP:
                  MD5:0BD2F9847C151F9A6FC0D59A0074770C
                  SHA1:EA5313A194E9D99489E9F1D7B4DFC0BC986C8E17
                  SHA-256:5F2F1AA2E2EC78F375084A9C35275E84692EE68A1E87BBEF5A12A2C0FCF7F37A
                  SHA-512:0032C0B41FDF769DAA1AF23C443D4195B127DF9EA8621174F1AABDBAFAE4954383095FA1EEAD14FC458188B8837BBE9AECA0D5338E4D47F10D976FBED8609496
                  Malicious:false
                  Reputation:unknown
                  Preview:........F$s.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.)...y./...z.>...|.D...}.V.....^.....c.....k.....s.....{.................................................................k...........Y.....z...........F.....~...................................e.......................y.......................m.......................l................. .................q................._.........................................A.............................4.......................j.......................D.....f.....w.................*.....:.................4.....I.................&.....5.................8.....M................. .....0.........................................S.....n.................0.....M.......................3....................... .................E.....v...........!.....F.....\...........).....[.....t...........U.................M...........(.....:...........".....`.................G.....v.................$.....B.....T...........0.....n.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):566819
                  Entropy (8bit):5.6387082185760935
                  Encrypted:false
                  SSDEEP:
                  MD5:4C27A1C79AB9A058C0A7DFFD22134AFD
                  SHA1:5F0A1B34E808B91ADB1E431E462D9FCF82F4FFF2
                  SHA-256:AD98C0A367B51EB217E69D66FA6A946946E85EC8452FC5A7AE0F179F35BE28C3
                  SHA-512:0F066DB5905EB24B6CB4FBC7C81F017B43AFB7A6E975886644D871E979406B990509905D100653496EE2D20969A77434B702FF1EA5D348274AE54EA597A91D5E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.!...j.+...k.:...l.E...n.M...o.R...p._...q.e...r.q...s.....t.....v.....w.....y.....z.....|.....}.........................................................................+.....A.....V.....j.................9.....W...........N.................*.................*...........".....X.....q...........K.....r.................Y.................?................."...........I.................7.......................k...........'.....7...........:................./.................:.................Z.....w...........O.....v.................f.................5.................(...........2.....u...................................M.................0...........6.....x...................................m.................)................. .....I.................O.....g...........c.................O.......................E.......................r...........'.....H...........v.............................l...........7.........................................5...........& ....q
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):466959
                  Entropy (8bit):5.379636778781472
                  Encrypted:false
                  SSDEEP:
                  MD5:1466C484179769A2263542E943742E59
                  SHA1:18E45A08661FD6D34BADE01CDB1E1D5184BA2B67
                  SHA-256:C331293D16B16B08DEF73BE73437845D58C593941320C547A377DB423749AEBB
                  SHA-512:ABC54D5CAAA663578F064E43CC0465BEB97EFC46991936708EBF3FCD64BD007E47072AB4834A5361B21F064BB0F6527E247BC2C2F0DFB8336F50C2FF3E15A59C
                  Malicious:false
                  Reputation:unknown
                  Preview:........ $..e.6...h.>...i.O...j.[...k.j...l.u...n.}...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................'...../.....6.....=.....D.....E.....F.....H.....V.....c.....s.................k................. .....l.......................l.................-.......................0.............................R.....s.................I.....x.................T.......................@.....j.....w.................L.....Y.................Z.....m...........H.......................%.....@.....Q.............................c.......................<.......................#.....t.......................L.....x.................%.....R.....^.................>.....K.................5.....G.............................J.......................".....h.......................L.....}.................#.....=.....K.................+.....:.................2.....K...........C.......................u.................,.....|.......................C.....b.....r...........1.....h.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):522800
                  Entropy (8bit):5.284113957149261
                  Encrypted:false
                  SSDEEP:
                  MD5:7767A70358D0AE6D408FF979DF9B2CD4
                  SHA1:9C57A5B068DC12AAF1591778DEF5D3696377EDAB
                  SHA-256:672908E77E9EACA793654C8E630442099DE3BE772FD3230A9C4045CAFBCC0B1E
                  SHA-512:913AA8C49D04CD84706D08A88453D1ED36FDE6A00F7C1DF63DECEA99316A8A234924457C0C50937329B3979E437B1C2D7796E63ADF209505E212FDCEAE3BFDB5
                  Malicious:false
                  Reputation:unknown
                  Preview:........-$..e.P...h.X...i.i...j.u...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.$.....,.....1.....9.....A.....I.....P.....W.....^....._.....`.....b.....u.......................E...........3.....O.................V.....g..........._.................o...........#.....L.............................k.......................n.................2...........*.......................w.................5.......................R...................................c................./.....[.....y.................=.....K.............................x.................*.............................`.......................4.............................^.........................................B.............................F.....\.....r........... .....L.....a...........=.......................b.......................8.....c.....v...........[.................c...........S.....j...........d.................[.................).....v.......................X.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):634636
                  Entropy (8bit):5.718480148171718
                  Encrypted:false
                  SSDEEP:
                  MD5:4A4AF69546DCF65F2D722A574E221BEA
                  SHA1:EE51613F111CF5B06F5605B629952EFFE0350870
                  SHA-256:7AD195AF107F2A394BAB527C3E84E08F3B7748076F23459F084CF0E05DD29655
                  SHA-512:0E93F6B22F7C9176EFC9D49901BFBD281FA5AC3632780DFA76CE597CADD8C1CF570A9163A86BC320BBFBD354F48288DBEC5E36A6088999B00A3561D302A96D03
                  Malicious:false
                  Reputation:unknown
                  Preview:........n#K.e.....h.....i.....j.....k.....l.....m.....o.%...p.2...q.8...v.D...w.Q...y.W...z.f...|.l...}.~...............................................................................................6.....W...........}.................l........... .....8...........c.......................B.................W.......................x...................................7.....V...........e.................=.......................].......................{...........#.....2...........y.................`...................................<.....W...........j.................y...........e...................................h...........(.....:...........%.....a.....p...........{.................}...........m..................................._...................................Z.....x.............................o...................................:.....U...........*.....d.....z....."...........*.....?...........X.................`.................@.................g............ ..... ..... .....
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1256908
                  Entropy (8bit):4.247594585839553
                  Encrypted:false
                  SSDEEP:
                  MD5:6A41A5AB03A22BDAEC7985B9A75EC11A
                  SHA1:6BB02DF557BD6522E02FE026C0243BEB9332B2E5
                  SHA-256:E22873652AC7D9D18E47DAE838D121B5644EDA4C67F7B0BC110733BF7E931FEA
                  SHA-512:BCA661D802D29463A847AC77EB8D5DFA41C31455E7314049CA26555957DCA3BE33701C074F7ED26D2C375A0A9C5F8A93461007B8D74F5ED3BD27C02E5DB170A5
                  Malicious:false
                  Reputation:unknown
                  Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}.................................................................W...........".....V.....W...................................n...........b............................._.......................<.....)...........s.......................).............................1.....7...................................[.................................................................*.....u...........f...........K.....^........................ ..... .....!..../"....i"....=#.....#....r$.....$....I%.....%....l&.....&....p'....((.....(.....(.....)....N*.....*.....*.....,.....-.....-................./.....0....W0.....0....z1.....1.....1.....2....Y3.....3.....4....@5.....6.....6.....7.....8.....8.....9....V9.....:....R;.....;....1<.....=....B>.....?....]?.....@....DB....BC....wC.....D.....E.....F....$G....\H....AI.....I....4J.....K.....K.....L....PL.....M....lN.....O
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):532715
                  Entropy (8bit):6.0824169765918725
                  Encrypted:false
                  SSDEEP:
                  MD5:5FD9942F57FFC499481947DB0C3FDFA7
                  SHA1:4D60AB21305902877467FF6151C1B7AB12553AAE
                  SHA-256:09E279860E20E9E559945940E29446CAD4273D05C5F3F15D0BAD664A1D5749F2
                  SHA-512:97953E580588C07769F1BD0002E2DF648FFCE5B246D2359E4475EDCFA1CD6E7286BAF168A115D7A65686B2151C313B6FD0C271E40B1F9DD4132F2F39904FE8D4
                  Malicious:false
                  Reputation:unknown
                  Preview:........O#j.e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s.....t.....y.#...z.2...|.8...}.J.....R.....W....._.....j.....r.................................................................].................5.................O.....b...........F.......................p.................'.......................,.......................;.......................L.......................e.......................Y.......................X...................................Q.....h.................>.....U................. .....0.........................................-.....I.................A.....Q.................L....._.................K.....[.................J.....Z...........O.......................Z.....{.................U.....}.................`.................%.......................J.............................h.......................\.................+.......................m.........................................'.............................x.........................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):573015
                  Entropy (8bit):5.63016577624216
                  Encrypted:false
                  SSDEEP:
                  MD5:8745B87D09D9ECC1112C60F5DD934034
                  SHA1:2F411E4EEF0E656CAC0C755FECE1AD2531CB689E
                  SHA-256:D546C994C81510122E7B2359DA50F694E1F0CA4081830404E16187A5CF4D4E0D
                  SHA-512:27B658C153A01AABB9595C5B1059567E535EDFC8F8187B89316D2C85694DE32696D209CFDD2A32C4826DFB1E50AC692937156563EE190E68DB358C40F9AAE15F
                  Malicious:false
                  Reputation:unknown
                  Preview:........+$..e.L...h.T...i.e...j.q...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}. .....(.....-.....5.....=.....E.....L.....S.....Z.....[.....\.....^.....l.....y.................4...........".....=...........S.................M...........'.....A...........8.....p...................................A...................................B.....g...........z.................R...................................;.....K...........c.................T...........2.....P...........2.....Y.....t...........W.........................................E...................................D.....S...........Q.........................................S.............................B.................&.......................t...........1.....Y...........K.................+.........................................'...........N.................A.................,...........q.................d...........&.....F...........x.................(.......................H ..... .....!
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):570683
                  Entropy (8bit):5.624052036286866
                  Encrypted:false
                  SSDEEP:
                  MD5:E16B0B814074ACBD3A72AF677AC7BE84
                  SHA1:10744490B3E40BEB939B3FDCA411075A85A34794
                  SHA-256:46B5C09AA744AF0F660C79B0CDBDE8C8DBDD40A0BA1A23AAF28D37ECC4211DC5
                  SHA-512:70EA9DFAC667C0992AE0E95815A47EB8E779BAAE1215E733AFE84EEE26D3BA754AD838C12E9AEE3114D7BBE11CD21B31C550F5CAFE6C5E838B69E54C6174EF18
                  Malicious:false
                  Reputation:unknown
                  Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}...................................................................................Z.................G.................%...........Z.................F.................6.................Q.....\...........Q.........................................|.....#.....t...................................W.................0...........T.................B...........8.....Y...........$.....J.....`...........-.....V.....h...........;.....b.....v.............................G.......................r.........../.....>...........'.....Z.....k...........c.................@...........3.....K.................).....>...........=.....t.................c.................(.................2.......................8...........<.....q.........................................:.................8...................................N.....^...........0.....K.....m............ .....
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1307271
                  Entropy (8bit):4.279854356980692
                  Encrypted:false
                  SSDEEP:
                  MD5:309E068B4E15157486D095301370B234
                  SHA1:D962CDAF9361767045A928966F4323EAD22D9B37
                  SHA-256:4F2C19B7E94B695C5C5CAB95DEE6E49AE53C3337C351B5C665BCB6BA4E6AE909
                  SHA-512:6B1333946C7950D97D2DF29D063DB39A0EC5C0EEAA1ECA40743E4A6A0E4C972D897D3FF2BA837B53E31B8003F2C5C4BACCB7A4AB4B50C6CB47DF39AD7B8E05E7
                  Malicious:false
                  Reputation:unknown
                  Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.,...w.9...y.?...z.N...|.T...}.f.....n.....s.....{...........................................................$.....d.................Z.....C.......................W...........%.....r.....a.......................}.................n...........................................................I.................m.......................l.......................5.....y.............................^.............................j.......................|............ ..... .....!.....!....*".....#.....#....V$.....$....n%.....&.....&.....&.....'....n(.....(.....).....*.....*....W+.....+....c,....+-.....-.....-...........0.....0.....1.....1.....2....!3....Y3.....4.....4.....5....T5....06.....6.....7.....7.....9.....9.....:.....;.....;.....<.....=....Z=....|>....s?.....@....T@.....A....UB.....C....SC.....D.....E....yF.....F.....G.....H.....I.....I....-K....(L.....L.....M.....N.....N....eO.....O.....P.....Q.....R
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1075591
                  Entropy (8bit):4.313573412022857
                  Encrypted:false
                  SSDEEP:
                  MD5:69C36C23D6D9841F4362FF3A0F86CFDF
                  SHA1:C4C1F632EB8373107AEEBD6C26ECF036AEDA2B6B
                  SHA-256:6A794C2B08F8B046BE771DF33719536BDAF2371E3825D49A0E556958B781832D
                  SHA-512:8C1329BDB371677BC0A9D727A38591EDF32025BAE1E7EFE402D01C6A8BB5F647D827C59A18F40455D5C9C0482798525C98C3F1C8AC568AA886D7C1ED07D1580E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i."...j.....k.=...l.H...n.P...o.U...p.b...q.h...r.t...s.....t.....v.....w.....y.....z.....|.....}.........................................................................@.....b.................%.....]...........W.................J.............................:.....@.....=...................................&.................&.....F.....P.......................h...........o...............................................c...................................R..........._.................i...............................................J.................. .....!.....!....(".....#.....#....O$....{$....B%.....&....c&.....&....F'.....(...._(.....(....R).....*....y*.....*.....+.....-.....-................./...../...../.....0....61....l1.....1....Z2.... 3.....3.....3.....4.....5.....6.....6.....7.....8.....9....E9....u:....n;.....;....@<.....=....O>.....?....5?.....@.....A.....B.....B....MD....WE.....E....eF....nG....LH.....H.....H.....I.....J.....J.....K....5L....)M.....M
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):489457
                  Entropy (8bit):5.250540323172458
                  Encrypted:false
                  SSDEEP:
                  MD5:A1253E64F8910162B15B56883798E3C0
                  SHA1:68D402D94D2145704DC3760914BF616CC71FC65D
                  SHA-256:E033BFAD6CD73EA7B001DFAF44B7102E3BBE2A1C418F005C149E4FB2565DB19F
                  SHA-512:ABD63713093049ECC8E24FD8145EAE065340058A3C38758A59EE8796FBED7E6CFBC54982D650889F1CEB54797060C7DDA12EEE2A963B14C5E907A110C2057DBE
                  Malicious:false
                  Reputation:unknown
                  Preview:........T$e.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v./...w.<...y.B...z.Q...|.W...}.i.....q.....v.....~........................................................................................._.....{...........:.....n.....~...........\.................#.......................=.......................1.......................3.......................Y.................*.....z.......................W.......................E.......................b.........../.....A.............................N.......................$.....x.......................r.......................z.......................p.......................^.......................Q.......................r.................!.....s.......................S.....w.................6....._.....p.................T.....w.......................#.......................$.................2.....K...........B.......................s.................,.............................P.....r.................0.....].
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):476208
                  Entropy (8bit):5.4272499712806965
                  Encrypted:false
                  SSDEEP:
                  MD5:622ED80836E0EF3F949ED8A379CBE6DF
                  SHA1:9A94CD80E747B88582470EF49B7337B9E5DE6C28
                  SHA-256:560B2F09C1B6E6BB7E6A5A5F9BF85A88BD2ACA054B7D4A5955D9C91B6D7CA67C
                  SHA-512:950627E74180E1451BB35AE4A7416AC14D42D67BBBB59DC51D7B69E4CEB61715F8F9B0EB9D7F35FCEFD4D43FABE5CE2103F1AF3709CAE6733C25AC19E6339A83
                  Malicious:false
                  Reputation:unknown
                  Preview:........2$..e.Z...h.b...i.y...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.....}.......................N...........A.....V.................X.....k...........z.................K.......................L.......................:.......................;.......................g................./...........<.........................................R.................1...........Q.......................\.....u.................1.....V.....f.................9.....I.................H.....\.................J.....Z...........".....T.....d.................@.....P.................<.....J...........4.....y.................B.....h.....{...........&.....E.....^.................-.....?...........,.....k.................V.....|.................b.......................i.................&.......................s...........9.....b...........*.....V.....i.................".....0.................).
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):491139
                  Entropy (8bit):5.362822162782947
                  Encrypted:false
                  SSDEEP:
                  MD5:C8378A81039DB6943F97286CC8C629F1
                  SHA1:758D9AB331C394709F097361612C6D44BDE4E8FE
                  SHA-256:318FB294CE025BDA7636B062CA7B6A1FB1E30C485D01856159CB5DB928782818
                  SHA-512:6687FFE4DE0D5A2314743EB3134096292724163D4E0332D2F47922B4807B0CDE7C20E2D57D2662E403D801BC7A20BC247F5D0EDD787AB650E5766B49AF7D3C63
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.*...h.2...i.C...j.O...k.^...l.i...n.q...o.v...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................#.....*.....1.....8.....9.....:.....<.....H.....X.....i.....{.............................X.......................|...........4.....J.................M.....d.................8.....G.......................).................8.....Y...........1.....h.................F.....{.................U.........................................\.................4.............................Y.......................-.....~.......................}.......................v.......................V.......................5.....a.....n...........*.....^.....m...........I.......................X.......................>....._.....v...........,.....T.....f...........8.....o.................=.....[.....o...........3.....e.....v...........H.....................................................E.....j...........5.....f.....{.................B.....R.................B.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):550453
                  Entropy (8bit):5.757462673735937
                  Encrypted:false
                  SSDEEP:
                  MD5:80C5893068C1D6CE9AEF23525ECAD83C
                  SHA1:A2A7ADEE70503771483A2500786BF0D707B3DF6B
                  SHA-256:0069648995532EFD5E8D01CC6F7DD75BD6D072E86C3AE06791088A1A9B6DACC4
                  SHA-512:3D1C41A851E1CF7247539B196AD7D8EE909B4F47C3CFB5BA5166D82CDA1C38049B81A109C23FA6D887490E42EE587CC2A6BD96A3EA890267C089AC74710C755F
                  Malicious:false
                  Reputation:unknown
                  Preview:........6$..e.b...h.j...i.{...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.............................X...........S.....o...........=.....w...................................i...............................................z.................$.................1.....W...........M.................*.......................@.......................l...........0.....L...........].................9.....v.......................E.....h.....x.................,.....:.................<.....P.................>.....P.................6.....F.......................-.........................................e.....}.................4.....K.......................;.................+.....@.................a.................+.....I.....`.................9.....U...........2.....}...................................w...........'.....R.................9.....J.............................v.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):516256
                  Entropy (8bit):5.426294949123783
                  Encrypted:false
                  SSDEEP:
                  MD5:3BA426E91C34E1C33F13912974835F7D
                  SHA1:467A1B05BAD23252A08EE22E6B9EBB4404F6A0F0
                  SHA-256:CB66D88D3B3938FE1E42C50ECB85CEDB0D57E0F0AB2FA2A5FC0E4CDEA640E2B7
                  SHA-512:824A4301DC4D935FF34CE88FAA0354440FC1A3A8E79B0F4B0B2DCC8F12542ECEF65828FB930EDF5B35BF16863296BBAE39E9306962B4D3CFA9F6495AC05BDEF4
                  Malicious:false
                  Reputation:unknown
                  Preview:........9$..e.h...h.p...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.$...|.*...}.<.....D.....I.....Q.....Y.....a.....h.....o.....v.....w.....x.....}.............................d...........L.....h.........../.....h.....x.............................w.................(.....y.......................^...................................:.....j..........._.................:......................._...................................K.....d...........p.................5.............................q.......................n.......................w.......................p.......................O.....}.................).....W.....a.................V.....g...........b................. .....j.......................;.....a.................=.....U...........N.................2.....W.....p...........8.....p.................S.................@.................0...........1.....{.................X.......................0.....V.....k...........C...................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):518861
                  Entropy (8bit):5.4029194034596575
                  Encrypted:false
                  SSDEEP:
                  MD5:4D7D724BE592BD0280ED28388EAA8D43
                  SHA1:8E3C46B77639EB480A90AD27383FBB14C4176960
                  SHA-256:4724D82866C0A693C2B02D1FFA67D880B59CDB0D3334317B34EC0C91C3D3E2A2
                  SHA-512:D05388F66C50E039F7D3393515740F6B2593F9C0EF8651F9CDE910C5FF06656E0D22FDB066B22665289EE495837EA16CC085ECB3F85B0F6FB498AECDAA19ADF7
                  Malicious:false
                  Reputation:unknown
                  Preview:........I$p.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v."...w./...y.5...z.D...|.J...}.\.....d.....i.....q.....y.......................................................................u...........Z.....u...........@.................).................$.................S.....w.................D.....T.................(.....:...........(.....j.................x.................H.......................g...................................9.....N...........D.......................p.......................^.......................a.......................q.......................r.......................U.............................[.....e.................P.....a...........?.......................O.....y.............................?.................0.....J...........#.....p.................9.....c.....u...........#.....Y.....n.........../.....}...............................................G.....k...........N.......................B.....g.....|...........J.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):537125
                  Entropy (8bit):5.4566742297332596
                  Encrypted:false
                  SSDEEP:
                  MD5:4F1C0A8632218F6FEF6BAB0917BEB84F
                  SHA1:05E497C8525CB1ADE6A0DAEFE09370EC45176E35
                  SHA-256:9C19835F237B1427000D72C93703311CFCBEFF6C2B709474B16DB93E629BC928
                  SHA-512:A7CDF94F79CD888BB81FD167F6B09BF1BEF2C749218869E5A12A0A3B2C2506D1A63F64B63D8E48EA49375636041C639082563BF9D526FE44003FC5A5E8D50E9D
                  Malicious:false
                  Reputation:unknown
                  Preview:........0$..e.V...h.^...i.o...j.y...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.(.....0.....5.....=.....E.....M.....T.....[.....b.....c.....d.....f.....u.......................3.................+.................%.....9...........@.................1.......................Q.......................4.......................C...................................>.....b...........@.......................d.........................................p...........@.....n.................+.....H.............................h.......................M.......................J.......................7.............................].......................E.....t...................................?.............................W.....w.................\.................).......................f.......................W.........................................'...........$.....y...................................f.......................j.......................l...........+.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):878725
                  Entropy (8bit):4.848685093578222
                  Encrypted:false
                  SSDEEP:
                  MD5:3A3D0D865A78399306924D3ED058274E
                  SHA1:AA1A42DB6021666B2297A65094D29978792CE29B
                  SHA-256:EAB4C32FEBE084CC7A3A272CDA008B69D6617ED6D042376B0316BE185B9E66FE
                  SHA-512:ACA8C87D0B2BB35A325726F7774F8A0232B99C8EFE0F948AB68210958E23B95E9D9026A9430D96FC2D5CEBA94815F4217896EF877C9A6E1D0E56F73533FB1D12
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#/.e.....h.....i.#...j./...k.>...l.I...n.Q...o.V...p.c...q.i...r.u...s.....t.....v.....w.....y.....z.....|.....}.........................................................................9.....V.....n...........V.......................g...........i...........l.....).................g...........,.....f.......................@.................6.....M......................./....."...........l..........._...........D.....y..... .................&.......................5.....9.....3.............................B.................r.................D...................................=.....b.........................................E.....\...........Y.................'...................................D.....n...........j.................9.......................a...........i...........v...........t...........a........................ ....,!....l!.....!....j"....."....R#....|#....O$.....%.....%.....%.....&....x'.....(....Q(.....(....z).....).....)....]*.....*.....+....$+.....+.....,.....-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):553886
                  Entropy (8bit):5.812150703289796
                  Encrypted:false
                  SSDEEP:
                  MD5:A9656846F66A36BB399B65F7B702B47D
                  SHA1:4B2D6B391C7C2B376534C0AF9AA6779755B4B74E
                  SHA-256:02B65F48375911C821786D91698E31D908A4C0F5F4F1460DE29980A71124480E
                  SHA-512:7E23CAA89FF80BF799AC5353CEAF344CBED0393F23D15FCBE8DC24EE55757F417CEA3BFC30889FD2CB41951F9FA5629C2E64B46DD9617D4A85EFEF0A255246F6
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.|...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.%...}.7.....?.....D.....L.....T.....\.....c.....j.....q.....r.....s.....u.............................h...............................................[.........../.....I.................S.....j...........9.....h.....{...........4.....].....q...........J.................?.............................%.....`.....y...........\................./.............................%.....v.................G.....g.....|...........=.....c.....u...........6.....].....o...........O.........................................".......................3.......................R.............................-.....x.................0.....K....._.................0.....E.................G.....W...........T.................).....w.................-.......................M.............................O.................J.........................................'.........................................E.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):532410
                  Entropy (8bit):5.486224954097277
                  Encrypted:false
                  SSDEEP:
                  MD5:BE49BB186EF62F55E27FF6B5FD5933F4
                  SHA1:84CFD05C52A09B4E6FA62ADCAF71585538CF688E
                  SHA-256:833F2E1B13381AA874E90B747931945B1637E53F2396A7409CCDA0A19CBE7A84
                  SHA-512:1808631559D3C28589D3F5A4B95554CEBC342DE3D71B05DDC213F34851BF802967BFFAC3D7668C487265EE245D1E26EFCE5D317EDBFBBEEB4BC2C9F122980585
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.6...i.G...j.Q...k.`...l.k...n.s...o.x...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................%.....,.....3.....:.....;.....<.....>.....P.....^.....n...................................y.................&...........2.....}.................h.......................g.......................Z.......................v.................O...................................3.....I.................T.....h...........b.................S...........$.....J.......................(.............................n.......................z...........$.....8.................2.....C...........).....j.................;.....i.....|...........?.....q.................[.......................g.......................L.....j.................G.......................~.................I.......................B.......................b.............................^.............................o.........................................j.......................x.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):818089
                  Entropy (8bit):4.779985663253385
                  Encrypted:false
                  SSDEEP:
                  MD5:AFA2DFBA3BD71FE0307BFFB647CDCD98
                  SHA1:CD7A5C54246E891981AEEEAA88D39EC9E3F2C594
                  SHA-256:1375353837629A20102C69BF62701EE5401BED84D3DC4845BED5EE43E4D322CF
                  SHA-512:CE8BBBDDC33CB6B8DF4AEE127A8987E6D8C1D0761AC5BD25D685310BAA2D377F239BDF06F2C04B54295CF8FD440697A69A040644D5A7C0395C4F71A0252B8E87
                  Malicious:false
                  Reputation:unknown
                  Preview:........=$|.e.p...h.x...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.,...|.2...}.D.....L.....Q.....Y.....a.....i.....p.....w.....~.........................................).................W...........O...........\...........z.....E...................................3...........b.................a.................5.......................1.....1...........v...........|...........{...........`...........Y.....~.....d...................................S........... .......................{...........(.....K...........H.................c...........d...........3.................)...........B.................D.................(...........W.......................E.................~...........'.....O...........^.................~ .....!....]!....z!....J"....."....=#.....#....0$.....$.....$.....%.....%....P&.....&.....&.....'....1(.....(.....(.....).....*....5+....S+....A,.....,....Z-.....-....^...........=/....^/...../....Y0.....0.....0.....1....'2.....2
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):479512
                  Entropy (8bit):5.541069475898216
                  Encrypted:false
                  SSDEEP:
                  MD5:09592A0D35100CD9707C278C9FFC7618
                  SHA1:B23EEF11D7521721A7D6742202209E4FE0539566
                  SHA-256:9C080A2F6D4EDF0E2E94F78550B9DB59ADF5B1B9166DE2BAE496E6ABB6733304
                  SHA-512:E0760B3F227A3E7EAEB4816B8E02BEE51C62730D24403724D66B36BCCBC0BDCD56DF9EAB28B073AB727EE12C8856A858E52A9803E1A1C9164FCD3CF2F716D8AF
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.%...k.4...l.?...n.G...o.L...p.Y...q._...r.k...s.|...t.....v.....w.....y.....z.....|.....}.........................................................................#.....5.....I.....]...........b.................).......................e...........2.....K.................T.....p...........&.....U.....e...........%.....V.....f...........J.........................................O.......................Y..................................._.....u.............................n.......................J.......................'...............................................(.............................z.......................j.......................h.......................|.................$.....w.......................M.....k.......................?.....Q...........).....f.................J.....i.................;.....c.....x...........1.....l...................................q.................?.................;.....N.............................p.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):504856
                  Entropy (8bit):5.34516819438501
                  Encrypted:false
                  SSDEEP:
                  MD5:9E038A0D222055FED6F1883992DCA5A8
                  SHA1:8FA17648492D7F093F89E8E98BF29C3725E3B4B5
                  SHA-256:DDCA575D659545D80E715EB4176BBBBFBD3F75E24B223537B53740B0DCB282BD
                  SHA-512:FB70F97E08191DFEB18E8F1A09A3AB61687E326265B1349AB2EFF5055F57E177A496BF0EA3592B61C71FE1F73C9143CA1495B05226F36EB481024827CAE6DCC4
                  Malicious:false
                  Reputation:unknown
                  Preview:........4$..e.^...h.f...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....m.............................?.................$.................2.....D...........7.......................P.......................A.....l.....{...........&.....U.....c...........0.....d..................................._.......................m.......................n.............................*.......................J.....r.......................>.....G.........................................A.....O.................4.....F.................G.....R.................).....6.................).....2.................\.....u...........(.....T.....p...........2.....c.................D.......................l.................B.............................j.................+.......................j...........?.....S...........5.....x...................................P.......................r...........%.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1298313
                  Entropy (8bit):4.058495187693592
                  Encrypted:false
                  SSDEEP:
                  MD5:36104CB0D5E26E0BBB313E529C14F4B4
                  SHA1:69A509DEE8419DA719DCF6DE78BFE0A6737508C5
                  SHA-256:DC28C869A143424F71EDCFDB08B56DA31C2EC96E9D608535FFA7DC0B0842B7D8
                  SHA-512:D46ED1AA19EB298BC4C3D61EFC28D80753D6B551F01808E6158A0869FAAE8755DF61D4B4BAFF1310DD09FCFC385ABA67E1AA7D61BBE399DF7BB2D483EBE0FEFF
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.(...h.0...i.A...j.M...k.\...l.g...n.o...o.t...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................!.....(...../.....6.....7.....8.....=.....k.................:...........5...........$.....v...........`...........(...........Z.................%.............................O...........j.....L.........................................m...........u...................................;.....c...........7.................................................................8 ..... ....m!....I".....".....".....#.....$.....%....9%....d&....n'.....(....L(....C)....4*.....*.....*.....+.....,....3-....a-....Z.....J/...../...../.....0.....1....Z2.....2.....3....:5.....6....Z6....U7....=8.....8.....8.....9.....:.....:....F;.....<.....=.....=.....>....E?....S@.....@....[A....3B.....B....IC.....C.....D.....E....[F.....F....+H....>I.....J....pJ....\L....FN.....O.....O....DQ....QR.....S....{S.....T.....V.....V....'W....+X.....Y.....Y.....Y.....[....9\.....\
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1199612
                  Entropy (8bit):4.314031920337284
                  Encrypted:false
                  SSDEEP:
                  MD5:98714389748A98ECC536CD2F17859BDF
                  SHA1:07761AA31588F30C2CED4A1E31FE99DDC43A5E8D
                  SHA-256:8A81B1A5457407E49D6372677938E7A2D28DFCA69F555FEDC8A2C9C09C333A65
                  SHA-512:38CC4F064BD874EEC9DBFAB4C2A83A487FBCD89CEFB40BE4213C42231BC48AF9255341C9D325EE059BC50EE533898C5FA22CD3B3927A8E045049DEF3C5DFB2C6
                  Malicious:false
                  Reputation:unknown
                  Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t. ...v.5...w.B...y.H...z.W...|.]...}.o.....w.....|.......................................................................X...........J...........|...............................................f.........................................~.............................Y.............................A.............................d.....X.........../.....k.....b...........5...............................................'.......................L.....u ....:!.....!.....!.....".....#....*$....k$.....%.....&....6'.....'.....(.....).....*...._*.....+....P,.....,.....-....'...........m/...../.....0.....1...."2....f2.....3.....4....R5.....5.....6....G7.....7.....7.....8....I9.....9.....9....{:....0;.....;....)<.....=.....>.....?.....?.....@....bA.....A.....B....JC....(D.....D.....D....DF.....F.....G.....G.....I....@K....qL.....L....4N....EO.....O....pP.....Q.....R....?S.....S.....T....^U.....U.....V....`W....[X.....Y
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1008989
                  Entropy (8bit):4.356501290091745
                  Encrypted:false
                  SSDEEP:
                  MD5:56F29DE3465795E781A52FCF736BBE08
                  SHA1:EAA406E5ED938468760A29D18C8C3F16CF142472
                  SHA-256:529C561747BF8B6206BE4F8BCF287A1D15E1B14A33113242DDAD5E035CA37BE6
                  SHA-512:519B5B3CC7032B2AF856456EEC25019B3A6A7F2A6DB7A0318CF87C41E08C6F6BFA73E239939B0DA16972C1D357FF06177765D875E19742D23E99A95FD4AC5416
                  Malicious:false
                  Reputation:unknown
                  Preview:........i#P.e.....h.....i.....j.....k.....l.....o.....p.....q.....r.....s.0...t.9...v.N...w.[...y.a...z.p...|.v...}.....................................................................................'.....{.......................^...........e...........f.................s...........I...........]...........P...........r.................{...........D.....]...........;...........$.................,.....}.....K...........v...........e...........r...........m.....................................................E.......................P.......................:.......................B.......................b.......................s.......................X.......................S..................!.....".....".....".....#....0$....|$.....$....j%.....%....5&....l&.....'....z'.....'....!(....A).....).....*.....*.....+.....,....H,....x,....M-.....-....6.....l.....k/...../....o0.....0.....1.....2....>3...._3.....4.....5....c6.....6.....7....n8.....8.....9.....9....f:.....:.....:.....;.....<....D=
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):515329
                  Entropy (8bit):5.616482888977033
                  Encrypted:false
                  SSDEEP:
                  MD5:46CA9EE922C3C175DE466066F40B29CE
                  SHA1:5563E236A15CD9CC44AE859165DF1E4E722936C7
                  SHA-256:BD8B1441FD2057F0B61512CC0AA23DFD2619560CF886B4D453FA7472E7153A3F
                  SHA-512:45AA2D6896568751C2F986ABD281EA07CB731880DF8F28F2F0AEFD95736F41B1E005D8DFB6F0AEF0CED6CEF94154D34FD0DA2CB7F0B0C66D9C085F5C47F32605
                  Malicious:false
                  Reputation:unknown
                  Preview:........c$V.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}...........................................................................................)...........L.................+.......................e........... .....;.................7.....J.......................)......................................... .....B...........5.....x.................Z.......................Q.....{.................w.................Q.................!.......................'.......................&....................... ................."...../.................5.....F.................9.....F.................2.....>.................7.....D...........I.......................v.......................i.......................P.......................q.................-.....z.......................m.................,.............................*.................B................."...........(.....n.................N.....~.................l.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):876131
                  Entropy (8bit):4.88404350774067
                  Encrypted:false
                  SSDEEP:
                  MD5:1365ABDD1EFB44720EA3975E4A472530
                  SHA1:8421FC4905C592EB1269C5D524AA46866D617D3C
                  SHA-256:29AB0F7EE69FB7A1E1E54DD2A3746D2CFEAAA71AE5971EE30AA8E2E0F6556FA5
                  SHA-512:2E806A9BEA864E689BBD1D78B800DFDBC6E4109320F9A4790E52010BFDEC20C7644655A6FE3BABDE0B84D9580208CB78EF1FA0DB3476F8676C17A13D130296C7
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.'...s.8...t.A...v.V...w.c...y.i...z.x...|.~...}.....................................................................................1.....s.....W.......................r...........x...........m.....!.......................<.............................n...........,.................-...........|.............................=.....y.....+...........%.....K...................................w.............................N...................................r.................O...........N.................^...........\...............................................h...............................................R.....m.....f.....6.............................W.....y...........O.....x...........K...........j...........z .....!.....!.....".....".....#....R#.....#....&$.....$.....$.....%.....%....s&.....&.... '.....(.....(....~).....).....*....Q+.....+.....,.....,....Z-.....-.....-....[............/....4/.....0.....0....$1
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):765853
                  Entropy (8bit):5.17061834928747
                  Encrypted:false
                  SSDEEP:
                  MD5:3FED15E64BEAFBA75DE61B08A45AE106
                  SHA1:E24953271D8C0254AD011D3A65B2C2FA57903681
                  SHA-256:B6E250C3F4FBAC3AF5FB8BB1C61CACAD8685D7F2A97063DE23BC22E91B7F2E27
                  SHA-512:3948D080135AFEB240815D43F7B5B8D407BA2830FF701D9B8343F2A72E610827EDAAB643444CDCEB86812ADFC9FB3FBA3AAD6DB7488843C2A04E92A3E63FE40D
                  Malicious:false
                  Reputation:unknown
                  Preview:........1$..e.X...h.`...i.h...j.t...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.#.....+.....0.....8.....@.....H.....O.....V.....].....^....._.....d.....|.............................n.....................................................).....^.......................<...........G.................J.................9...........E.................~...........{...........\...........L.....k.......................,.................9.....e.....C.......................>...................................8.....Z...........C.................;.................-...........L.................N.................1...........-.....y.........................................s.......................*.....p........... .......................i...........).....J.......................L...........M ..... ..... ....Y!.....!....4"....Z"....,#.....#....&$....W$....'%.....%....^&.....&....f'.....(.....(.....(.....)....3*.....*.....*....]+.....+.....,....F,.....,....z-.....-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):609259
                  Entropy (8bit):5.796202390024141
                  Encrypted:false
                  SSDEEP:
                  MD5:CD741C24AF7597E0DC11069D3AC324E0
                  SHA1:2A883DFBCF48D5093D70D4B77BBFFFA521287334
                  SHA-256:13E982DC4B2B1AEE093E96BA27E02258C2B815CBB062006A4396BB3A3E6A84B1
                  SHA-512:6D27998E25B57FF0CE08C3590B69031038CBA390E68333A83514022B2C56B689AF8AD9715302824027864B5320852E9AB77D74E3B8A90DC66DF59F48CEB528C9
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.*...s.;...t.D...v.Y...w.f...y.l...z.{...|.....}...........................................................................................;.......................-...........A.................[...........O.....u...........v.................6.......................+.......................}...........G.....y.....9...........K.....y.............................z...........?.....V...................................T.................X.......................r...................................9.....J...........H.......................}.................'.......................<.......................O.............................Z................._.................*.................)........... .....V.....v.......................j...........N.................3...................................O.....v................./.....C.......................@...........) ....^ ....w ..... ....J!....}!.....!..../".....".....#....8#
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):441207
                  Entropy (8bit):6.685712707138377
                  Encrypted:false
                  SSDEEP:
                  MD5:99E6ACFB46923C4F8B29058E9EE6166B
                  SHA1:AF06C42E5F3578ADBC4F0BD7262DC6775FDD351F
                  SHA-256:9D8498875263B19552A982D1850F2F942FF44AF4E323BC5A3A67C34413994D95
                  SHA-512:4FDF5186FC2FC68210C2BE91F5B821F0979CA67D6C9B8915C14E7A20D3CE2548EB2660D5F9F398CF6C585A5C0725FA34FD3670F416F7C8A4F009C729BCF02988
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.T...h.\...i.d...j.g...k.v...l.}...m.....o.....p.....q.....r.....s.....t.....v.....w.....|.....}...............................(.....-.....5.....<.....C.....E.....J.....S....._.....q.................v.................1......................./.......................:.......................>.............................c.......................D.....j................._.......................n.......................T.....}.................@.....o.................V.......................5.....O.....i................."...........x.......................U.......................].......................=.......................".....s.......................L.....u.................g.......................W.....w.................3.....X.....o...........&.....J.....\.................=.....].............................y.......................y...................................N.....`...........,.....d.....y...........).....O.....^.............................|.......................x.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):439630
                  Entropy (8bit):6.6906570508767995
                  Encrypted:false
                  SSDEEP:
                  MD5:BB7C995F257B9125457381BB01856D72
                  SHA1:21C55FF5CBC4F223C23D5A2FBCC9E051DB78A44C
                  SHA-256:F2299E03E99B0E9A9CACE3B1C72E6C8C5FE089487CA1C82F2AAF4273B62E37A2
                  SHA-512:5247C5DA6F00DF6241500524DDB162041A03649FA0AFCC11AD40E820814958768A2E11CE34E1250FDBF42B2459F8C06B00AE7442B537F0731A62C6724FC8D890
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#,.e.....h.....i.)...j.-...k.<...l.G...n.O...o.T...p.\...q.b...r.n...s.....t.....v.....w.....y.....z.....|.....}...................................................................%.....4.....C...........3.....q.................+.....T.....`........... .....R.....d.................M.....b.................3.....?.............................g.......................[.......................S.......................;.......................*.......................@.......................F.............................D.....d.....p.................2.....A.............................q.......................T.......................<.............................i.......................f.......................A.....[.....o.................!.............................u.......................^.............................h.......................P.........................................H.......................Z.......................$.....e.....z.................1.....X.....j...........#.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):275968
                  Entropy (8bit):5.778490068583466
                  Encrypted:false
                  SSDEEP:
                  MD5:7EA1429E71D83A1CCAA0942C4D7F1C41
                  SHA1:4CE6ACF4D735354B98F416B3D94D89AF0611E563
                  SHA-256:EDEC54DA1901E649588E8CB52B001AB2AEC76ED0430824457A904FCC0ABD4299
                  SHA-512:91C90845A12A377B617140B67639CFA71A0648300336D5EDD422AFC362E65C6CCD3A4FF4936D4262B0EAF7BAE2B9624BCD3C7EEC79F7E7CA18ABE1EC62C4C869
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.X...........!.....,..........~K... ...`....... ..............................H.....@.................................$K..W....`...............................I............................................... ............... ..H............text....+... ...,.................. ..`.rsrc........`......................@..@.reloc...............4..............@..B................`K......H...........<x...............-..P .......................................i.)V.#c....e../.`...V....j>..*..?.LbrzKV.x.}...........[.f)..dD`..66.61[.z....W^....>F..r...#. ..g...T...P....Ss)ii.a.v.(0.....(1...o2...s....}....*...0..7........{....-%~....r...p.{....r9..p(3...(.....(.......(4....*.........//........{....*"..}....*..{....*....0..4..........%...(5....-.~....r?..p(....+...}.......,..(6....*........')........{....*..{....*"..}....*.*..{....*"..}....*.0..........
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1547797
                  Entropy (8bit):4.370092880615517
                  Encrypted:false
                  SSDEEP:
                  MD5:32AB4E0A9A82245EE3B474EF811F558F
                  SHA1:9F2C4C9EEB5720D765F2321ACD0FF9F8DD11E6A4
                  SHA-256:9BBF4D15F8FB11F7D2C032BD920D2A33B2C2CB8EF62E7E023049AF6132F5D6C1
                  SHA-512:A0574A170F69F9926C32BAF6119A16A381FEC9E881B304082859EE7CFF463570C78984EE14369C59CDB19E532B3ABF193D02B462F1B40D07214B6244150CD63F
                  Malicious:false
                  Reputation:unknown
                  Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>log4net</name>.. </assembly>.. <members>.. <member name="T:log4net.Appender.AdoNetAppender">.. <summary>.. Appender that logs to a database... </summary>.. <remarks>.. <para>.. <see cref="T:log4net.Appender.AdoNetAppender"/> appends logging events to a table within a.. database. The appender can be configured to specify the connection .. string by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionString"/> property. .. The connection type (provider) can be specified by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionType"/>.. property. For more information on database connection strings for.. your specific database see <a href="http://www.connectionstrings.com/">http://www.connectionstrings.com/</a>... </para>.. <para>.. Record
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):342741
                  Entropy (8bit):5.496697631795104
                  Encrypted:false
                  SSDEEP:
                  MD5:A58DB728B50E6B82CBDCAA0DB61D36B1
                  SHA1:7CD76526CB29A0FF5350A2B52D48D1886360458B
                  SHA-256:BA2F2AC6AE9BC67399728F25772A0EB3E840695395CC747ADF4B2F8B5D6D9A46
                  SHA-512:0DB9AFBDADA44364521D89BAB6055458125F4F3C8C1B09048EAFA4055A194231CCFFD82FCDADA9360AB2B19F472B893330EBFCB027391E7A0C2B1100FC51E673
                  Malicious:false
                  Reputation:unknown
                  Preview:..mirrors....(function(a,b){."use strict";.var c=a.Array;.var d=a.isNaN;.var e=a.JSON.stringify;.var f;.var g;.var h=b.ImportNow("promise_state_symbol");.var i=b.ImportNow("promise_result_symbol");.var j;.var k;.b.Import(function(l){.f=l.MapEntries;.g=l.MapIteratorNext;.j=l.SetIteratorNext;.k=l.SetValues;.});.var m={.UNDEFINED_TYPE:'undefined',.NULL_TYPE:'null',.BOOLEAN_TYPE:'boolean',.NUMBER_TYPE:'number',.STRING_TYPE:'string',.SYMBOL_TYPE:'symbol',.OBJECT_TYPE:'object',.FUNCTION_TYPE:'function',.REGEXP_TYPE:'regexp',.ERROR_TYPE:'error',.PROPERTY_TYPE:'property',.INTERNAL_PROPERTY_TYPE:'internalProperty',.FRAME_TYPE:'frame',.SCRIPT_TYPE:'script',.CONTEXT_TYPE:'context',.SCOPE_TYPE:'scope',.PROMISE_TYPE:'promise',.MAP_TYPE:'map',.SET_TYPE:'set',.ITERATOR_TYPE:'iterator',.GENERATOR_TYPE:'generator',.}.var n=0;.var o=-1;.var p=[];.var q=true;.function MirrorCacheIsEmpty(){.return n==0&&p.length==0;.}.function ToggleMirrorCache(r){.q=r;.ClearMirrorCache();.}.function ClearMirrorCache(r){.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8226870
                  Entropy (8bit):7.996842728494533
                  Encrypted:true
                  SSDEEP:
                  MD5:F7EC58AEA756F3FD8A055AC582103A78
                  SHA1:086B63691F5E5375A537E99E062345F56512A22C
                  SHA-256:517418184EA974C33FFE67B03732D19B1234DCB9E5C1C2E9E94ED41B3BC1D064
                  SHA-512:C620C6E16BBCEE9BC607E6CA75D602C756276AC69E5F3761D82DE7728164133656A71A69043EB1A86CE3051FDE4327A47EFD41D1FF47C8385699CA67C423AD7B
                  Malicious:false
                  Reputation:unknown
                  Preview:............f.6:..{..D..|..G..~. K.....]....._....=.....c...........9.....B.............................F.....K/.....2....54....r5.....6.....?.....@....jB.....C....hD.....E.....H....nj.....k.....r....@~...."..........W.....................;..../;'...2;P...7;....8;....C;....D;U...E;....F;....G;A,..H;.;..I;gK..J;.Z..K;.h..L;.}..M;y...N;{...O;z...P;....Q;8...R;....S;....T;C'..U;.=..V;.W..W;.m..X;....Y;....Z;D...[;....\;....];.....<.....<x....<.....<-....<\....<.....<.....<.....<.....<*(...< /...<+3...<.3..I=.3..J=.7..K=.9..R= >..S=.G..T=}V..[=;w..\=.x..]=.}..^=R..._=....`=....a=....b=....c=....e=:...f=.....=....=.....=....=`....=p....=.....=.....=.....=.....=.....=K....=.....=t....=.....=.....=.....=\....=Z....=.....=T....=[....=x....=.....=.....=D....=.....=.....=.....=l....=F....=.'...=j)...>.+...>l,...>_0...>.2...>.6...>.8..N>.\..O>~^..P>._..Q>%d..R>.k..S>.l..T>Tn..U>.p..b>.u..c>/y..d>.|..B@....C@....D@o...E@....F@W...L@Z...M@(...N@...O@....D.....D ....D ....D;....D.....D....D..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):276319
                  Entropy (8bit):4.242318669799302
                  Encrypted:false
                  SSDEEP:
                  MD5:8234983533FA47D2A1D7710FF8274299
                  SHA1:E4C5793B6FE6A6C6C9D8E3921B3BC341AE3448D8
                  SHA-256:F95553D8066144CBB8A05EED1735C94A4B97A2E44E49F624C2302990A13017C9
                  SHA-512:1E7E201B0FF9AFA7821B5FFD0A36548A49CD4DBBABA5858E13DA35058670A5053723DD3544B2FD85C619F2B8FC9E5DB48DF977BB293E7BA7DE6F22CC8DAB28CA
                  Malicious:false
                  Reputation:unknown
                  Preview:.........X./j1N.11.8.172.9.......................................................@...y...........@..`....`....`....`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.8731406795131327
                  Encrypted:false
                  SSDEEP:
                  MD5:2C66F3C2190A84FAFD4449DAF6440EAC
                  SHA1:7B9E4C94329FE26C34E63AB8336227FD5EB553E9
                  SHA-256:58EB97E30289A3FCAE270DBCC01258A862936350CB0EF781AE76D6A9444C0155
                  SHA-512:62713209575426CE503605C6F451E9DFB025BE0295F0A453614862CE390F5987F0E16BAE6B37B4B1A7330A7CB5AA31249F8CF58DE37B8B701C16881E4E4E61C1
                  Malicious:false
                  Reputation:unknown
                  Preview:start GamePall.exe OuWe5kl
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:MSVC program database ver 7.00, 512*4023 bytes
                  Category:dropped
                  Size (bytes):2059776
                  Entropy (8bit):4.067542396670122
                  Encrypted:false
                  SSDEEP:
                  MD5:70F9EAEA8A2A604E59F72EDE66F83AB4
                  SHA1:0AB9EA1BFFDFF471EC22AB289C7FBC5E0CDF48BF
                  SHA-256:38A07BA75CC2BBDF715CA87D380A4E5A0DCFAF9C30C5ECD30F6107871D51825B
                  SHA-512:47DE4DAD93385A4907FADE307040FE026ED66989C0C9915AFC96CB2BC93DE5E106DC1274E4AD2382021C758C60FEDE06D68998CF3591E23E2951778CE09D6D4C
                  Malicious:false
                  Reputation:unknown
                  Preview:Microsoft C/C++ MSF 7.00...DS................J..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):346624
                  Entropy (8bit):6.54104466243173
                  Encrypted:false
                  SSDEEP:
                  MD5:7A53AD3E5D2E65C982450E7B7453DE8A
                  SHA1:99F27E54F1F61207C02110CAC476405557A8AD54
                  SHA-256:24FDDD6A367792A9D86D9060FC9AA459B5FB0F67804CB7D139A100D86BBDAFF8
                  SHA-512:2B5E5DB46FDC787CB46CDAEBFFC01586E248FBB864677B27AF03CDC33E956DEF51B3F836597E7092C4175CF605C44728C6F96B74BB2C9870E9715D4AF4C531A1
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.........T............................................................@A....................................P....p...........................3..4.......................8........G...............................................text............................... ..`.rdata..............................@..@.data....4..........................@....00cfg.......@......................@..@.tls.........P......................@....voltbl......`...........................rsrc........p......................@..@.reloc...3.......4..................@..B........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):2445312
                  Entropy (8bit):6.750207745422387
                  Encrypted:false
                  SSDEEP:
                  MD5:334C3157E63A34B22CCE25A44A04835F
                  SHA1:C6B05BD55BE9FED3B0C5077C5649E2A41C10DC08
                  SHA-256:3E307570B574469EC8BCF1CE6D5291DF8D627CA3812F05AACFEBBD3F00B17F89
                  SHA-512:11F538ADD05515861891892EBB90163B6540B72FEB380D64B4A0AA56C6415E3B71374557BF50D0B936712B1006F2B94D59BEBFBF18CBF93BB883D9055CAAEEE9
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.....4 .................................................p*...........@A..........................#.. ....$.d....P)......................`).......#.......................#......."...............$.P............................text.../2 ......4 ................. ..`.rdata..\....P ......8 .............@..@.data...L....@$...... $.............@....00cfg....... )......>$.............@..@.tls.........0)......@$.............@....voltbl.M....@)......B$..................rsrc........P)......D$.............@..@.reloc.......`)......H$.............@..B........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):631017
                  Entropy (8bit):5.144793130466209
                  Encrypted:false
                  SSDEEP:
                  MD5:0794DF29DF8DFC3ECE5C443F864F5AEB
                  SHA1:BFD4A9A34BEB9751BC4203FB9A9172F1F05E5B16
                  SHA-256:3EE2237E9B14871165B051CCF892C8375E45B5F12841E02F4B9D37F5D5A03283
                  SHA-512:0D34E36F7455B977F086F04840FBA679284A619A7164A56B5C7FC2ADCB23A231B67A62101540EB07CF5C8192790266B08D2CC232D291621C331FE77C1F5E52C0
                  Malicious:false
                  Reputation:unknown
                  Preview:..........d..<..11.8.172.9......................................................@...]!...S..y...-[..........`....`....`T...`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...........................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4400640
                  Entropy (8bit):6.667314807988382
                  Encrypted:false
                  SSDEEP:
                  MD5:7F913E31D00082338F073EF60D67B335
                  SHA1:AC831B45F2A32E23BA9046044508E47E04CDA3A4
                  SHA-256:B60E9818C4EA9396D0D2D2A4AC79C7DC40D0DFF6BB8BC734D0AB14ADC30FBF30
                  SHA-512:E1AC79C775CF9137283CD2C1AE1A45EC597E0351CDB9C11D483E2E1F8B00CC2BBC5807A50DED13A3A5E76F06C1A565EFF1233F4EC727B0C5F7AA3BEAEA906750
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....$5.........P.-......................................PD...........@A........................8=?.~....\?.P.... B......................0B.X.....?.....................H.?......@5.............._?..............................text...T#5......$5................. ..`.rdata...a...@5..b...(5.............@..@.data...@N....?..x....?.............@....00cfg........B.......A.............@..@.tls....5.....B.......A.............@....rsrc........ B.......A.............@..@.reloc..X....0B.......A.............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):106
                  Entropy (8bit):4.724752649036734
                  Encrypted:false
                  SSDEEP:
                  MD5:8642DD3A87E2DE6E991FAE08458E302B
                  SHA1:9C06735C31CEC00600FD763A92F8112D085BD12A
                  SHA-256:32D83FF113FEF532A9F97E0D2831F8656628AB1C99E9060F0332B1532839AFD9
                  SHA-512:F5D37D1B45B006161E4CEFEEBBA1E33AF879A3A51D16EE3FF8C3968C0C36BBAFAE379BF9124C13310B77774C9CBB4FA53114E83F5B48B5314132736E5BB4496F
                  Malicious:false
                  Reputation:unknown
                  Preview:{"file_format_version": "1.0.0", "ICD": {"library_path": ".\\vk_swiftshader.dll", "api_version": "1.0.5"}}
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):826368
                  Entropy (8bit):6.78646032943732
                  Encrypted:false
                  SSDEEP:
                  MD5:A031EB19C61942A26EF74500AD4B42DF
                  SHA1:FDC6EA473234F153639E963E8EFB8D028DA1BE20
                  SHA-256:207706A3A3FAA8500F88CB034B26413074EFC67221A07C5F70558F3C40985A91
                  SHA-512:80F843E47FC2B41B17EF6EA1BB2BB04119B2417311599EC52120D9F9DF316B4D7B1DAF97EE5CDF2AE78CDB9475E5C65255A7F2AB2A9231804F6A82C83303FD19
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....|..........@.....................................................@A...........................<!..$...P....p..............................l..............................................P................................text....z.......|.................. ..`.rdata..tr.......t..................@..@.data....7..........................@....00cfg.......P......................@..@.tls.........`......................@....rsrc........p......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):211456
                  Entropy (8bit):6.566524833521835
                  Encrypted:false
                  SSDEEP:
                  MD5:6D7FD214164C858BBCF4AA050C114E8C
                  SHA1:B8868DA6BB9A79EE7C9901A9BFAC580D5BAFCC96
                  SHA-256:3F58FB22BD1A1159C351D125BEE122A16BB97BABB5FCA67FDBD9AAAED3B302E6
                  SHA-512:0F8F2523C3A616AC7C72A1239B7E353F6A684FF75DA79D1CAF9B98A47FF6FE06329165825704C67C04E92073BA2C17D0FF339C57731DDF0F1489C2E97D1D0A14
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............^...^...^..._...^..._q..^..._..^..._..^..._..^..._..^k.._...^..._...^...^...^k.._...^k.._...^n..^...^k.._...^Rich...^........................PE..L...Ua.X.........."!.........(......c........0............................................@.................................x...<....@.......................P..T"......8...............................@............0..0............................text............................... ..`.rdata..`....0....... ..............@..@.data...............................@....gfids.......0......................@..@.rsrc........@......................@..@.reloc..T"...P...$..................@..B........................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):165888
                  Entropy (8bit):6.613407114014138
                  Encrypted:false
                  SSDEEP:
                  MD5:811A28D373D02AE481E4858DFB8B1D15
                  SHA1:74CA1EFCD4D1F41691F0CD005662CC56537B04A8
                  SHA-256:7E92A078F6F875B189BC4B2BCA87F4F737EB2048356A51A1962F359B645D1B0F
                  SHA-512:BE4ABCE166E76C3B67A5311DFC1A8EEC275CCDFFFB0D3AF4704D513A265748EE73BDDF1EB71596D0AA64C54561C75E967528C8A881275B0C7CC367CFFCC43827
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 66%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._.....,..,..,...,..,...,..,...,{.,<..,..,..,t.,...,..,...,..,...,..,Rich..,................PE..L......d.................j....0...................@..........................`1.............................................|...x.....0..............................................................................................................text...Kh.......j.................. ..`.rdata... ......."...n..............@..@.data... ...........................@....rsrc.........0.....................@..@........................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:unknown
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.613407114014138
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:6IMo1kM9CC.exe
                  File size:165'888 bytes
                  MD5:811a28d373d02ae481e4858dfb8b1d15
                  SHA1:74ca1efcd4d1f41691f0cd005662cc56537b04a8
                  SHA256:7e92a078f6f875b189bc4b2bca87f4f737eb2048356a51a1962f359b645d1b0f
                  SHA512:be4abce166e76c3b67a5311dfc1a8eec275ccdfffb0d3af4704d513a265748ee73bddf1eb71596d0aa64c54561c75e967528c8a881275b0c7cc367cffcc43827
                  SSDEEP:3072:rLjt6nHUInvBXzciM6eqHXVwENyN5fYrUoMYVKb:rLp60IvlcigqHXVwENCYdx
                  TLSH:67F359507AF69026F3F79A30797497945E3BBC737974A18E2650232ECE326D18E60723
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._......,...,...,...,...,...,...,...,{..,<..,...,...,t..,...,...,...,...,...,...,Rich...,................PE..L......d...........
                  Icon Hash:cb97334d5151599a
                  Entrypoint:0x4019e1
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x64F7DE1A [Wed Sep 6 02:04:10 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:073f294e5446f7e845558e1b74454edb
                  Instruction
                  call 00007FDB508210BFh
                  jmp 00007FDB5081D5BEh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 00000328h
                  mov dword ptr [0041C8F8h], eax
                  mov dword ptr [0041C8F4h], ecx
                  mov dword ptr [0041C8F0h], edx
                  mov dword ptr [0041C8ECh], ebx
                  mov dword ptr [0041C8E8h], esi
                  mov dword ptr [0041C8E4h], edi
                  mov word ptr [0041C910h], ss
                  mov word ptr [0041C904h], cs
                  mov word ptr [0041C8E0h], ds
                  mov word ptr [0041C8DCh], es
                  mov word ptr [0041C8D8h], fs
                  mov word ptr [0041C8D4h], gs
                  pushfd
                  pop dword ptr [0041C908h]
                  mov eax, dword ptr [ebp+00h]
                  mov dword ptr [0041C8FCh], eax
                  mov eax, dword ptr [ebp+04h]
                  mov dword ptr [0041C900h], eax
                  lea eax, dword ptr [ebp+08h]
                  mov dword ptr [0041C90Ch], eax
                  mov eax, dword ptr [ebp-00000320h]
                  mov dword ptr [0041C848h], 00010001h
                  mov eax, dword ptr [0041C900h]
                  mov dword ptr [0041C7FCh], eax
                  mov dword ptr [0041C7F0h], C0000409h
                  mov dword ptr [0041C7F4h], 00000001h
                  mov eax, dword ptr [0041B004h]
                  mov dword ptr [ebp-00000328h], eax
                  mov eax, dword ptr [0041B008h]
                  mov dword ptr [ebp-00000324h], eax
                  call dword ptr [000000B0h]
                  Programming Language:
                  • [C++] VS2008 build 21022
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1977c0x78.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x23080000xd918.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x180000x190.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x1684b0x16a005cf310da35b6dd900ba1eb280a00fe11False0.8009107389502762data7.491897638969264IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x180000x20900x220057d410772443d67804e889aea90fa688False0.3502987132352941data5.409489403656716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x1b0000x22ec5200x1e00eecb9d45accb67a097b1e5500f8a73f4unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x23080000xd9180xda001633e167465344e4ebf840a089bfe8fcFalse0.5254981364678899data5.2105159051750025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  YEFE0x230eed80x3faASCII text, with very long lines (1018), with no line terminatorsTurkishTurkey0.6316306483300589
                  RT_CURSOR0x230f2d80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                  RT_ICON0x23086a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.6103411513859275
                  RT_ICON0x23095480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6944945848375451
                  RT_ICON0x2309df00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.755184331797235
                  RT_ICON0x230a4b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7940751445086706
                  RT_ICON0x230aa200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5975103734439834
                  RT_ICON0x230cfc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.7291275797373359
                  RT_ICON0x230e0700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.7377049180327869
                  RT_ICON0x230e9f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.8865248226950354
                  RT_STRING0x230f5c80x18edata0.4798994974874372
                  RT_STRING0x230f7580x9edata0.569620253164557
                  RT_STRING0x230f7f80x6c8data0.4245391705069124
                  RT_STRING0x230fec00x67adata0.43184559710494574
                  RT_STRING0x23105400x5e0data0.4375
                  RT_STRING0x2310b200x258data0.4866666666666667
                  RT_STRING0x2310d780x6f8data0.4304932735426009
                  RT_STRING0x23114700x62edata0.4393173198482933
                  RT_STRING0x2311aa00x6fadata0.425531914893617
                  RT_STRING0x23121a00x5a0data0.4388888888888889
                  RT_STRING0x23127400x67cAmigaOS bitmap font "a", fc_YSize 28416, 18944 elements, 2nd "&", 3rd "a"0.4295180722891566
                  RT_STRING0x2312dc00x868data0.4144981412639405
                  RT_STRING0x23136280x87cdata0.4129834254143646
                  RT_STRING0x2313ea80x624data0.4357506361323155
                  RT_STRING0x23144d00x68adata0.43309438470728795
                  RT_STRING0x2314b600x68edata0.43206197854588796
                  RT_STRING0x23151f00x646data0.4364881693648817
                  RT_STRING0x23158380xdcdata0.5590909090909091
                  RT_GROUP_CURSOR0x230f4080x14data1.15
                  RT_GROUP_ICON0x230ee600x76dataTurkishTurkey0.6610169491525424
                  RT_VERSION0x230f4200x1a8data0.5990566037735849
                  DLLImport
                  KERNEL32.dllSetVolumeMountPointW, GetComputerNameW, SleepEx, GetCommProperties, GetModuleHandleW, GetTickCount, EnumCalendarInfoExW, ReadConsoleOutputA, GlobalAlloc, LoadLibraryW, lstrcpynW, GetModuleFileNameW, CreateJobObjectA, GetLogicalDriveStringsW, GetLastError, GetProcAddress, BuildCommDCBW, GetAtomNameA, LoadLibraryA, WriteConsoleA, UnhandledExceptionFilter, InterlockedExchangeAdd, AddAtomA, FoldStringA, lstrcatW, FindFirstVolumeA, AreFileApisANSI, OpenJobObjectA, ZombifyActCtx, GetConsoleAliasesW, GetConsoleAliasExesLengthA, CreateFileA, WriteConsoleW, MultiByteToWideChar, HeapAlloc, HeapReAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapCreate, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, SetHandleCount, GetFileType, GetStartupInfoA, HeapSize, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, InitializeCriticalSectionAndSpinCount, RtlUnwind, ReadFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, GetConsoleOutputCP
                  GDI32.dllGetBoundsRect
                  ADVAPI32.dllEnumDependentServicesA
                  ole32.dllCoTaskMemRealloc
                  WINHTTP.dllWinHttpAddRequestHeaders
                  Language of compilation systemCountry where language is spokenMap
                  TurkishTurkey
                  Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:01:44:51
                  Start date:03/07/2024
                  Path:C:\Users\user\Desktop\6IMo1kM9CC.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\6IMo1kM9CC.exe"
                  Imagebase:0x400000
                  File size:165'888 bytes
                  MD5 hash:811A28D373D02AE481E4858DFB8B1D15
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1769827734.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1769149234.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:01:45:03
                  Start date:03/07/2024
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff72b770000
                  File size:5'141'208 bytes
                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:5
                  Start time:01:45:20
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\feuiuvb
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\feuiuvb
                  Imagebase:0x400000
                  File size:165'888 bytes
                  MD5 hash:811A28D373D02AE481E4858DFB8B1D15
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2053247298.0000000004360000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.2052896799.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.2053174181.00000000028E0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.2053302883.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 66%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:6
                  Start time:01:45:36
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\F817.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\F817.exe
                  Imagebase:0x1f0000
                  File size:6'642'176 bytes
                  MD5 hash:BD2EAC64CBDED877608468D86786594A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 50%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:01:45:46
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\218A.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\218A.exe
                  Imagebase:0x400000
                  File size:293'869 bytes
                  MD5 hash:60172CA946DE57C3529E9F05CC502870
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 21%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:9
                  Start time:01:45:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\500D.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\500D.exe
                  Imagebase:0x410000
                  File size:578'048 bytes
                  MD5 hash:DA4B6F39FC024D2383D4BFE7F67F1EE1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000009.00000002.3030907075.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 16%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:11
                  Start time:01:47:11
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\setup.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\setup.exe"
                  Imagebase:0x400000
                  File size:107'232'830 bytes
                  MD5 hash:FF2293FBFF53F4BD2BFF91780FABFD60
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 3%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:12
                  Start time:01:47:42
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Imagebase:0x100000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 3%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:14
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3388 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                  Imagebase:0xb70000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:15
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3548 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Imagebase:0xb20000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:16
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Imagebase:0xd60000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:17
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x8c0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Target ID:18
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728010167 --mojo-platform-channel-handle=4152 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Imagebase:0xab0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:19
                  Start time:01:47:48
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (iPhone; CPU iPhone OS 16_4 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719981540330969 --launch-time-ticks=4728172431 --mojo-platform-channel-handle=4208 --field-trial-handle=3392,i,3288241207481235149,17663016533976522537,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Imagebase:0xb10000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:20
                  Start time:01:47:49
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xfd0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:21
                  Start time:01:47:49
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x800000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:22
                  Start time:01:47:51
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x420000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:23
                  Start time:01:47:51
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x2d0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:24
                  Start time:01:47:51
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x990000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:25
                  Start time:01:47:52
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xf60000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:26
                  Start time:01:47:52
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xee0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:27
                  Start time:01:47:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x9d0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:28
                  Start time:01:47:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x8b0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:29
                  Start time:01:47:54
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xa00000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:30
                  Start time:01:47:54
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xb00000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:31
                  Start time:01:47:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x40000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:32
                  Start time:01:47:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x7f0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:33
                  Start time:01:47:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x350000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:34
                  Start time:01:47:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x820000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:35
                  Start time:01:47:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x40000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:36
                  Start time:01:47:56
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xf60000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:37
                  Start time:01:47:56
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x5a0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:38
                  Start time:01:47:56
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x9f0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:39
                  Start time:01:47:57
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x460000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:40
                  Start time:01:47:57
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xd90000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:8.5%
                    Dynamic/Decrypted Code Coverage:20.7%
                    Signature Coverage:59.3%
                    Total number of Nodes:140
                    Total number of Limit Nodes:5
                    execution_graph 3978 417281 3979 41728b VirtualProtect 3978->3979 3908 401543 3911 401546 3908->3911 3909 4015e6 NtDuplicateObject 3910 401603 NtCreateSection 3909->3910 3918 401702 3909->3918 3912 401683 NtCreateSection 3910->3912 3913 401629 NtMapViewOfSection 3910->3913 3911->3909 3911->3918 3915 4016af 3912->3915 3912->3918 3913->3912 3914 40164c NtMapViewOfSection 3913->3914 3914->3912 3916 40166a 3914->3916 3917 4016b9 NtMapViewOfSection 3915->3917 3915->3918 3916->3912 3917->3918 3919 4016e0 NtMapViewOfSection 3917->3919 3919->3918 3974 402e63 3975 402e67 3974->3975 3976 401918 8 API calls 3975->3976 3977 402f44 3975->3977 3976->3977 3764 278003c 3765 2780049 3764->3765 3777 2780e0f SetErrorMode SetErrorMode 3765->3777 3770 2780265 3771 27802ce VirtualProtect 3770->3771 3773 278030b 3771->3773 3772 2780439 VirtualFree 3776 27804be LoadLibraryA 3772->3776 3773->3772 3775 27808c7 3776->3775 3778 2780223 3777->3778 3779 2780d90 3778->3779 3780 2780dad 3779->3780 3781 2780dbb GetPEB 3780->3781 3782 2780238 VirtualAlloc 3780->3782 3781->3782 3782->3770 3968 401924 3969 401929 3968->3969 3970 40195e Sleep 3969->3970 3971 401979 3970->3971 3972 401538 7 API calls 3971->3972 3973 40198a 3971->3973 3972->3973 3856 402fe9 3857 403140 3856->3857 3858 403013 3856->3858 3858->3857 3859 4030ce RtlCreateUserThread NtTerminateProcess 3858->3859 3859->3857 3988 278092b GetPEB 3989 2780972 3988->3989 3783 417837 3784 41783f 3783->3784 3787 417563 3784->3787 3811 41726c GlobalAlloc 3784->3811 3788 417566 3787->3788 3789 417581 GetLogicalDriveStringsW 3788->3789 3790 417592 3788->3790 3789->3788 3791 41759f lstrcatW InterlockedExchangeAdd WriteConsoleA 3790->3791 3799 417698 3790->3799 3792 4175da 7 API calls 3791->3792 3797 417663 GetBoundsRect EnumDependentServicesA 3792->3797 3798 41768a 3792->3798 3793 4176b5 GetCommProperties GetTickCount GetLastError 3795 4176e2 GetConsoleAliasesW 3793->3795 3796 4176db ZombifyActCtx 3793->3796 3794 4176a6 GlobalAlloc AddAtomA 3794->3793 3795->3799 3796->3795 3797->3798 3798->3799 3799->3793 3799->3794 3800 417702 FoldStringA 3799->3800 3809 417716 3799->3809 3800->3799 3804 417785 LoadLibraryA 3813 4172a9 3804->3813 3807 4177e8 3818 4174c6 3807->3818 3812 41726c GlobalAlloc 3809->3812 3810 4177ed 3810->3784 3811->3784 3812->3804 3814 4172e8 3813->3814 3815 4172f4 GetModuleHandleW GetProcAddress 3814->3815 3816 4173ca 3814->3816 3815->3814 3817 41728b VirtualProtect 3816->3817 3817->3807 3825 4173ef 3818->3825 3821 417501 3830 417446 3821->3830 3822 4174e9 GetConsoleAliasExesLengthA UnhandledExceptionFilter FindFirstVolumeA 3822->3821 3826 417404 CreateJobObjectA 3825->3826 3827 41740c 3825->3827 3826->3827 3828 417420 OpenJobObjectA BuildCommDCBW LoadLibraryW 3827->3828 3829 41743b 3827->3829 3828->3829 3829->3821 3829->3822 3831 4174a3 3830->3831 3832 417460 3830->3832 3831->3810 3832->3831 3833 417480 GetComputerNameW SleepEx 3832->3833 3833->3832 3890 401496 3891 401447 3890->3891 3891->3890 3892 4015e6 NtDuplicateObject 3891->3892 3900 40152f 3891->3900 3893 401603 NtCreateSection 3892->3893 3892->3900 3894 401683 NtCreateSection 3893->3894 3895 401629 NtMapViewOfSection 3893->3895 3897 4016af 3894->3897 3894->3900 3895->3894 3896 40164c NtMapViewOfSection 3895->3896 3896->3894 3898 40166a 3896->3898 3899 4016b9 NtMapViewOfSection 3897->3899 3897->3900 3898->3894 3899->3900 3901 4016e0 NtMapViewOfSection 3899->3901 3901->3900 3834 402eb7 3835 402eb8 3834->3835 3837 402f44 3835->3837 3838 401918 3835->3838 3839 401929 3838->3839 3840 40195e Sleep 3839->3840 3841 401979 3840->3841 3843 40198a 3841->3843 3844 401538 3841->3844 3843->3837 3845 401539 3844->3845 3846 4015e6 NtDuplicateObject 3845->3846 3854 401702 3845->3854 3847 401603 NtCreateSection 3846->3847 3846->3854 3848 401683 NtCreateSection 3847->3848 3849 401629 NtMapViewOfSection 3847->3849 3851 4016af 3848->3851 3848->3854 3849->3848 3850 40164c NtMapViewOfSection 3849->3850 3850->3848 3852 40166a 3850->3852 3853 4016b9 NtMapViewOfSection 3851->3853 3851->3854 3852->3848 3853->3854 3855 4016e0 NtMapViewOfSection 3853->3855 3854->3843 3855->3854 3860 2904c4d 3863 2904c53 3860->3863 3864 2904c62 3863->3864 3867 29053f3 3864->3867 3868 290540e 3867->3868 3869 2905417 CreateToolhelp32Snapshot 3868->3869 3870 2905433 Module32First 3868->3870 3869->3868 3869->3870 3871 2905442 3870->3871 3872 2904c52 3870->3872 3874 29050b2 3871->3874 3875 29050dd 3874->3875 3876 2905126 3875->3876 3877 29050ee VirtualAlloc 3875->3877 3876->3876 3877->3876 3878 4014de 3879 401447 3878->3879 3880 4015e6 NtDuplicateObject 3879->3880 3888 40152f 3879->3888 3881 401603 NtCreateSection 3880->3881 3880->3888 3882 401683 NtCreateSection 3881->3882 3883 401629 NtMapViewOfSection 3881->3883 3885 4016af 3882->3885 3882->3888 3883->3882 3884 40164c NtMapViewOfSection 3883->3884 3884->3882 3886 40166a 3884->3886 3887 4016b9 NtMapViewOfSection 3885->3887 3885->3888 3886->3882 3887->3888 3889 4016e0 NtMapViewOfSection 3887->3889 3889->3888

                    Control-flow Graph

                    APIs
                    • GetLogicalDriveStringsW.KERNEL32 ref: 00417583
                    • lstrcatW.KERNEL32(?), ref: 004175A7
                    • InterlockedExchangeAdd.KERNEL32(?), ref: 004175B5
                    • WriteConsoleA.KERNEL32(?,?,?,?), ref: 004175CC
                    • lstrcpynW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004175E3
                    • GetAtomNameA.KERNEL32 ref: 004175EC
                    • AreFileApisANSI.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 004175F2
                    • ReadConsoleOutputA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417633
                    • SetVolumeMountPointW.KERNEL32 ref: 0041763B
                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0041764A
                    • EnumCalendarInfoExW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417654
                    • GetBoundsRect.GDI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417666
                    • EnumDependentServicesA.ADVAPI32(?,?,?,?,?,?), ref: 00417684
                    • GlobalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004176A8
                    • AddAtomA.KERNEL32 ref: 004176AF
                    • GetCommProperties.KERNELBASE(?,?), ref: 004176BD
                    • GetTickCount.KERNEL32 ref: 004176C3
                    • GetLastError.KERNEL32(?,?), ref: 004176C9
                    • ZombifyActCtx.KERNEL32(?,?,?), ref: 004176DC
                    • GetConsoleAliasesW.KERNEL32(?,?,?,?,?), ref: 004176EB
                    • FoldStringA.KERNEL32 ref: 00417707
                    • LoadLibraryA.KERNELBASE(00419334,?,?,?), ref: 004177D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Console$AtomEnumFileName$AliasesAllocApisBoundsCalendarCommCountDependentDriveErrorExchangeFoldGlobalInfoInterlockedLastLibraryLoadLogicalModuleMountOutputPointPropertiesReadRectServicesStringStringsTickVolumeWriteZombifylstrcatlstrcpyn
                    • String ID: tl_$}$
                    • API String ID: 1036388966-2845185508
                    • Opcode ID: fd82768a2f5f5100ebe422cff4b44bebee57673d0892a031d8368ecbf9f9351f
                    • Instruction ID: c337e892a2bfc666decf00ee00d585c17180d3179e5cfced3c55a526e8617b32
                    • Opcode Fuzzy Hash: fd82768a2f5f5100ebe422cff4b44bebee57673d0892a031d8368ecbf9f9351f
                    • Instruction Fuzzy Hash: 8B714D71846528AFD725AB61DC48CEF7B7CFF0A355B01846AF50992120CF385A89CFAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 142 401496-4014a5 143 4014a7 142->143 144 40151b-40152d 142->144 145 4014a9-4014b5 143->145 146 4014cf 143->146 153 4014ba 144->153 156 40152f-401535 144->156 148 401471-401472 145->148 149 4014b7-4014b8 145->149 150 4014d6 146->150 154 401473-401484 148->154 152 401449 149->152 149->153 150->150 155 4014d8 150->155 157 40147b-40148e call 4011b7 152->157 158 40144b 152->158 159 401447-401456 153->159 160 4014bc-4014c3 153->160 154->157 155->144 157->142 162 40144c-401470 158->162 159->162 163 4014c5-4014c8 160->163 164 401539-401567 160->164 162->154 163->146 176 401558-401563 164->176 177 40156a-401590 call 4011b7 164->177 176->177 184 401592 177->184 185 401595-40159a 177->185 184->185 187 4015a0-4015b1 185->187 188 4018b8-4018c0 185->188 192 4018b6-4018c5 187->192 193 4015b7-4015e0 187->193 188->185 195 4018da 192->195 196 4018cb-4018d6 192->196 193->192 202 4015e6-4015fd NtDuplicateObject 193->202 195->196 198 4018dd-401915 call 4011b7 195->198 196->198 202->192 204 401603-401627 NtCreateSection 202->204 205 401683-4016a9 NtCreateSection 204->205 206 401629-40164a NtMapViewOfSection 204->206 205->192 209 4016af-4016b3 205->209 206->205 208 40164c-401668 NtMapViewOfSection 206->208 208->205 211 40166a-401680 208->211 209->192 212 4016b9-4016da NtMapViewOfSection 209->212 211->205 212->192 215 4016e0-4016fc NtMapViewOfSection 212->215 215->192 218 401702 call 401707 215->218
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                    • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 220 401538-401567 226 401558-401563 220->226 227 40156a-401590 call 4011b7 220->227 226->227 234 401592 227->234 235 401595-40159a 227->235 234->235 237 4015a0-4015b1 235->237 238 4018b8-4018c0 235->238 242 4018b6-4018c5 237->242 243 4015b7-4015e0 237->243 238->235 245 4018da 242->245 246 4018cb-4018d6 242->246 243->242 252 4015e6-4015fd NtDuplicateObject 243->252 245->246 248 4018dd-401915 call 4011b7 245->248 246->248 252->242 254 401603-401627 NtCreateSection 252->254 255 401683-4016a9 NtCreateSection 254->255 256 401629-40164a NtMapViewOfSection 254->256 255->242 259 4016af-4016b3 255->259 256->255 258 40164c-401668 NtMapViewOfSection 256->258 258->255 261 40166a-401680 258->261 259->242 262 4016b9-4016da NtMapViewOfSection 259->262 261->255 262->242 265 4016e0-4016fc NtMapViewOfSection 262->265 265->242 268 401702 call 401707 265->268
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                    • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 270 4014de-4014ed 271 401563 270->271 272 4014ef 270->272 275 40156a-401590 call 4011b7 271->275 273 401551-401552 272->273 274 4014f1-401502 272->274 273->271 276 401504-401516 274->276 277 40151d-40152d 274->277 292 401592 275->292 293 401595-40159a 275->293 279 40151b-40151c 276->279 282 4014ba 277->282 283 40152f-401535 277->283 279->277 285 401447-401456 282->285 286 4014bc-4014c3 282->286 294 40144c-401470 285->294 289 4014c5-4014c8 286->289 290 401539-401567 286->290 295 4014cf 289->295 290->275 308 401558-401560 290->308 292->293 304 4015a0-4015b1 293->304 305 4018b8-4018c0 293->305 309 401473-401484 294->309 298 4014d6 295->298 298->298 302 4014d8 298->302 302->279 315 4018b6-4018c5 304->315 316 4015b7-4015e0 304->316 305->293 308->271 314 40147b-4014a5 call 4011b7 309->314 314->279 328 4014a7 314->328 320 4018da 315->320 321 4018cb-4018d6 315->321 316->315 331 4015e6-4015fd NtDuplicateObject 316->331 320->321 324 4018dd-401915 call 4011b7 320->324 321->324 328->295 329 4014a9-4014b5 328->329 332 401471-401472 329->332 333 4014b7-4014b8 329->333 331->315 335 401603-401627 NtCreateSection 331->335 332->309 333->282 338 401449 333->338 336 401683-4016a9 NtCreateSection 335->336 337 401629-40164a NtMapViewOfSection 335->337 336->315 342 4016af-4016b3 336->342 337->336 341 40164c-401668 NtMapViewOfSection 337->341 338->314 340 40144b 338->340 340->294 341->336 344 40166a-401680 341->344 342->315 345 4016b9-4016da NtMapViewOfSection 342->345 344->336 345->315 348 4016e0-4016fc NtMapViewOfSection 345->348 348->315 351 401702 call 401707 348->351
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                    • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 353 401543-401544 354 401546-401567 353->354 355 4015af-4015b1 353->355 361 401558-401563 354->361 362 40156a-401590 call 4011b7 354->362 357 4018b6-4018c5 355->357 358 4015b7-4015e0 355->358 363 4018da 357->363 364 4018cb-4018d6 357->364 358->357 374 4015e6-4015fd NtDuplicateObject 358->374 361->362 382 401592 362->382 383 401595-40159a 362->383 363->364 367 4018dd-401915 call 4011b7 363->367 364->367 374->357 377 401603-401627 NtCreateSection 374->377 379 401683-4016a9 NtCreateSection 377->379 380 401629-40164a NtMapViewOfSection 377->380 379->357 385 4016af-4016b3 379->385 380->379 384 40164c-401668 NtMapViewOfSection 380->384 382->383 395 4015a0-4015ad 383->395 396 4018b8-4018c0 383->396 384->379 387 40166a-401680 384->387 385->357 388 4016b9-4016da NtMapViewOfSection 385->388 387->379 388->357 392 4016e0-4016fc NtMapViewOfSection 388->392 392->357 397 401702 call 401707 392->397 395->355 396->383
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                    • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 401 401565-401590 call 4011b7 406 401592 401->406 407 401595-40159a 401->407 406->407 409 4015a0-4015b1 407->409 410 4018b8-4018c0 407->410 414 4018b6-4018c5 409->414 415 4015b7-4015e0 409->415 410->407 417 4018da 414->417 418 4018cb-4018d6 414->418 415->414 424 4015e6-4015fd NtDuplicateObject 415->424 417->418 420 4018dd-401915 call 4011b7 417->420 418->420 424->414 426 401603-401627 NtCreateSection 424->426 427 401683-4016a9 NtCreateSection 426->427 428 401629-40164a NtMapViewOfSection 426->428 427->414 431 4016af-4016b3 427->431 428->427 430 40164c-401668 NtMapViewOfSection 428->430 430->427 433 40166a-401680 430->433 431->414 434 4016b9-4016da NtMapViewOfSection 431->434 433->427 434->414 437 4016e0-4016fc NtMapViewOfSection 434->437 437->414 440 401702 call 401707 437->440
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                    • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 442 401579-401590 call 4011b7 448 401592 442->448 449 401595-40159a 442->449 448->449 451 4015a0-4015b1 449->451 452 4018b8-4018c0 449->452 456 4018b6-4018c5 451->456 457 4015b7-4015e0 451->457 452->449 459 4018da 456->459 460 4018cb-4018d6 456->460 457->456 466 4015e6-4015fd NtDuplicateObject 457->466 459->460 462 4018dd-401915 call 4011b7 459->462 460->462 466->456 468 401603-401627 NtCreateSection 466->468 469 401683-4016a9 NtCreateSection 468->469 470 401629-40164a NtMapViewOfSection 468->470 469->456 473 4016af-4016b3 469->473 470->469 472 40164c-401668 NtMapViewOfSection 470->472 472->469 475 40166a-401680 472->475 473->456 476 4016b9-4016da NtMapViewOfSection 473->476 475->469 476->456 479 4016e0-4016fc NtMapViewOfSection 476->479 479->456 482 401702 call 401707 479->482
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                    • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 484 40157c-401590 call 4011b7 488 401592 484->488 489 401595-40159a 484->489 488->489 491 4015a0-4015b1 489->491 492 4018b8-4018c0 489->492 496 4018b6-4018c5 491->496 497 4015b7-4015e0 491->497 492->489 499 4018da 496->499 500 4018cb-4018d6 496->500 497->496 506 4015e6-4015fd NtDuplicateObject 497->506 499->500 502 4018dd-401915 call 4011b7 499->502 500->502 506->496 508 401603-401627 NtCreateSection 506->508 509 401683-4016a9 NtCreateSection 508->509 510 401629-40164a NtMapViewOfSection 508->510 509->496 513 4016af-4016b3 509->513 510->509 512 40164c-401668 NtMapViewOfSection 510->512 512->509 515 40166a-401680 512->515 513->496 516 4016b9-4016da NtMapViewOfSection 513->516 515->509 516->496 519 4016e0-4016fc NtMapViewOfSection 516->519 519->496 522 401702 call 401707 519->522
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                    • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 524 402fe9-40300d 525 403140-403145 524->525 526 403013-40302b 524->526 526->525 527 403031-403042 526->527 528 403044-40304d 527->528 529 403052-403060 528->529 529->529 530 403062-403069 529->530 531 40308b-403092 530->531 532 40306b-40308a 530->532 533 4030b4-4030b7 531->533 534 403094-4030b3 531->534 532->531 535 4030c0 533->535 536 4030b9-4030bc 533->536 534->533 535->528 538 4030c2-4030c7 535->538 536->535 537 4030be 536->537 537->538 538->525 539 4030c9-4030cc 538->539 539->525 540 4030ce-40313d RtlCreateUserThread NtTerminateProcess 539->540 540->525
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                    • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 541 29053f3-290540c 542 290540e-2905410 541->542 543 2905412 542->543 544 2905417-2905423 CreateToolhelp32Snapshot 542->544 543->544 545 2905433-2905440 Module32First 544->545 546 2905425-290542b 544->546 547 2905442-2905443 call 29050b2 545->547 548 2905449-2905451 545->548 546->545 551 290542d-2905431 546->551 552 2905448 547->552 551->542 551->545 552->548
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0290541B
                    • Module32First.KERNEL32(00000000,00000224), ref: 0290543B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, Offset: 02902000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2902000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: f46862f4a89514175ebcb103b1969f4a25bbc3ddb3232db5dc2a66f94e0944d8
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: A0F096361007196FE7303BF998CCBAE76ECBF49625F910528E64AE14C0DB70E8458E61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 57 278003c-2780047 58 2780049 57->58 59 278004c-2780263 call 2780a3f call 2780e0f call 2780d90 VirtualAlloc 57->59 58->59 74 278028b-2780292 59->74 75 2780265-2780289 call 2780a69 59->75 77 27802a1-27802b0 74->77 79 27802ce-27803c2 VirtualProtect call 2780cce call 2780ce7 75->79 77->79 80 27802b2-27802cc 77->80 86 27803d1-27803e0 79->86 80->77 87 2780439-27804b8 VirtualFree 86->87 88 27803e2-2780437 call 2780ce7 86->88 90 27804be-27804cd 87->90 91 27805f4-27805fe 87->91 88->86 93 27804d3-27804dd 90->93 94 278077f-2780789 91->94 95 2780604-278060d 91->95 93->91 97 27804e3-2780505 93->97 98 278078b-27807a3 94->98 99 27807a6-27807b0 94->99 95->94 100 2780613-2780637 95->100 108 2780517-2780520 97->108 109 2780507-2780515 97->109 98->99 101 278086e-27808be LoadLibraryA 99->101 102 27807b6-27807cb 99->102 103 278063e-2780648 100->103 107 27808c7-27808f9 101->107 105 27807d2-27807d5 102->105 103->94 106 278064e-278065a 103->106 110 2780824-2780833 105->110 111 27807d7-27807e0 105->111 106->94 112 2780660-278066a 106->112 113 27808fb-2780901 107->113 114 2780902-278091d 107->114 115 2780526-2780547 108->115 109->115 119 2780839-278083c 110->119 116 27807e2 111->116 117 27807e4-2780822 111->117 118 278067a-2780689 112->118 113->114 123 278054d-2780550 115->123 116->110 117->105 120 278068f-27806b2 118->120 121 2780750-278077a 118->121 119->101 122 278083e-2780847 119->122 124 27806ef-27806fc 120->124 125 27806b4-27806ed 120->125 121->103 126 2780849 122->126 127 278084b-278086c 122->127 129 27805e0-27805ef 123->129 130 2780556-278056b 123->130 131 278074b 124->131 132 27806fe-2780748 124->132 125->124 126->101 127->119 129->93 133 278056d 130->133 134 278056f-278057a 130->134 131->118 132->131 133->129 135 278059b-27805bb 134->135 136 278057c-2780599 134->136 141 27805bd-27805db 135->141 136->141 141->123
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0278024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2780000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: a4c1a54ca1671e26896132eb019021d556adb1bf3110f27a521c93bc695f7723
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: F9527A75A01229DFDB64DF58C985BACBBB1BF09304F1480D9E94DAB351DB30AA89CF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 554 2780e0f-2780e24 SetErrorMode * 2 555 2780e2b-2780e2c 554->555 556 2780e26 554->556 556->555
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02780223,?,?), ref: 02780E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02780223,?,?), ref: 02780E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2780000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: f6a11d2642f841788712fd3fb4466327a69264ddbeb3d06e509809cb3da93180
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: DFD0123214512877D7003A94DC09BCE7B1CDF05B66F008011FB0DD9080C770954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 557 417281-4172a8 VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004172A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: c04486495eed5e6dbf2470bb661178ef27c2a2f5ef0e98159f06f32856b59bfb
                    • Instruction ID: 8a4230ab123233aabef7d28320d1178f5dcbf77dbea1573d660b800153dc6fc6
                    • Opcode Fuzzy Hash: c04486495eed5e6dbf2470bb661178ef27c2a2f5ef0e98159f06f32856b59bfb
                    • Instruction Fuzzy Hash: 40D0C7F298110DFFD7014751FC46EAD7758F700208B414425B60196095D571DA195A68

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 559 41728b-4172a8 VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004172A1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: f40be90a6b9cf017761482dbdc03c08947fcc7cef7bc373eb03b93442176ba44
                    • Instruction ID: 42596a48be4a73469ceac527ad77617db506126677980c5308fff2ef6ba82b4e
                    • Opcode Fuzzy Hash: f40be90a6b9cf017761482dbdc03c08947fcc7cef7bc373eb03b93442176ba44
                    • Instruction Fuzzy Hash: 55C08CB194020CFFDB018B91FC41EAD7BACF700208F408020B701A1068CAB1AD289F7C
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                    • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                    • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02905103
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, Offset: 02902000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2902000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: d86d90096cd8515d31401459c90cb04889502324d653f5633e12d3453e344e77
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: A9112B79A00208EFDB01DF98C985E98BBF5AF08351F058094F9489B3A1D371EA50EF80
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                    • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                    • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767957239.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                    • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                    APIs
                    • GlobalAlloc.KERNELBASE(00000000), ref: 00417274
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: AllocGlobal
                    • String ID:
                    • API String ID: 3761449716-0
                    • Opcode ID: 893e26f448ebf4bbc259768371f1dde0777009f6c19464b9e8095a89339996d6
                    • Instruction ID: 73e1cc3b37fe0941eda421cfc7a02709b7034a7b41b5e80ed6d4a23660890198
                    • Opcode Fuzzy Hash: 893e26f448ebf4bbc259768371f1dde0777009f6c19464b9e8095a89339996d6
                    • Instruction Fuzzy Hash: 44B01270882304CFDB004F60A844B0C3E70B308342F41C414F50045158CF7004289F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2780000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: e776f8af7ad6e00c27cf0fe8fa7ddbee1d7dce2944122411ae565baa21e1a392
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 2F314AB6940609DFDB10DF99C884AAEBBF9FF48324F15404AD841A7310D771EA49CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769690648.0000000002902000.00000040.00000020.00020000.00000000.sdmp, Offset: 02902000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2902000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: 84ff49b1c0d5e1bc5ceb1c0e0fd3a41049a9ff2e94943246c4bfdd0e7ab75fd0
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: D4118E72340104AFD754DF55DCD0FA673EAEF88224B298065EE09CB356D775E801CB60
                    Memory Dump Source
                    • Source File: 00000000.00000002.1769019739.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Offset: 02780000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2780000_6IMo1kM9CC.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: 110e7a00586266de584b1cb35a597225523da46c76988485b301bfda87e2ff6a
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 8D01F272A506008FDF21EF20C805BAB33E5FB86306F0540A4D90A97282E370A8498B90
                    APIs
                    • CreateJobObjectA.KERNEL32(00000000,00000000), ref: 00417406
                    • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 00417423
                    • BuildCommDCBW.KERNEL32(00000000,?), ref: 0041742E
                    • LoadLibraryW.KERNEL32(00000000), ref: 00417435
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: Object$BuildCommCreateLibraryLoadOpen
                    • String ID:
                    • API String ID: 2043902199-0
                    • Opcode ID: 4bb0f1695e520d0dff9fda42dc358116811667cdb63e5ca5e144bcde7bc1e8dd
                    • Instruction ID: 25f3264881d2a2fbfc0e34833422a50938ac5ccce0db5823749297afc72f0be7
                    • Opcode Fuzzy Hash: 4bb0f1695e520d0dff9fda42dc358116811667cdb63e5ca5e144bcde7bc1e8dd
                    • Instruction Fuzzy Hash: 98E03930802628EF8711AB61EC489DF7FACFF0A355B41C028F40592105DB78494ACFF9
                    APIs
                    • GetModuleHandleW.KERNEL32(02705260), ref: 00417375
                    • GetProcAddress.KERNEL32(00000000,0041D330), ref: 004173B2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID:
                    • API String ID: 1646373207-3916222277
                    • Opcode ID: 0b7afb594f6906e9f441c856b2ecfdae5aae721a7cfa1979d861c31ff28421fe
                    • Instruction ID: e54cd89ef08cd73da79ee730c9072c33f668225b3b98329911bdc04349c295a3
                    • Opcode Fuzzy Hash: 0b7afb594f6906e9f441c856b2ecfdae5aae721a7cfa1979d861c31ff28421fe
                    • Instruction Fuzzy Hash: EF3198B5D9C3C8E8F301C7A4BA897623B51AF15B04F44855AD9508B2E5D7F60458C72F
                    APIs
                    • GetComputerNameW.KERNEL32(?,?), ref: 0041748E
                    • SleepEx.KERNEL32(00000000,00000000), ref: 00417498
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1767977226.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_6IMo1kM9CC.jbxd
                    Similarity
                    • API ID: ComputerNameSleep
                    • String ID: -
                    • API String ID: 3354815184-2547889144
                    • Opcode ID: 3fc6961d2e4972b334fa5a6d002c89b8946e1864f305b9616412148f79052c6d
                    • Instruction ID: 81026da3e40ff619b77a564ad1d8e362b37520017f41c513db548dfde443d807
                    • Opcode Fuzzy Hash: 3fc6961d2e4972b334fa5a6d002c89b8946e1864f305b9616412148f79052c6d
                    • Instruction Fuzzy Hash: 3C01A27190021896C760DF64D881BDABBF8FB08324F5181AAE58596181CE385ACC8FD9

                    Execution Graph

                    Execution Coverage:8.3%
                    Dynamic/Decrypted Code Coverage:20.7%
                    Signature Coverage:0%
                    Total number of Nodes:140
                    Total number of Limit Nodes:5
                    execution_graph 4047 417281 4048 41728b VirtualProtect 4047->4048 3977 401543 3978 401546 3977->3978 3979 4015e6 NtDuplicateObject 3978->3979 3981 401702 3978->3981 3980 401603 NtCreateSection 3979->3980 3979->3981 3982 401683 NtCreateSection 3980->3982 3983 401629 NtMapViewOfSection 3980->3983 3982->3981 3984 4016af 3982->3984 3983->3982 3985 40164c NtMapViewOfSection 3983->3985 3984->3981 3986 4016b9 NtMapViewOfSection 3984->3986 3985->3982 3988 40166a 3985->3988 3986->3981 3987 4016e0 NtMapViewOfSection 3986->3987 3987->3981 3988->3982 4043 402e63 4044 402e67 4043->4044 4045 401918 8 API calls 4044->4045 4046 402f44 4044->4046 4045->4046 4037 401924 4038 401929 4037->4038 4039 40195e Sleep 4038->4039 4040 401979 4039->4040 4041 401538 7 API calls 4040->4041 4042 40198a 4040->4042 4041->4042 3924 274003c 3925 2740049 3924->3925 3937 2740e0f SetErrorMode SetErrorMode 3925->3937 3930 2740265 3931 27402ce VirtualProtect 3930->3931 3933 274030b 3931->3933 3932 2740439 VirtualFree 3936 27404be LoadLibraryA 3932->3936 3933->3932 3935 27408c7 3936->3935 3938 2740223 3937->3938 3939 2740d90 3938->3939 3940 2740dad 3939->3940 3941 2740dbb GetPEB 3940->3941 3942 2740238 VirtualAlloc 3940->3942 3941->3942 3942->3930 3943 402fe9 3944 403140 3943->3944 3945 403013 3943->3945 3945->3944 3946 4030ce RtlCreateUserThread NtTerminateProcess 3945->3946 3946->3944 3833 28e305d 3836 28e3063 3833->3836 3837 28e3072 3836->3837 3840 28e3803 3837->3840 3841 28e381e 3840->3841 3842 28e3827 CreateToolhelp32Snapshot 3841->3842 3843 28e3843 Module32First 3841->3843 3842->3841 3842->3843 3844 28e3062 3843->3844 3845 28e3852 3843->3845 3847 28e34c2 3845->3847 3848 28e34ed 3847->3848 3849 28e34fe VirtualAlloc 3848->3849 3850 28e3536 3848->3850 3849->3850 3850->3850 3851 417837 3852 41783f 3851->3852 3855 417563 3852->3855 3879 41726c GlobalAlloc 3852->3879 3856 417566 3855->3856 3857 417581 GetLogicalDriveStringsW 3856->3857 3858 417592 3856->3858 3857->3856 3859 41759f lstrcatW InterlockedExchangeAdd WriteConsoleA 3858->3859 3867 417698 3858->3867 3860 4175da 7 API calls 3859->3860 3863 417663 GetBoundsRect EnumDependentServicesA 3860->3863 3864 41768a 3860->3864 3861 4176b5 GetCommProperties GetTickCount GetLastError 3865 4176e2 GetConsoleAliasesW 3861->3865 3866 4176db ZombifyActCtx 3861->3866 3862 4176a6 GlobalAlloc AddAtomA 3862->3861 3863->3864 3864->3867 3865->3867 3866->3865 3867->3861 3867->3862 3868 417702 FoldStringA 3867->3868 3869 417716 3867->3869 3868->3867 3880 41726c GlobalAlloc 3869->3880 3871 417785 LoadLibraryA 3881 4172a9 3871->3881 3876 4177e8 3886 4174c6 3876->3886 3878 4177ed 3878->3852 3879->3852 3880->3871 3882 4172e8 3881->3882 3883 4172f4 GetModuleHandleW GetProcAddress 3882->3883 3884 4173ca 3882->3884 3883->3882 3885 41728b VirtualProtect 3884->3885 3885->3876 3893 4173ef 3886->3893 3889 417501 3898 417446 3889->3898 3890 4174e9 GetConsoleAliasExesLengthA UnhandledExceptionFilter FindFirstVolumeA 3890->3889 3894 417404 CreateJobObjectA 3893->3894 3895 41740c 3893->3895 3894->3895 3896 417420 OpenJobObjectA BuildCommDCBW LoadLibraryW 3895->3896 3897 41743b 3895->3897 3896->3897 3897->3889 3897->3890 3899 4174a3 3898->3899 3900 417460 3898->3900 3899->3878 3900->3899 3901 417480 GetComputerNameW SleepEx 3900->3901 3901->3900 3959 401496 3960 401447 3959->3960 3960->3959 3961 4015e6 NtDuplicateObject 3960->3961 3968 40152f 3960->3968 3962 401603 NtCreateSection 3961->3962 3961->3968 3963 401683 NtCreateSection 3962->3963 3964 401629 NtMapViewOfSection 3962->3964 3965 4016af 3963->3965 3963->3968 3964->3963 3966 40164c NtMapViewOfSection 3964->3966 3967 4016b9 NtMapViewOfSection 3965->3967 3965->3968 3966->3963 3969 40166a 3966->3969 3967->3968 3970 4016e0 NtMapViewOfSection 3967->3970 3969->3963 3970->3968 3902 402eb7 3903 402eb8 3902->3903 3905 402f44 3903->3905 3906 401918 3903->3906 3907 401929 3906->3907 3908 40195e Sleep 3907->3908 3909 401979 3908->3909 3911 40198a 3909->3911 3912 401538 3909->3912 3911->3905 3913 401539 3912->3913 3914 4015e6 NtDuplicateObject 3913->3914 3923 401702 3913->3923 3915 401603 NtCreateSection 3914->3915 3914->3923 3916 401683 NtCreateSection 3915->3916 3917 401629 NtMapViewOfSection 3915->3917 3918 4016af 3916->3918 3916->3923 3917->3916 3919 40164c NtMapViewOfSection 3917->3919 3920 4016b9 NtMapViewOfSection 3918->3920 3918->3923 3919->3916 3921 40166a 3919->3921 3922 4016e0 NtMapViewOfSection 3920->3922 3920->3923 3921->3916 3922->3923 3923->3911 3947 4014de 3948 401447 3947->3948 3949 40152f 3948->3949 3950 4015e6 NtDuplicateObject 3948->3950 3950->3949 3951 401603 NtCreateSection 3950->3951 3952 401683 NtCreateSection 3951->3952 3953 401629 NtMapViewOfSection 3951->3953 3952->3949 3954 4016af 3952->3954 3953->3952 3955 40164c NtMapViewOfSection 3953->3955 3954->3949 3956 4016b9 NtMapViewOfSection 3954->3956 3955->3952 3957 40166a 3955->3957 3956->3949 3958 4016e0 NtMapViewOfSection 3956->3958 3957->3952 3958->3949 4057 274092b GetPEB 4058 2740972 4057->4058

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 142 401496-4014a5 143 4014a7 142->143 144 40151b-40152d 142->144 145 4014a9-4014b5 143->145 146 4014cf 143->146 153 4014ba 144->153 154 40152f-401535 144->154 148 401471-401472 145->148 149 4014b7-4014b8 145->149 151 4014d6 146->151 155 401473-401484 148->155 152 401449 149->152 149->153 151->151 156 4014d8 151->156 157 40147b-40148e call 4011b7 152->157 158 40144b 152->158 159 401447-401456 153->159 160 4014bc-4014c3 153->160 155->157 156->144 157->142 162 40144c-401470 158->162 159->162 163 4014c5-4014c8 160->163 164 401539-401567 160->164 162->155 163->146 176 401558-401563 164->176 177 40156a-401590 call 4011b7 164->177 176->177 184 401592 177->184 185 401595-40159a 177->185 184->185 187 4015a0-4015b1 185->187 188 4018b8-4018c0 185->188 192 4018b6-4018c5 187->192 193 4015b7-4015e0 187->193 188->185 196 4018da 192->196 197 4018cb-4018d6 192->197 193->192 201 4015e6-4015fd NtDuplicateObject 193->201 196->197 198 4018dd-401915 call 4011b7 196->198 197->198 201->192 204 401603-401627 NtCreateSection 201->204 206 401683-4016a9 NtCreateSection 204->206 207 401629-40164a NtMapViewOfSection 204->207 206->192 208 4016af-4016b3 206->208 207->206 209 40164c-401668 NtMapViewOfSection 207->209 208->192 211 4016b9-4016da NtMapViewOfSection 208->211 209->206 213 40166a-401680 209->213 211->192 214 4016e0-4016fc NtMapViewOfSection 211->214 213->206 214->192 216 401702 call 401707 214->216
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                    • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 220 401538-401567 226 401558-401563 220->226 227 40156a-401590 call 4011b7 220->227 226->227 234 401592 227->234 235 401595-40159a 227->235 234->235 237 4015a0-4015b1 235->237 238 4018b8-4018c0 235->238 242 4018b6-4018c5 237->242 243 4015b7-4015e0 237->243 238->235 246 4018da 242->246 247 4018cb-4018d6 242->247 243->242 251 4015e6-4015fd NtDuplicateObject 243->251 246->247 248 4018dd-401915 call 4011b7 246->248 247->248 251->242 254 401603-401627 NtCreateSection 251->254 256 401683-4016a9 NtCreateSection 254->256 257 401629-40164a NtMapViewOfSection 254->257 256->242 258 4016af-4016b3 256->258 257->256 259 40164c-401668 NtMapViewOfSection 257->259 258->242 261 4016b9-4016da NtMapViewOfSection 258->261 259->256 263 40166a-401680 259->263 261->242 264 4016e0-4016fc NtMapViewOfSection 261->264 263->256 264->242 266 401702 call 401707 264->266
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                    • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 270 4014de-4014ed 271 401563 270->271 272 4014ef 270->272 273 40156a-401590 call 4011b7 271->273 274 401551-401552 272->274 275 4014f1-401502 272->275 294 401592 273->294 295 401595-40159a 273->295 274->271 277 401504-401516 275->277 278 40151d-40152d 275->278 281 40151b-40151c 277->281 282 4014ba 278->282 283 40152f-401535 278->283 281->278 285 401447-401456 282->285 286 4014bc-4014c3 282->286 292 40144c-401470 285->292 288 4014c5-4014c8 286->288 289 401539-401567 286->289 293 4014cf 288->293 289->273 308 401558-401560 289->308 309 401473-401484 292->309 298 4014d6 293->298 294->295 306 4015a0-4015b1 295->306 307 4018b8-4018c0 295->307 298->298 301 4014d8 298->301 301->281 315 4018b6-4018c5 306->315 316 4015b7-4015e0 306->316 307->295 308->271 314 40147b-4014a5 call 4011b7 309->314 314->281 328 4014a7 314->328 321 4018da 315->321 322 4018cb-4018d6 315->322 316->315 330 4015e6-4015fd NtDuplicateObject 316->330 321->322 324 4018dd-401915 call 4011b7 321->324 322->324 328->293 329 4014a9-4014b5 328->329 332 401471-401472 329->332 333 4014b7-4014b8 329->333 330->315 335 401603-401627 NtCreateSection 330->335 332->309 333->282 336 401449 333->336 338 401683-4016a9 NtCreateSection 335->338 339 401629-40164a NtMapViewOfSection 335->339 336->314 340 40144b 336->340 338->315 341 4016af-4016b3 338->341 339->338 342 40164c-401668 NtMapViewOfSection 339->342 340->292 341->315 344 4016b9-4016da NtMapViewOfSection 341->344 342->338 346 40166a-401680 342->346 344->315 347 4016e0-4016fc NtMapViewOfSection 344->347 346->338 347->315 349 401702 call 401707 347->349
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                    • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 353 401543-401544 354 401546-401567 353->354 355 4015af-4015b1 353->355 361 401558-401563 354->361 362 40156a-401590 call 4011b7 354->362 356 4018b6-4018c5 355->356 357 4015b7-4015e0 355->357 364 4018da 356->364 365 4018cb-4018d6 356->365 357->356 373 4015e6-4015fd NtDuplicateObject 357->373 361->362 383 401592 362->383 384 401595-40159a 362->384 364->365 368 4018dd-401915 call 4011b7 364->368 365->368 373->356 377 401603-401627 NtCreateSection 373->377 380 401683-4016a9 NtCreateSection 377->380 381 401629-40164a NtMapViewOfSection 377->381 380->356 382 4016af-4016b3 380->382 381->380 385 40164c-401668 NtMapViewOfSection 381->385 382->356 387 4016b9-4016da NtMapViewOfSection 382->387 383->384 396 4015a0-4015ad 384->396 397 4018b8-4018c0 384->397 385->380 389 40166a-401680 385->389 387->356 390 4016e0-4016fc NtMapViewOfSection 387->390 389->380 390->356 393 401702 call 401707 390->393 396->355 397->384
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                    • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 401 401565-401590 call 4011b7 406 401592 401->406 407 401595-40159a 401->407 406->407 409 4015a0-4015b1 407->409 410 4018b8-4018c0 407->410 414 4018b6-4018c5 409->414 415 4015b7-4015e0 409->415 410->407 418 4018da 414->418 419 4018cb-4018d6 414->419 415->414 423 4015e6-4015fd NtDuplicateObject 415->423 418->419 420 4018dd-401915 call 4011b7 418->420 419->420 423->414 426 401603-401627 NtCreateSection 423->426 428 401683-4016a9 NtCreateSection 426->428 429 401629-40164a NtMapViewOfSection 426->429 428->414 430 4016af-4016b3 428->430 429->428 431 40164c-401668 NtMapViewOfSection 429->431 430->414 433 4016b9-4016da NtMapViewOfSection 430->433 431->428 435 40166a-401680 431->435 433->414 436 4016e0-4016fc NtMapViewOfSection 433->436 435->428 436->414 438 401702 call 401707 436->438
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                    • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 442 401579-401590 call 4011b7 448 401592 442->448 449 401595-40159a 442->449 448->449 451 4015a0-4015b1 449->451 452 4018b8-4018c0 449->452 456 4018b6-4018c5 451->456 457 4015b7-4015e0 451->457 452->449 460 4018da 456->460 461 4018cb-4018d6 456->461 457->456 465 4015e6-4015fd NtDuplicateObject 457->465 460->461 462 4018dd-401915 call 4011b7 460->462 461->462 465->456 468 401603-401627 NtCreateSection 465->468 470 401683-4016a9 NtCreateSection 468->470 471 401629-40164a NtMapViewOfSection 468->471 470->456 472 4016af-4016b3 470->472 471->470 473 40164c-401668 NtMapViewOfSection 471->473 472->456 475 4016b9-4016da NtMapViewOfSection 472->475 473->470 477 40166a-401680 473->477 475->456 478 4016e0-4016fc NtMapViewOfSection 475->478 477->470 478->456 480 401702 call 401707 478->480
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                    • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 484 40157c-401590 call 4011b7 488 401592 484->488 489 401595-40159a 484->489 488->489 491 4015a0-4015b1 489->491 492 4018b8-4018c0 489->492 496 4018b6-4018c5 491->496 497 4015b7-4015e0 491->497 492->489 500 4018da 496->500 501 4018cb-4018d6 496->501 497->496 505 4015e6-4015fd NtDuplicateObject 497->505 500->501 502 4018dd-401915 call 4011b7 500->502 501->502 505->496 508 401603-401627 NtCreateSection 505->508 510 401683-4016a9 NtCreateSection 508->510 511 401629-40164a NtMapViewOfSection 508->511 510->496 512 4016af-4016b3 510->512 511->510 513 40164c-401668 NtMapViewOfSection 511->513 512->496 515 4016b9-4016da NtMapViewOfSection 512->515 513->510 517 40166a-401680 513->517 515->496 518 4016e0-4016fc NtMapViewOfSection 515->518 517->510 518->496 520 401702 call 401707 518->520
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                    • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 524 402fe9-40300d 525 403140-403145 524->525 526 403013-40302b 524->526 526->525 527 403031-403042 526->527 528 403044-40304d 527->528 529 403052-403060 528->529 529->529 530 403062-403069 529->530 531 40308b-403092 530->531 532 40306b-40308a 530->532 533 4030b4-4030b7 531->533 534 403094-4030b3 531->534 532->531 535 4030c0 533->535 536 4030b9-4030bc 533->536 534->533 535->528 538 4030c2-4030c7 535->538 536->535 537 4030be 536->537 537->538 538->525 539 4030c9-4030cc 538->539 539->525 540 4030ce-40313d RtlCreateUserThread NtTerminateProcess 539->540 540->525
                    APIs
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                    • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                    Control-flow Graph

                    APIs
                    • GetLogicalDriveStringsW.KERNEL32 ref: 00417583
                    • lstrcatW.KERNEL32(?), ref: 004175A7
                    • InterlockedExchangeAdd.KERNEL32(?), ref: 004175B5
                    • WriteConsoleA.KERNEL32(?,?,?,?), ref: 004175CC
                    • lstrcpynW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004175E3
                    • GetAtomNameA.KERNEL32 ref: 004175EC
                    • AreFileApisANSI.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 004175F2
                    • ReadConsoleOutputA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417633
                    • SetVolumeMountPointW.KERNEL32 ref: 0041763B
                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0041764A
                    • EnumCalendarInfoExW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417654
                    • GetBoundsRect.GDI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00417666
                    • EnumDependentServicesA.ADVAPI32(?,?,?,?,?,?), ref: 00417684
                    • GlobalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004176A8
                    • AddAtomA.KERNEL32 ref: 004176AF
                    • GetCommProperties.KERNELBASE(?,?), ref: 004176BD
                    • GetTickCount.KERNEL32 ref: 004176C3
                    • GetLastError.KERNEL32(?,?), ref: 004176C9
                    • ZombifyActCtx.KERNEL32(?,?,?), ref: 004176DC
                    • GetConsoleAliasesW.KERNEL32(?,?,?,?,?), ref: 004176EB
                    • FoldStringA.KERNEL32 ref: 00417707
                    • LoadLibraryA.KERNELBASE(00419334,?,?,?), ref: 004177D8
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: Console$AtomEnumFileName$AliasesAllocApisBoundsCalendarCommCountDependentDriveErrorExchangeFoldGlobalInfoInterlockedLastLibraryLoadLogicalModuleMountOutputPointPropertiesReadRectServicesStringStringsTickVolumeWriteZombifylstrcatlstrcpyn
                    • String ID: tl_$}$
                    • API String ID: 1036388966-2845185508
                    • Opcode ID: fd82768a2f5f5100ebe422cff4b44bebee57673d0892a031d8368ecbf9f9351f
                    • Instruction ID: c337e892a2bfc666decf00ee00d585c17180d3179e5cfced3c55a526e8617b32
                    • Opcode Fuzzy Hash: fd82768a2f5f5100ebe422cff4b44bebee57673d0892a031d8368ecbf9f9351f
                    • Instruction Fuzzy Hash: 8B714D71846528AFD725AB61DC48CEF7B7CFF0A355B01846AF50992120CF385A89CFAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 57 274003c-2740047 58 274004c-2740263 call 2740a3f call 2740e0f call 2740d90 VirtualAlloc 57->58 59 2740049 57->59 74 2740265-2740289 call 2740a69 58->74 75 274028b-2740292 58->75 59->58 80 27402ce-27403c2 VirtualProtect call 2740cce call 2740ce7 74->80 77 27402a1-27402b0 75->77 79 27402b2-27402cc 77->79 77->80 79->77 86 27403d1-27403e0 80->86 87 27403e2-2740437 call 2740ce7 86->87 88 2740439-27404b8 VirtualFree 86->88 87->86 90 27405f4-27405fe 88->90 91 27404be-27404cd 88->91 94 2740604-274060d 90->94 95 274077f-2740789 90->95 93 27404d3-27404dd 91->93 93->90 97 27404e3-2740505 93->97 94->95 100 2740613-2740637 94->100 98 27407a6-27407b0 95->98 99 274078b-27407a3 95->99 109 2740517-2740520 97->109 110 2740507-2740515 97->110 101 27407b6-27407cb 98->101 102 274086e-27408be LoadLibraryA 98->102 99->98 103 274063e-2740648 100->103 105 27407d2-27407d5 101->105 108 27408c7-27408f9 102->108 103->95 106 274064e-274065a 103->106 111 2740824-2740833 105->111 112 27407d7-27407e0 105->112 106->95 107 2740660-274066a 106->107 113 274067a-2740689 107->113 115 2740902-274091d 108->115 116 27408fb-2740901 108->116 117 2740526-2740547 109->117 110->117 114 2740839-274083c 111->114 118 27407e4-2740822 112->118 119 27407e2 112->119 120 2740750-274077a 113->120 121 274068f-27406b2 113->121 114->102 122 274083e-2740847 114->122 116->115 123 274054d-2740550 117->123 118->105 119->111 120->103 126 27406b4-27406ed 121->126 127 27406ef-27406fc 121->127 128 2740849 122->128 129 274084b-274086c 122->129 124 2740556-274056b 123->124 125 27405e0-27405ef 123->125 131 274056d 124->131 132 274056f-274057a 124->132 125->93 126->127 133 27406fe-2740748 127->133 134 274074b 127->134 128->102 129->114 131->125 135 274057c-2740599 132->135 136 274059b-27405bb 132->136 133->134 134->113 141 27405bd-27405db 135->141 136->141 141->123
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0274024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2052896799.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_2740000_feuiuvb.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 42aabaa1e70d2f6ffd630ad4c005417da12345a2509f65d942aadd5818301568
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: F7526974A01229DFDB64CF68C985BACBBB1BF09304F1480D9E94DAB351DB30AA85DF15

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 541 28e3803-28e381c 542 28e381e-28e3820 541->542 543 28e3827-28e3833 CreateToolhelp32Snapshot 542->543 544 28e3822 542->544 545 28e3835-28e383b 543->545 546 28e3843-28e3850 Module32First 543->546 544->543 545->546 551 28e383d-28e3841 545->551 547 28e3859-28e3861 546->547 548 28e3852-28e3853 call 28e34c2 546->548 552 28e3858 548->552 551->542 551->546 552->547
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 028E382B
                    • Module32First.KERNEL32(00000000,00000224), ref: 028E384B
                    Memory Dump Source
                    • Source File: 00000005.00000002.2053174181.00000000028E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_28e0000_feuiuvb.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 5b27c27f80b4c4bad2b38636973d9da4abb520ff992c4e38eea1cd77ce7a2c85
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: BAF0963D2007217FEB203BF9988DB7E77E8AF4A625F104568E667D25C0DBB0EC454A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 554 2740e0f-2740e24 SetErrorMode * 2 555 2740e26 554->555 556 2740e2b-2740e2c 554->556 555->556
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02740223,?,?), ref: 02740E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02740223,?,?), ref: 02740E1E
                    Memory Dump Source
                    • Source File: 00000005.00000002.2052896799.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_2740000_feuiuvb.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: fdeee57af89029a09c22fedf6fa711502ae553cde1b268739bb7a153ea205ffe
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 9CD0123114512877D7003A94DC09BCD7B1CDF05B66F008011FB0DD9080CB70954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 557 417281-4172a8 VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004172A1
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: c04486495eed5e6dbf2470bb661178ef27c2a2f5ef0e98159f06f32856b59bfb
                    • Instruction ID: 8a4230ab123233aabef7d28320d1178f5dcbf77dbea1573d660b800153dc6fc6
                    • Opcode Fuzzy Hash: c04486495eed5e6dbf2470bb661178ef27c2a2f5ef0e98159f06f32856b59bfb
                    • Instruction Fuzzy Hash: 40D0C7F298110DFFD7014751FC46EAD7758F700208B414425B60196095D571DA195A68

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 559 41728b-4172a8 VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004172A1
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: f40be90a6b9cf017761482dbdc03c08947fcc7cef7bc373eb03b93442176ba44
                    • Instruction ID: 42596a48be4a73469ceac527ad77617db506126677980c5308fff2ef6ba82b4e
                    • Opcode Fuzzy Hash: f40be90a6b9cf017761482dbdc03c08947fcc7cef7bc373eb03b93442176ba44
                    • Instruction Fuzzy Hash: 55C08CB194020CFFDB018B91FC41EAD7BACF700208F408020B701A1068CAB1AD289F7C
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                    • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                    • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 028E3513
                    Memory Dump Source
                    • Source File: 00000005.00000002.2053174181.00000000028E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_28e0000_feuiuvb.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 0759b984d5773a33e78821d49ac9f4ff7bc78e0ff925099dc14c12501577a9d8
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 93113979A00208EFDB01DF98C985E98BBF5AF09751F0580A4F9499B361D771EA90DF80
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                    • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                    • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051649944.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_400000_feuiuvb.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                    • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                    APIs
                    • GlobalAlloc.KERNELBASE(00000000), ref: 00417274
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: AllocGlobal
                    • String ID:
                    • API String ID: 3761449716-0
                    • Opcode ID: 893e26f448ebf4bbc259768371f1dde0777009f6c19464b9e8095a89339996d6
                    • Instruction ID: 73e1cc3b37fe0941eda421cfc7a02709b7034a7b41b5e80ed6d4a23660890198
                    • Opcode Fuzzy Hash: 893e26f448ebf4bbc259768371f1dde0777009f6c19464b9e8095a89339996d6
                    • Instruction Fuzzy Hash: 44B01270882304CFDB004F60A844B0C3E70B308342F41C414F50045158CF7004289F30
                    APIs
                    • CreateJobObjectA.KERNEL32(00000000,00000000), ref: 00417406
                    • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 00417423
                    • BuildCommDCBW.KERNEL32(00000000,?), ref: 0041742E
                    • LoadLibraryW.KERNEL32(00000000), ref: 00417435
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: Object$BuildCommCreateLibraryLoadOpen
                    • String ID:
                    • API String ID: 2043902199-0
                    • Opcode ID: 4bb0f1695e520d0dff9fda42dc358116811667cdb63e5ca5e144bcde7bc1e8dd
                    • Instruction ID: 25f3264881d2a2fbfc0e34833422a50938ac5ccce0db5823749297afc72f0be7
                    • Opcode Fuzzy Hash: 4bb0f1695e520d0dff9fda42dc358116811667cdb63e5ca5e144bcde7bc1e8dd
                    • Instruction Fuzzy Hash: 98E03930802628EF8711AB61EC489DF7FACFF0A355B41C028F40592105DB78494ACFF9
                    APIs
                    • GetModuleHandleW.KERNEL32(02705260), ref: 00417375
                    • GetProcAddress.KERNEL32(00000000,0041D330), ref: 004173B2
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID:
                    • API String ID: 1646373207-3916222277
                    • Opcode ID: 0b7afb594f6906e9f441c856b2ecfdae5aae721a7cfa1979d861c31ff28421fe
                    • Instruction ID: e54cd89ef08cd73da79ee730c9072c33f668225b3b98329911bdc04349c295a3
                    • Opcode Fuzzy Hash: 0b7afb594f6906e9f441c856b2ecfdae5aae721a7cfa1979d861c31ff28421fe
                    • Instruction Fuzzy Hash: EF3198B5D9C3C8E8F301C7A4BA897623B51AF15B04F44855AD9508B2E5D7F60458C72F
                    APIs
                    • GetComputerNameW.KERNEL32(?,?), ref: 0041748E
                    • SleepEx.KERNEL32(00000000,00000000), ref: 00417498
                    Strings
                    Memory Dump Source
                    • Source File: 00000005.00000002.2051677172.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_5_2_40b000_feuiuvb.jbxd
                    Similarity
                    • API ID: ComputerNameSleep
                    • String ID: -
                    • API String ID: 3354815184-2547889144
                    • Opcode ID: 3fc6961d2e4972b334fa5a6d002c89b8946e1864f305b9616412148f79052c6d
                    • Instruction ID: 81026da3e40ff619b77a564ad1d8e362b37520017f41c513db548dfde443d807
                    • Opcode Fuzzy Hash: 3fc6961d2e4972b334fa5a6d002c89b8946e1864f305b9616412148f79052c6d
                    • Instruction Fuzzy Hash: 3C01A27190021896C760DF64D881BDABBF8FB08324F5181AAE58596181CE385ACC8FD9

                    Execution Graph

                    Execution Coverage:18.2%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:19.5%
                    Total number of Nodes:1453
                    Total number of Limit Nodes:32
                    execution_graph 4021 401ec5 4022 402c17 17 API calls 4021->4022 4023 401ecb 4022->4023 4024 402c17 17 API calls 4023->4024 4025 401ed7 4024->4025 4026 401ee3 ShowWindow 4025->4026 4027 401eee EnableWindow 4025->4027 4028 402ac5 4026->4028 4027->4028 3366 401746 3367 402c39 17 API calls 3366->3367 3368 40174d 3367->3368 3372 405f4a 3368->3372 3370 401754 3371 405f4a 2 API calls 3370->3371 3371->3370 3373 405f55 GetTickCount GetTempFileNameA 3372->3373 3374 405f82 3373->3374 3375 405f86 3373->3375 3374->3373 3374->3375 3375->3370 4029 401947 4030 402c39 17 API calls 4029->4030 4031 40194e lstrlenA 4030->4031 4032 402628 4031->4032 4036 401fcb 4037 402c39 17 API calls 4036->4037 4038 401fd2 4037->4038 4039 4066ff 2 API calls 4038->4039 4040 401fd8 4039->4040 4042 401fea 4040->4042 4043 4062e6 wsprintfA 4040->4043 4043->4042 3385 4034cc SetErrorMode GetVersionExA 3386 40351e GetVersionExA 3385->3386 3388 40355d 3385->3388 3387 40353a 3386->3387 3386->3388 3387->3388 3389 4035e1 3388->3389 3390 406794 5 API calls 3388->3390 3477 406726 GetSystemDirectoryA 3389->3477 3390->3389 3392 4035f7 lstrlenA 3392->3389 3393 403607 3392->3393 3480 406794 GetModuleHandleA 3393->3480 3396 406794 5 API calls 3397 403615 3396->3397 3398 406794 5 API calls 3397->3398 3399 403621 #17 OleInitialize SHGetFileInfoA 3398->3399 3486 406388 lstrcpynA 3399->3486 3402 40366f GetCommandLineA 3487 406388 lstrcpynA 3402->3487 3404 403681 3405 405d45 CharNextA 3404->3405 3406 4036a8 CharNextA 3405->3406 3412 4036b7 3406->3412 3407 40377d 3408 403791 GetTempPathA 3407->3408 3488 40349b 3408->3488 3410 4037a9 3413 403803 DeleteFileA 3410->3413 3414 4037ad GetWindowsDirectoryA lstrcatA 3410->3414 3411 405d45 CharNextA 3411->3412 3412->3407 3412->3411 3418 40377f 3412->3418 3498 402f5c GetTickCount GetModuleFileNameA 3413->3498 3415 40349b 12 API calls 3414->3415 3417 4037c9 3415->3417 3417->3413 3420 4037cd GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3417->3420 3585 406388 lstrcpynA 3418->3585 3419 403816 3421 4038ae ExitProcess OleUninitialize 3419->3421 3424 40389b 3419->3424 3431 405d45 CharNextA 3419->3431 3423 40349b 12 API calls 3420->3423 3425 4038c5 3421->3425 3426 4039e8 3421->3426 3429 4037fb 3423->3429 3528 403b6e 3424->3528 3602 405a9e 3425->3602 3427 4039f0 GetCurrentProcess OpenProcessToken 3426->3427 3428 403a66 ExitProcess 3426->3428 3433 403a36 3427->3433 3434 403a07 LookupPrivilegeValueA AdjustTokenPrivileges 3427->3434 3429->3413 3429->3421 3436 403830 3431->3436 3439 406794 5 API calls 3433->3439 3434->3433 3440 403875 3436->3440 3441 4038da 3436->3441 3442 403a3d 3439->3442 3586 405e08 3440->3586 3606 405a09 3441->3606 3445 403a52 ExitWindowsEx 3442->3445 3448 403a5f 3442->3448 3445->3428 3445->3448 3626 40140b 3448->3626 3449 4038f0 lstrcatA 3450 4038fb lstrcatA lstrcmpiA 3449->3450 3450->3421 3452 403917 3450->3452 3454 403923 3452->3454 3455 40391c 3452->3455 3614 4059ec CreateDirectoryA 3454->3614 3609 40596f CreateDirectoryA 3455->3609 3456 403890 3601 406388 lstrcpynA 3456->3601 3461 403928 SetCurrentDirectoryA 3462 403943 3461->3462 3463 403938 3461->3463 3618 406388 lstrcpynA 3462->3618 3617 406388 lstrcpynA 3463->3617 3466 40641b 17 API calls 3467 403985 DeleteFileA 3466->3467 3468 403993 CopyFileA 3467->3468 3474 403950 3467->3474 3468->3474 3469 4039dc 3471 406161 36 API calls 3469->3471 3472 4039e3 3471->3472 3472->3421 3473 40641b 17 API calls 3473->3474 3474->3466 3474->3469 3474->3473 3476 4039c7 CloseHandle 3474->3476 3619 406161 MoveFileExA 3474->3619 3623 405a21 CreateProcessA 3474->3623 3476->3474 3478 406748 wsprintfA LoadLibraryExA 3477->3478 3478->3392 3481 4067b0 3480->3481 3482 4067ba GetProcAddress 3480->3482 3483 406726 3 API calls 3481->3483 3484 40360e 3482->3484 3485 4067b6 3483->3485 3484->3396 3485->3482 3485->3484 3486->3402 3487->3404 3489 406666 5 API calls 3488->3489 3491 4034a7 3489->3491 3490 4034b1 3490->3410 3491->3490 3629 405d1a lstrlenA CharPrevA 3491->3629 3494 4059ec 2 API calls 3495 4034bf 3494->3495 3496 405f4a 2 API calls 3495->3496 3497 4034ca 3496->3497 3497->3410 3632 405f1b GetFileAttributesA CreateFileA 3498->3632 3500 402f9f 3527 402fac 3500->3527 3633 406388 lstrcpynA 3500->3633 3502 402fc2 3634 405d61 lstrlenA 3502->3634 3506 402fd3 GetFileSize 3507 4030cd 3506->3507 3526 402fea 3506->3526 3639 402ebd 3507->3639 3511 403112 GlobalAlloc 3513 403129 3511->3513 3512 40316a 3516 402ebd 32 API calls 3512->3516 3518 405f4a 2 API calls 3513->3518 3515 4030f3 3517 40346e ReadFile 3515->3517 3516->3527 3519 4030fe 3517->3519 3521 40313a CreateFileA 3518->3521 3519->3511 3519->3527 3520 402ebd 32 API calls 3520->3526 3522 403174 3521->3522 3521->3527 3654 403484 SetFilePointer 3522->3654 3524 403182 3655 4031fd 3524->3655 3526->3507 3526->3512 3526->3520 3526->3527 3670 40346e 3526->3670 3527->3419 3529 406794 5 API calls 3528->3529 3530 403b82 3529->3530 3531 403b88 3530->3531 3532 403b9a 3530->3532 3714 4062e6 wsprintfA 3531->3714 3533 40626f 3 API calls 3532->3533 3534 403bc5 3533->3534 3535 403be3 lstrcatA 3534->3535 3538 40626f 3 API calls 3534->3538 3537 403b98 3535->3537 3706 403e33 3537->3706 3538->3535 3541 405e08 18 API calls 3542 403c15 3541->3542 3543 403c9e 3542->3543 3545 40626f 3 API calls 3542->3545 3544 405e08 18 API calls 3543->3544 3547 403ca4 3544->3547 3548 403c41 3545->3548 3546 403cb4 LoadImageA 3550 403d5a 3546->3550 3551 403cdb RegisterClassA 3546->3551 3547->3546 3549 40641b 17 API calls 3547->3549 3548->3543 3552 403c5d lstrlenA 3548->3552 3555 405d45 CharNextA 3548->3555 3549->3546 3554 40140b 2 API calls 3550->3554 3553 403d11 SystemParametersInfoA CreateWindowExA 3551->3553 3584 4038ab 3551->3584 3556 403c91 3552->3556 3557 403c6b lstrcmpiA 3552->3557 3553->3550 3558 403d60 3554->3558 3559 403c5b 3555->3559 3561 405d1a 3 API calls 3556->3561 3557->3556 3560 403c7b GetFileAttributesA 3557->3560 3563 403e33 18 API calls 3558->3563 3558->3584 3559->3552 3562 403c87 3560->3562 3564 403c97 3561->3564 3562->3556 3565 405d61 2 API calls 3562->3565 3566 403d71 3563->3566 3715 406388 lstrcpynA 3564->3715 3565->3556 3568 403e00 3566->3568 3569 403d7d ShowWindow 3566->3569 3716 40557b OleInitialize 3568->3716 3571 406726 3 API calls 3569->3571 3573 403d95 3571->3573 3572 403e06 3575 403e22 3572->3575 3576 403e0a 3572->3576 3574 403da3 GetClassInfoA 3573->3574 3577 406726 3 API calls 3573->3577 3579 403db7 GetClassInfoA RegisterClassA 3574->3579 3580 403dcd DialogBoxParamA 3574->3580 3578 40140b 2 API calls 3575->3578 3582 40140b 2 API calls 3576->3582 3576->3584 3577->3574 3578->3584 3579->3580 3581 40140b 2 API calls 3580->3581 3583 403df5 3581->3583 3582->3584 3583->3584 3584->3421 3585->3408 3734 406388 lstrcpynA 3586->3734 3588 405e19 3735 405db3 CharNextA CharNextA 3588->3735 3591 403881 3591->3421 3600 406388 lstrcpynA 3591->3600 3592 406666 5 API calls 3598 405e2f 3592->3598 3593 405e5a lstrlenA 3594 405e65 3593->3594 3593->3598 3595 405d1a 3 API calls 3594->3595 3597 405e6a GetFileAttributesA 3595->3597 3597->3591 3598->3591 3598->3593 3599 405d61 2 API calls 3598->3599 3741 4066ff FindFirstFileA 3598->3741 3599->3593 3600->3456 3601->3424 3603 405ab3 3602->3603 3604 4038d2 ExitProcess 3603->3604 3605 405ac7 MessageBoxIndirectA 3603->3605 3605->3604 3607 406794 5 API calls 3606->3607 3608 4038df lstrcatA 3607->3608 3608->3449 3608->3450 3610 4059c0 GetLastError 3609->3610 3611 403921 3609->3611 3610->3611 3612 4059cf SetFileSecurityA 3610->3612 3611->3461 3612->3611 3613 4059e5 GetLastError 3612->3613 3613->3611 3615 405a00 GetLastError 3614->3615 3616 4059fc 3614->3616 3615->3616 3616->3461 3617->3462 3618->3474 3620 406182 3619->3620 3621 406175 3619->3621 3620->3474 3744 405ff1 3621->3744 3624 405a60 3623->3624 3625 405a54 CloseHandle 3623->3625 3624->3474 3625->3624 3627 401389 2 API calls 3626->3627 3628 401420 3627->3628 3628->3428 3630 405d34 lstrcatA 3629->3630 3631 4034b9 3629->3631 3630->3631 3631->3494 3632->3500 3633->3502 3635 405d6e 3634->3635 3636 405d73 CharPrevA 3635->3636 3637 402fc8 3635->3637 3636->3635 3636->3637 3638 406388 lstrcpynA 3637->3638 3638->3506 3640 402ee3 3639->3640 3641 402ecb 3639->3641 3644 402ef3 GetTickCount 3640->3644 3645 402eeb 3640->3645 3642 402ed4 DestroyWindow 3641->3642 3643 402edb 3641->3643 3642->3643 3643->3511 3643->3527 3673 403484 SetFilePointer 3643->3673 3644->3643 3647 402f01 3644->3647 3674 4067d0 3645->3674 3648 402f36 CreateDialogParamA ShowWindow 3647->3648 3649 402f09 3647->3649 3648->3643 3649->3643 3678 402ea1 3649->3678 3651 402f17 wsprintfA 3652 4054a9 24 API calls 3651->3652 3653 402f34 3652->3653 3653->3643 3654->3524 3656 403228 3655->3656 3657 40320c SetFilePointer 3655->3657 3681 403305 GetTickCount 3656->3681 3657->3656 3662 403305 42 API calls 3663 40325f 3662->3663 3664 4032c5 3663->3664 3665 4032cb ReadFile 3663->3665 3666 40326e 3663->3666 3664->3527 3665->3664 3666->3664 3668 405f93 ReadFile 3666->3668 3696 405fc2 WriteFile 3666->3696 3668->3666 3671 405f93 ReadFile 3670->3671 3672 403481 3671->3672 3672->3526 3673->3515 3675 4067ed PeekMessageA 3674->3675 3676 4067e3 DispatchMessageA 3675->3676 3677 4067fd 3675->3677 3676->3675 3677->3643 3679 402eb0 3678->3679 3680 402eb2 MulDiv 3678->3680 3679->3680 3680->3651 3682 403333 3681->3682 3683 40345d 3681->3683 3698 403484 SetFilePointer 3682->3698 3684 402ebd 32 API calls 3683->3684 3690 40322f 3684->3690 3686 40333e SetFilePointer 3691 403363 3686->3691 3687 40346e ReadFile 3687->3691 3689 402ebd 32 API calls 3689->3691 3690->3664 3694 405f93 ReadFile 3690->3694 3691->3687 3691->3689 3691->3690 3692 405fc2 WriteFile 3691->3692 3693 40343e SetFilePointer 3691->3693 3699 4068d9 3691->3699 3692->3691 3693->3683 3695 403248 3694->3695 3695->3662 3695->3664 3697 405fe0 3696->3697 3697->3666 3698->3686 3700 4068fe 3699->3700 3705 406906 3699->3705 3700->3691 3701 406996 GlobalAlloc 3701->3700 3701->3705 3702 40698d GlobalFree 3702->3701 3703 406a04 GlobalFree 3704 406a0d GlobalAlloc 3703->3704 3704->3700 3704->3705 3705->3700 3705->3701 3705->3702 3705->3703 3705->3704 3707 403e47 3706->3707 3723 4062e6 wsprintfA 3707->3723 3709 403eb8 3724 403eec 3709->3724 3711 403bf3 3711->3541 3712 403ebd 3712->3711 3713 40641b 17 API calls 3712->3713 3713->3712 3714->3537 3715->3543 3727 404451 3716->3727 3718 40559e 3722 4055c5 3718->3722 3730 401389 3718->3730 3719 404451 SendMessageA 3720 4055d7 OleUninitialize 3719->3720 3720->3572 3722->3719 3723->3709 3725 40641b 17 API calls 3724->3725 3726 403efa SetWindowTextA 3725->3726 3726->3712 3728 404469 3727->3728 3729 40445a SendMessageA 3727->3729 3728->3718 3729->3728 3732 401390 3730->3732 3731 4013fe 3731->3718 3732->3731 3733 4013cb MulDiv SendMessageA 3732->3733 3733->3732 3734->3588 3736 405dde 3735->3736 3737 405dce 3735->3737 3739 405d45 CharNextA 3736->3739 3740 405dfe 3736->3740 3737->3736 3738 405dd9 CharNextA 3737->3738 3738->3740 3739->3736 3740->3591 3740->3592 3742 406715 FindClose 3741->3742 3743 406720 3741->3743 3742->3743 3743->3598 3745 406017 3744->3745 3746 40603d GetShortPathNameA 3744->3746 3771 405f1b GetFileAttributesA CreateFileA 3745->3771 3748 406052 3746->3748 3749 40615c 3746->3749 3748->3749 3751 40605a wsprintfA 3748->3751 3749->3620 3750 406021 CloseHandle GetShortPathNameA 3750->3749 3753 406035 3750->3753 3752 40641b 17 API calls 3751->3752 3754 406082 3752->3754 3753->3746 3753->3749 3772 405f1b GetFileAttributesA CreateFileA 3754->3772 3756 40608f 3756->3749 3757 40609e GetFileSize GlobalAlloc 3756->3757 3758 4060c0 3757->3758 3759 406155 CloseHandle 3757->3759 3760 405f93 ReadFile 3758->3760 3759->3749 3761 4060c8 3760->3761 3761->3759 3773 405e80 lstrlenA 3761->3773 3764 4060f3 3766 405e80 4 API calls 3764->3766 3765 4060df lstrcpyA 3767 406101 3765->3767 3766->3767 3768 406138 SetFilePointer 3767->3768 3769 405fc2 WriteFile 3768->3769 3770 40614e GlobalFree 3769->3770 3770->3759 3771->3750 3772->3756 3774 405ec1 lstrlenA 3773->3774 3775 405ec9 3774->3775 3776 405e9a lstrcmpiA 3774->3776 3775->3764 3775->3765 3776->3775 3777 405eb8 CharNextA 3776->3777 3777->3774 4044 404850 4045 404860 4044->4045 4046 404886 4044->4046 4051 404405 4045->4051 4054 40446c 4046->4054 4049 40486d SetDlgItemTextA 4049->4046 4052 40641b 17 API calls 4051->4052 4053 404410 SetDlgItemTextA 4052->4053 4053->4049 4055 40452f 4054->4055 4056 404484 GetWindowLongA 4054->4056 4056->4055 4057 404499 4056->4057 4057->4055 4058 4044c6 GetSysColor 4057->4058 4059 4044c9 4057->4059 4058->4059 4060 4044d9 SetBkMode 4059->4060 4061 4044cf SetTextColor 4059->4061 4062 4044f1 GetSysColor 4060->4062 4063 4044f7 4060->4063 4061->4060 4062->4063 4064 4044fe SetBkColor 4063->4064 4065 404508 4063->4065 4064->4065 4065->4055 4066 404522 CreateBrushIndirect 4065->4066 4067 40451b DeleteObject 4065->4067 4066->4055 4067->4066 4075 4014d6 4076 402c17 17 API calls 4075->4076 4077 4014dc Sleep 4076->4077 4079 402ac5 4077->4079 3873 401759 3874 402c39 17 API calls 3873->3874 3875 401760 3874->3875 3876 401786 3875->3876 3877 40177e 3875->3877 3913 406388 lstrcpynA 3876->3913 3912 406388 lstrcpynA 3877->3912 3880 401784 3884 406666 5 API calls 3880->3884 3881 401791 3882 405d1a 3 API calls 3881->3882 3883 401797 lstrcatA 3882->3883 3883->3880 3899 4017a3 3884->3899 3885 4066ff 2 API calls 3885->3899 3886 405ef6 2 API calls 3886->3899 3888 4017ba CompareFileTime 3888->3899 3889 40187e 3890 4054a9 24 API calls 3889->3890 3892 401888 3890->3892 3891 401855 3893 4054a9 24 API calls 3891->3893 3900 40186a 3891->3900 3894 4031fd 44 API calls 3892->3894 3893->3900 3895 40189b 3894->3895 3896 4018af SetFileTime 3895->3896 3898 4018c1 FindCloseChangeNotification 3895->3898 3896->3898 3897 40641b 17 API calls 3897->3899 3898->3900 3901 4018d2 3898->3901 3899->3885 3899->3886 3899->3888 3899->3889 3899->3891 3899->3897 3902 406388 lstrcpynA 3899->3902 3907 405a9e MessageBoxIndirectA 3899->3907 3911 405f1b GetFileAttributesA CreateFileA 3899->3911 3903 4018d7 3901->3903 3904 4018ea 3901->3904 3902->3899 3905 40641b 17 API calls 3903->3905 3906 40641b 17 API calls 3904->3906 3908 4018df lstrcatA 3905->3908 3909 4018f2 3906->3909 3907->3899 3908->3909 3910 405a9e MessageBoxIndirectA 3909->3910 3910->3900 3911->3899 3912->3880 3913->3881 4080 401659 4081 402c39 17 API calls 4080->4081 4082 40165f 4081->4082 4083 4066ff 2 API calls 4082->4083 4084 401665 4083->4084 4085 401959 4086 402c17 17 API calls 4085->4086 4087 401960 4086->4087 4088 402c17 17 API calls 4087->4088 4089 40196d 4088->4089 4090 402c39 17 API calls 4089->4090 4091 401984 lstrlenA 4090->4091 4093 401994 4091->4093 4092 4019d4 4093->4092 4097 406388 lstrcpynA 4093->4097 4095 4019c4 4095->4092 4096 4019c9 lstrlenA 4095->4096 4096->4092 4097->4095 4098 401a5e 4099 402c17 17 API calls 4098->4099 4100 401a67 4099->4100 4101 402c17 17 API calls 4100->4101 4102 401a0e 4101->4102 4103 401563 4104 402a42 4103->4104 4107 4062e6 wsprintfA 4104->4107 4106 402a47 4107->4106 4108 401b63 4109 402c39 17 API calls 4108->4109 4110 401b6a 4109->4110 4111 402c17 17 API calls 4110->4111 4112 401b73 wsprintfA 4111->4112 4113 402ac5 4112->4113 4114 100013a4 4121 10001426 4114->4121 4122 100013d0 4121->4122 4124 1000142f 4121->4124 4126 100010d0 GetVersionExA 4122->4126 4123 1000145f GlobalFree 4123->4122 4124->4122 4124->4123 4125 1000144b lstrcpynA 4124->4125 4125->4123 4127 10001106 4126->4127 4128 100010fc 4126->4128 4129 10001122 LoadLibraryW 4127->4129 4130 1000110e 4127->4130 4152 100014ba wsprintfA 4128->4152 4132 100011a5 4129->4132 4133 1000113b GetProcAddress 4129->4133 4130->4128 4131 10001225 LoadLibraryA 4130->4131 4131->4128 4136 1000123d GetProcAddress GetProcAddress GetProcAddress 4131->4136 4132->4128 4141 100011c1 WideCharToMultiByte lstrcmpiA 4132->4141 4143 10001217 LocalFree 4132->4143 4145 100011f7 4132->4145 4134 1000118e 4133->4134 4135 1000114e LocalAlloc 4133->4135 4138 1000119a FreeLibrary 4134->4138 4137 10001189 4135->4137 4139 10001323 FreeLibrary 4136->4139 4150 1000126b 4136->4150 4137->4134 4140 1000115c NtQuerySystemInformation 4137->4140 4138->4132 4139->4128 4140->4138 4142 1000116f LocalFree 4140->4142 4141->4132 4142->4134 4144 10001180 LocalAlloc 4142->4144 4143->4128 4144->4137 4145->4132 4146 1000103f 8 API calls 4145->4146 4146->4145 4147 100012a2 lstrlenA 4147->4150 4148 1000131c CloseHandle 4148->4139 4149 100012c4 lstrcpynA lstrcmpiA 4149->4150 4150->4139 4150->4147 4150->4148 4150->4149 4151 1000103f 8 API calls 4150->4151 4151->4150 4155 10001475 4152->4155 4156 100013e3 4155->4156 4157 1000147e GlobalAlloc lstrcpynA 4155->4157 4157->4156 4158 401d65 4159 401d78 GetDlgItem 4158->4159 4160 401d6b 4158->4160 4161 401d72 4159->4161 4162 402c17 17 API calls 4160->4162 4163 401db9 GetClientRect LoadImageA SendMessageA 4161->4163 4164 402c39 17 API calls 4161->4164 4162->4161 4166 401e26 4163->4166 4167 401e1a 4163->4167 4164->4163 4167->4166 4168 401e1f DeleteObject 4167->4168 4168->4166 3376 10001426 3377 1000146f 3376->3377 3379 1000142f 3376->3379 3378 1000145f GlobalFree 3378->3377 3379->3377 3379->3378 3380 1000144b lstrcpynA 3379->3380 3380->3378 4169 402766 4170 40276c 4169->4170 4171 402774 FindClose 4170->4171 4172 402ac5 4170->4172 4171->4172 4173 4055e7 4174 405792 4173->4174 4175 405609 GetDlgItem GetDlgItem GetDlgItem 4173->4175 4177 40579a GetDlgItem CreateThread CloseHandle 4174->4177 4180 4057c2 4174->4180 4218 40443a SendMessageA 4175->4218 4177->4180 4178 405679 4184 405680 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4178->4184 4179 4057f0 4183 40584b 4179->4183 4186 405800 4179->4186 4187 405824 ShowWindow 4179->4187 4180->4179 4181 405811 4180->4181 4182 4057d8 ShowWindow ShowWindow 4180->4182 4188 40446c 8 API calls 4181->4188 4220 40443a SendMessageA 4182->4220 4183->4181 4193 405858 SendMessageA 4183->4193 4191 4056d2 SendMessageA SendMessageA 4184->4191 4192 4056ee 4184->4192 4221 4043de 4186->4221 4189 405844 4187->4189 4190 405836 4187->4190 4195 40581d 4188->4195 4197 4043de SendMessageA 4189->4197 4196 4054a9 24 API calls 4190->4196 4191->4192 4198 405701 4192->4198 4199 4056f3 SendMessageA 4192->4199 4193->4195 4200 405871 CreatePopupMenu 4193->4200 4196->4189 4197->4183 4202 404405 18 API calls 4198->4202 4199->4198 4201 40641b 17 API calls 4200->4201 4203 405881 AppendMenuA 4201->4203 4204 405711 4202->4204 4205 4058b2 TrackPopupMenu 4203->4205 4206 40589f GetWindowRect 4203->4206 4207 40571a ShowWindow 4204->4207 4208 40574e GetDlgItem SendMessageA 4204->4208 4205->4195 4210 4058ce 4205->4210 4206->4205 4211 405730 ShowWindow 4207->4211 4212 40573d 4207->4212 4208->4195 4209 405775 SendMessageA SendMessageA 4208->4209 4209->4195 4213 4058ed SendMessageA 4210->4213 4211->4212 4219 40443a SendMessageA 4212->4219 4213->4213 4214 40590a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4213->4214 4216 40592c SendMessageA 4214->4216 4216->4216 4217 40594e GlobalUnlock SetClipboardData CloseClipboard 4216->4217 4217->4195 4218->4178 4219->4208 4220->4179 4222 4043e5 4221->4222 4223 4043eb SendMessageA 4221->4223 4222->4223 4223->4181 4224 404be8 4225 404c14 4224->4225 4226 404bf8 4224->4226 4228 404c47 4225->4228 4229 404c1a SHGetPathFromIDListA 4225->4229 4235 405a82 GetDlgItemTextA 4226->4235 4231 404c31 SendMessageA 4229->4231 4232 404c2a 4229->4232 4230 404c05 SendMessageA 4230->4225 4231->4228 4233 40140b 2 API calls 4232->4233 4233->4231 4235->4230 4236 4023e8 4237 402c39 17 API calls 4236->4237 4238 4023f9 4237->4238 4239 402c39 17 API calls 4238->4239 4240 402402 4239->4240 4241 402c39 17 API calls 4240->4241 4242 40240c GetPrivateProfileStringA 4241->4242 4243 4027e8 4244 402c39 17 API calls 4243->4244 4245 4027f4 4244->4245 4246 40280a 4245->4246 4247 402c39 17 API calls 4245->4247 4248 405ef6 2 API calls 4246->4248 4247->4246 4249 402810 4248->4249 4271 405f1b GetFileAttributesA CreateFileA 4249->4271 4251 40281d 4252 4028d9 4251->4252 4253 4028c1 4251->4253 4254 402838 GlobalAlloc 4251->4254 4255 4028e0 DeleteFileA 4252->4255 4256 4028f3 4252->4256 4258 4031fd 44 API calls 4253->4258 4254->4253 4257 402851 4254->4257 4255->4256 4272 403484 SetFilePointer 4257->4272 4260 4028ce CloseHandle 4258->4260 4260->4252 4261 402857 4262 40346e ReadFile 4261->4262 4263 402860 GlobalAlloc 4262->4263 4264 402870 4263->4264 4265 4028aa 4263->4265 4267 4031fd 44 API calls 4264->4267 4266 405fc2 WriteFile 4265->4266 4268 4028b6 GlobalFree 4266->4268 4270 40287d 4267->4270 4268->4253 4269 4028a1 GlobalFree 4269->4265 4270->4269 4271->4251 4272->4261 4273 40166a 4274 402c39 17 API calls 4273->4274 4275 401671 4274->4275 4276 402c39 17 API calls 4275->4276 4277 40167a 4276->4277 4278 402c39 17 API calls 4277->4278 4279 401683 MoveFileA 4278->4279 4280 401696 4279->4280 4286 40168f 4279->4286 4282 4066ff 2 API calls 4280->4282 4284 4022ea 4280->4284 4281 401423 24 API calls 4281->4284 4283 4016a5 4282->4283 4283->4284 4285 406161 36 API calls 4283->4285 4285->4286 4286->4281 4294 4019ed 4295 402c39 17 API calls 4294->4295 4296 4019f4 4295->4296 4297 402c39 17 API calls 4296->4297 4298 4019fd 4297->4298 4299 401a04 lstrcmpiA 4298->4299 4300 401a16 lstrcmpA 4298->4300 4301 401a0a 4299->4301 4300->4301 4302 40156f 4303 401586 4302->4303 4304 40157f ShowWindow 4302->4304 4305 401594 ShowWindow 4303->4305 4306 402ac5 4303->4306 4304->4303 4305->4306 4307 404570 4308 404586 4307->4308 4313 404692 4307->4313 4311 404405 18 API calls 4308->4311 4309 404701 4310 4047cb 4309->4310 4312 40470b GetDlgItem 4309->4312 4319 40446c 8 API calls 4310->4319 4314 4045dc 4311->4314 4315 404721 4312->4315 4316 404789 4312->4316 4313->4309 4313->4310 4317 4046d6 GetDlgItem SendMessageA 4313->4317 4318 404405 18 API calls 4314->4318 4315->4316 4320 404747 SendMessageA LoadCursorA SetCursor 4315->4320 4316->4310 4321 40479b 4316->4321 4340 404427 EnableWindow 4317->4340 4323 4045e9 CheckDlgButton 4318->4323 4324 4047c6 4319->4324 4344 404814 4320->4344 4326 4047a1 SendMessageA 4321->4326 4327 4047b2 4321->4327 4338 404427 EnableWindow 4323->4338 4326->4327 4327->4324 4331 4047b8 SendMessageA 4327->4331 4328 4046fc 4341 4047f0 4328->4341 4331->4324 4333 404607 GetDlgItem 4339 40443a SendMessageA 4333->4339 4335 40461d SendMessageA 4336 404644 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4335->4336 4337 40463b GetSysColor 4335->4337 4336->4324 4337->4336 4338->4333 4339->4335 4340->4328 4342 404803 SendMessageA 4341->4342 4343 4047fe 4341->4343 4342->4309 4343->4342 4347 405a64 ShellExecuteExA 4344->4347 4346 40477a LoadCursorA SetCursor 4346->4316 4347->4346 4348 402173 4349 402c39 17 API calls 4348->4349 4350 40217a 4349->4350 4351 402c39 17 API calls 4350->4351 4352 402184 4351->4352 4353 402c39 17 API calls 4352->4353 4354 40218e 4353->4354 4355 402c39 17 API calls 4354->4355 4356 40219b 4355->4356 4357 402c39 17 API calls 4356->4357 4358 4021a5 4357->4358 4359 4021e7 CoCreateInstance 4358->4359 4360 402c39 17 API calls 4358->4360 4363 402206 4359->4363 4365 4022b4 4359->4365 4360->4359 4361 401423 24 API calls 4362 4022ea 4361->4362 4364 402294 MultiByteToWideChar 4363->4364 4363->4365 4364->4365 4365->4361 4365->4362 4366 4022f3 4367 402c39 17 API calls 4366->4367 4368 4022f9 4367->4368 4369 402c39 17 API calls 4368->4369 4370 402302 4369->4370 4371 402c39 17 API calls 4370->4371 4372 40230b 4371->4372 4373 4066ff 2 API calls 4372->4373 4374 402314 4373->4374 4375 402325 lstrlenA lstrlenA 4374->4375 4376 402318 4374->4376 4378 4054a9 24 API calls 4375->4378 4377 4054a9 24 API calls 4376->4377 4379 402320 4376->4379 4377->4379 4380 402361 SHFileOperationA 4378->4380 4380->4376 4380->4379 4381 4014f4 SetForegroundWindow 4382 402ac5 4381->4382 4383 402375 4384 40237c 4383->4384 4388 40238f 4383->4388 4385 40641b 17 API calls 4384->4385 4386 402389 4385->4386 4387 405a9e MessageBoxIndirectA 4386->4387 4387->4388 4389 402675 4390 402c17 17 API calls 4389->4390 4391 40267f 4390->4391 4392 405f93 ReadFile 4391->4392 4393 4026ef 4391->4393 4396 4026ff 4391->4396 4397 4026ed 4391->4397 4392->4391 4398 4062e6 wsprintfA 4393->4398 4395 402715 SetFilePointer 4395->4397 4396->4395 4396->4397 4398->4397 4399 4029f6 4400 402a49 4399->4400 4401 4029fd 4399->4401 4402 406794 5 API calls 4400->4402 4403 402c17 17 API calls 4401->4403 4409 402a47 4401->4409 4404 402a50 4402->4404 4405 402a0b 4403->4405 4406 402c39 17 API calls 4404->4406 4407 402c17 17 API calls 4405->4407 4408 402a59 4406->4408 4411 402a1a 4407->4411 4408->4409 4417 4063db 4408->4417 4416 4062e6 wsprintfA 4411->4416 4413 402a67 4413->4409 4421 4063c5 4413->4421 4416->4409 4419 4063e6 4417->4419 4418 406409 IIDFromString 4418->4413 4419->4418 4420 406402 4419->4420 4420->4413 4424 4063aa WideCharToMultiByte 4421->4424 4423 402a88 CoTaskMemFree 4423->4409 4424->4423 4425 401ef9 4426 402c39 17 API calls 4425->4426 4427 401eff 4426->4427 4428 402c39 17 API calls 4427->4428 4429 401f08 4428->4429 4430 402c39 17 API calls 4429->4430 4431 401f11 4430->4431 4432 402c39 17 API calls 4431->4432 4433 401f1a 4432->4433 4434 401423 24 API calls 4433->4434 4435 401f21 4434->4435 4442 405a64 ShellExecuteExA 4435->4442 4437 401f5c 4438 406809 5 API calls 4437->4438 4439 4027c8 4437->4439 4440 401f76 CloseHandle 4438->4440 4440->4439 4442->4437 3914 401f7b 3915 402c39 17 API calls 3914->3915 3916 401f81 3915->3916 3917 4054a9 24 API calls 3916->3917 3918 401f8b 3917->3918 3919 405a21 2 API calls 3918->3919 3920 401f91 3919->3920 3923 4027c8 3920->3923 3928 401fb2 CloseHandle 3920->3928 3929 406809 WaitForSingleObject 3920->3929 3924 401fa6 3925 401fb4 3924->3925 3926 401fab 3924->3926 3925->3928 3934 4062e6 wsprintfA 3926->3934 3928->3923 3930 406823 3929->3930 3931 406835 GetExitCodeProcess 3930->3931 3932 4067d0 2 API calls 3930->3932 3931->3924 3933 40682a WaitForSingleObject 3932->3933 3933->3930 3934->3928 4450 401ffb 4451 402c39 17 API calls 4450->4451 4452 402002 4451->4452 4453 406794 5 API calls 4452->4453 4454 402011 4453->4454 4455 402099 4454->4455 4456 402029 GlobalAlloc 4454->4456 4456->4455 4457 40203d 4456->4457 4458 406794 5 API calls 4457->4458 4459 402044 4458->4459 4460 406794 5 API calls 4459->4460 4461 40204e 4460->4461 4461->4455 4465 4062e6 wsprintfA 4461->4465 4463 402089 4466 4062e6 wsprintfA 4463->4466 4465->4463 4466->4455 3956 403a7c 3957 403a97 3956->3957 3958 403a8d CloseHandle 3956->3958 3959 403aa1 CloseHandle 3957->3959 3960 403aab 3957->3960 3958->3957 3959->3960 3965 403ad9 3960->3965 3963 405b4a 67 API calls 3964 403abc 3963->3964 3966 403ae7 3965->3966 3967 403ab0 3966->3967 3968 403aec FreeLibrary GlobalFree 3966->3968 3967->3963 3968->3967 3968->3968 4467 4018fd 4468 401934 4467->4468 4469 402c39 17 API calls 4468->4469 4470 401939 4469->4470 4471 405b4a 67 API calls 4470->4471 4472 401942 4471->4472 3969 40247e 3970 402c39 17 API calls 3969->3970 3971 402490 3970->3971 3972 402c39 17 API calls 3971->3972 3973 40249a 3972->3973 3986 402cc9 3973->3986 3976 402ac5 3977 4024cf 3979 4024db 3977->3979 3990 402c17 3977->3990 3978 402c39 17 API calls 3980 4024c8 lstrlenA 3978->3980 3982 4024fd RegSetValueExA 3979->3982 3983 4031fd 44 API calls 3979->3983 3980->3977 3984 402513 RegCloseKey 3982->3984 3983->3982 3984->3976 3987 402ce4 3986->3987 3993 40623c 3987->3993 3991 40641b 17 API calls 3990->3991 3992 402c2c 3991->3992 3992->3979 3994 40624b 3993->3994 3995 4024aa 3994->3995 3996 406256 RegCreateKeyExA 3994->3996 3995->3976 3995->3977 3995->3978 3996->3995 4473 401cfe 4474 402c17 17 API calls 4473->4474 4475 401d04 IsWindow 4474->4475 4476 401a0e 4475->4476 4477 401000 4478 401037 BeginPaint GetClientRect 4477->4478 4479 40100c DefWindowProcA 4477->4479 4481 4010f3 4478->4481 4482 401179 4479->4482 4483 401073 CreateBrushIndirect FillRect DeleteObject 4481->4483 4484 4010fc 4481->4484 4483->4481 4485 401102 CreateFontIndirectA 4484->4485 4486 401167 EndPaint 4484->4486 4485->4486 4487 401112 6 API calls 4485->4487 4486->4482 4487->4486 4488 401900 4489 402c39 17 API calls 4488->4489 4490 401907 4489->4490 4491 405a9e MessageBoxIndirectA 4490->4491 4492 401910 4491->4492 4493 402780 4494 402786 4493->4494 4495 40278a FindNextFileA 4494->4495 4496 40279c 4494->4496 4495->4496 4497 4027db 4495->4497 4499 406388 lstrcpynA 4497->4499 4499->4496 4500 401502 4501 40150a 4500->4501 4503 40151d 4500->4503 4502 402c17 17 API calls 4501->4502 4502->4503 4504 401b87 4505 401b94 4504->4505 4506 401bd8 4504->4506 4507 401c1c 4505->4507 4513 401bab 4505->4513 4508 401c01 GlobalAlloc 4506->4508 4509 401bdc 4506->4509 4511 40641b 17 API calls 4507->4511 4518 40238f 4507->4518 4510 40641b 17 API calls 4508->4510 4509->4518 4525 406388 lstrcpynA 4509->4525 4510->4507 4512 402389 4511->4512 4517 405a9e MessageBoxIndirectA 4512->4517 4523 406388 lstrcpynA 4513->4523 4516 401bee GlobalFree 4516->4518 4517->4518 4519 401bba 4524 406388 lstrcpynA 4519->4524 4521 401bc9 4526 406388 lstrcpynA 4521->4526 4523->4519 4524->4521 4525->4516 4526->4518 4527 406a88 4531 40690c 4527->4531 4528 407277 4529 406996 GlobalAlloc 4529->4528 4529->4531 4530 40698d GlobalFree 4530->4529 4531->4528 4531->4529 4531->4530 4532 406a04 GlobalFree 4531->4532 4533 406a0d GlobalAlloc 4531->4533 4532->4533 4533->4528 4533->4531 3381 401389 3383 401390 3381->3383 3382 4013fe 3383->3382 3384 4013cb MulDiv SendMessageA 3383->3384 3384->3383 4534 404e0a GetDlgItem GetDlgItem 4535 404e60 7 API calls 4534->4535 4542 405087 4534->4542 4536 404f08 DeleteObject 4535->4536 4537 404efc SendMessageA 4535->4537 4538 404f13 4536->4538 4537->4536 4540 404f4a 4538->4540 4543 40641b 17 API calls 4538->4543 4539 405169 4541 405215 4539->4541 4545 40507a 4539->4545 4551 4051c2 SendMessageA 4539->4551 4544 404405 18 API calls 4540->4544 4546 405227 4541->4546 4547 40521f SendMessageA 4541->4547 4542->4539 4566 4050f6 4542->4566 4588 404d58 SendMessageA 4542->4588 4548 404f2c SendMessageA SendMessageA 4543->4548 4549 404f5e 4544->4549 4553 40446c 8 API calls 4545->4553 4558 405240 4546->4558 4559 405239 ImageList_Destroy 4546->4559 4563 405250 4546->4563 4547->4546 4548->4538 4550 404405 18 API calls 4549->4550 4567 404f6f 4550->4567 4551->4545 4556 4051d7 SendMessageA 4551->4556 4552 40515b SendMessageA 4552->4539 4557 405416 4553->4557 4555 4053ca 4555->4545 4564 4053dc ShowWindow GetDlgItem ShowWindow 4555->4564 4561 4051ea 4556->4561 4562 405249 GlobalFree 4558->4562 4558->4563 4559->4558 4560 405049 GetWindowLongA SetWindowLongA 4565 405062 4560->4565 4573 4051fb SendMessageA 4561->4573 4562->4563 4563->4555 4568 40528b 4563->4568 4593 404dd8 4563->4593 4564->4545 4569 405067 ShowWindow 4565->4569 4570 40507f 4565->4570 4566->4539 4566->4552 4567->4560 4572 404fc1 SendMessageA 4567->4572 4574 405044 4567->4574 4576 405013 SendMessageA 4567->4576 4577 404fff SendMessageA 4567->4577 4581 4052b9 SendMessageA 4568->4581 4585 4052cf 4568->4585 4586 40443a SendMessageA 4569->4586 4587 40443a SendMessageA 4570->4587 4572->4567 4573->4541 4574->4560 4574->4565 4576->4567 4577->4567 4579 405395 4580 4053a0 InvalidateRect 4579->4580 4582 4053ac 4579->4582 4580->4582 4581->4585 4582->4555 4602 404d13 4582->4602 4584 405343 SendMessageA SendMessageA 4584->4585 4585->4579 4585->4584 4586->4545 4587->4542 4589 404db7 SendMessageA 4588->4589 4590 404d7b GetMessagePos ScreenToClient SendMessageA 4588->4590 4592 404daf 4589->4592 4591 404db4 4590->4591 4590->4592 4591->4589 4592->4566 4605 406388 lstrcpynA 4593->4605 4595 404deb 4606 4062e6 wsprintfA 4595->4606 4597 404df5 4598 40140b 2 API calls 4597->4598 4599 404dfe 4598->4599 4607 406388 lstrcpynA 4599->4607 4601 404e05 4601->4568 4608 404c4e 4602->4608 4604 404d28 4604->4555 4605->4595 4606->4597 4607->4601 4609 404c64 4608->4609 4610 40641b 17 API calls 4609->4610 4611 404cc8 4610->4611 4612 40641b 17 API calls 4611->4612 4613 404cd3 4612->4613 4614 40641b 17 API calls 4613->4614 4615 404ce9 lstrlenA wsprintfA SetDlgItemTextA 4614->4615 4615->4604 4616 40298a 4617 402c17 17 API calls 4616->4617 4619 402990 4617->4619 4618 40641b 17 API calls 4620 4027c8 4618->4620 4619->4618 4619->4620 4621 403f0b 4622 403f23 4621->4622 4623 404084 4621->4623 4622->4623 4624 403f2f 4622->4624 4625 4040d5 4623->4625 4626 404095 GetDlgItem GetDlgItem 4623->4626 4627 403f3a SetWindowPos 4624->4627 4628 403f4d 4624->4628 4630 40412f 4625->4630 4641 401389 2 API calls 4625->4641 4629 404405 18 API calls 4626->4629 4627->4628 4632 403f56 ShowWindow 4628->4632 4633 403f98 4628->4633 4634 4040bf SetClassLongA 4629->4634 4631 404451 SendMessageA 4630->4631 4635 40407f 4630->4635 4662 404141 4631->4662 4636 404042 4632->4636 4637 403f76 GetWindowLongA 4632->4637 4638 403fa0 DestroyWindow 4633->4638 4639 403fb7 4633->4639 4640 40140b 2 API calls 4634->4640 4642 40446c 8 API calls 4636->4642 4637->4636 4643 403f8f ShowWindow 4637->4643 4691 40438e 4638->4691 4644 403fbc SetWindowLongA 4639->4644 4645 403fcd 4639->4645 4640->4625 4646 404107 4641->4646 4642->4635 4643->4633 4644->4635 4645->4636 4650 403fd9 GetDlgItem 4645->4650 4646->4630 4647 40410b SendMessageA 4646->4647 4647->4635 4648 40140b 2 API calls 4648->4662 4649 404390 DestroyWindow EndDialog 4649->4691 4652 404007 4650->4652 4653 403fea SendMessageA IsWindowEnabled 4650->4653 4651 4043bf ShowWindow 4651->4635 4655 404014 4652->4655 4656 40405b SendMessageA 4652->4656 4657 404027 4652->4657 4665 40400c 4652->4665 4653->4635 4653->4652 4654 40641b 17 API calls 4654->4662 4655->4656 4655->4665 4656->4636 4660 404044 4657->4660 4661 40402f 4657->4661 4658 4043de SendMessageA 4658->4636 4659 404405 18 API calls 4659->4662 4664 40140b 2 API calls 4660->4664 4663 40140b 2 API calls 4661->4663 4662->4635 4662->4648 4662->4649 4662->4654 4662->4659 4666 404405 18 API calls 4662->4666 4682 4042d0 DestroyWindow 4662->4682 4663->4665 4664->4665 4665->4636 4665->4658 4667 4041bc GetDlgItem 4666->4667 4668 4041d1 4667->4668 4669 4041d9 ShowWindow EnableWindow 4667->4669 4668->4669 4692 404427 EnableWindow 4669->4692 4671 404203 EnableWindow 4676 404217 4671->4676 4672 40421c GetSystemMenu EnableMenuItem SendMessageA 4673 40424c SendMessageA 4672->4673 4672->4676 4673->4676 4675 403eec 18 API calls 4675->4676 4676->4672 4676->4675 4693 40443a SendMessageA 4676->4693 4694 406388 lstrcpynA 4676->4694 4678 40427b lstrlenA 4679 40641b 17 API calls 4678->4679 4680 40428c SetWindowTextA 4679->4680 4681 401389 2 API calls 4680->4681 4681->4662 4683 4042ea CreateDialogParamA 4682->4683 4682->4691 4684 40431d 4683->4684 4683->4691 4685 404405 18 API calls 4684->4685 4686 404328 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4685->4686 4687 401389 2 API calls 4686->4687 4688 40436e 4687->4688 4688->4635 4689 404376 ShowWindow 4688->4689 4690 404451 SendMessageA 4689->4690 4690->4691 4691->4635 4691->4651 4692->4671 4693->4676 4694->4678 4695 40260c 4696 402c39 17 API calls 4695->4696 4697 402613 4696->4697 4700 405f1b GetFileAttributesA CreateFileA 4697->4700 4699 40261f 4700->4699 3778 100010d0 GetVersionExA 3779 10001106 3778->3779 3780 100010fc 3778->3780 3781 10001122 LoadLibraryW 3779->3781 3782 1000110e 3779->3782 3784 100011a5 3781->3784 3785 1000113b GetProcAddress 3781->3785 3782->3780 3783 10001225 LoadLibraryA 3782->3783 3783->3780 3788 1000123d GetProcAddress GetProcAddress GetProcAddress 3783->3788 3784->3780 3793 100011c1 WideCharToMultiByte lstrcmpiA 3784->3793 3795 10001217 LocalFree 3784->3795 3797 100011f7 3784->3797 3786 1000118e 3785->3786 3787 1000114e LocalAlloc 3785->3787 3790 1000119a FreeLibrary 3786->3790 3789 10001189 3787->3789 3791 10001323 FreeLibrary 3788->3791 3802 1000126b 3788->3802 3789->3786 3792 1000115c NtQuerySystemInformation 3789->3792 3790->3784 3791->3780 3792->3790 3794 1000116f LocalFree 3792->3794 3793->3784 3794->3786 3796 10001180 LocalAlloc 3794->3796 3795->3780 3796->3789 3797->3784 3804 1000103f OpenProcess 3797->3804 3799 100012a2 lstrlenA 3799->3802 3800 1000131c CloseHandle 3800->3791 3801 100012c4 lstrcpynA lstrcmpiA 3801->3802 3802->3791 3802->3799 3802->3800 3802->3801 3803 1000103f 8 API calls 3802->3803 3803->3802 3805 10001060 3804->3805 3806 100010cb 3804->3806 3807 1000106b EnumWindows 3805->3807 3808 100010ac TerminateProcess 3805->3808 3806->3797 3807->3808 3809 1000107f GetExitCodeProcess 3807->3809 3814 10001007 GetWindowThreadProcessId 3807->3814 3810 100010be CloseHandle 3808->3810 3811 100010a7 3808->3811 3809->3811 3812 1000108e 3809->3812 3810->3806 3811->3810 3812->3811 3813 10001097 WaitForSingleObject 3812->3813 3813->3808 3813->3811 3815 10001024 PostMessageA 3814->3815 3816 10001036 3814->3816 3815->3816 4701 401490 4702 4054a9 24 API calls 4701->4702 4703 401497 4702->4703 4704 402590 4705 402c79 17 API calls 4704->4705 4706 40259a 4705->4706 4707 402c17 17 API calls 4706->4707 4708 4025a3 4707->4708 4709 4025ca RegEnumValueA 4708->4709 4710 4025be RegEnumKeyA 4708->4710 4712 4027c8 4708->4712 4711 4025df RegCloseKey 4709->4711 4710->4711 4711->4712 4714 406d91 4716 40690c 4714->4716 4715 407277 4716->4715 4716->4716 4717 406996 GlobalAlloc 4716->4717 4718 40698d GlobalFree 4716->4718 4719 406a04 GlobalFree 4716->4719 4720 406a0d GlobalAlloc 4716->4720 4717->4715 4717->4716 4718->4717 4719->4720 4720->4715 4720->4716 4721 404897 4722 4048c3 4721->4722 4723 4048d4 4721->4723 4782 405a82 GetDlgItemTextA 4722->4782 4725 4048e0 GetDlgItem 4723->4725 4726 40493f 4723->4726 4728 4048f4 4725->4728 4733 40641b 17 API calls 4726->4733 4742 404a23 4726->4742 4780 404bcd 4726->4780 4727 4048ce 4729 406666 5 API calls 4727->4729 4731 404908 SetWindowTextA 4728->4731 4732 405db3 4 API calls 4728->4732 4729->4723 4735 404405 18 API calls 4731->4735 4737 4048fe 4732->4737 4738 4049b3 SHBrowseForFolderA 4733->4738 4734 404a53 4739 405e08 18 API calls 4734->4739 4740 404924 4735->4740 4736 40446c 8 API calls 4741 404be1 4736->4741 4737->4731 4746 405d1a 3 API calls 4737->4746 4738->4742 4743 4049cb CoTaskMemFree 4738->4743 4744 404a59 4739->4744 4745 404405 18 API calls 4740->4745 4742->4780 4784 405a82 GetDlgItemTextA 4742->4784 4747 405d1a 3 API calls 4743->4747 4785 406388 lstrcpynA 4744->4785 4748 404932 4745->4748 4746->4731 4749 4049d8 4747->4749 4783 40443a SendMessageA 4748->4783 4752 404a0f SetDlgItemTextA 4749->4752 4757 40641b 17 API calls 4749->4757 4752->4742 4753 404938 4755 406794 5 API calls 4753->4755 4754 404a70 4756 406794 5 API calls 4754->4756 4755->4726 4763 404a77 4756->4763 4758 4049f7 lstrcmpiA 4757->4758 4758->4752 4761 404a08 lstrcatA 4758->4761 4759 404ab3 4786 406388 lstrcpynA 4759->4786 4761->4752 4762 404aba 4764 405db3 4 API calls 4762->4764 4763->4759 4767 405d61 2 API calls 4763->4767 4769 404b0b 4763->4769 4765 404ac0 GetDiskFreeSpaceA 4764->4765 4768 404ae4 MulDiv 4765->4768 4765->4769 4767->4763 4768->4769 4770 404b7c 4769->4770 4772 404d13 20 API calls 4769->4772 4771 404b9f 4770->4771 4773 40140b 2 API calls 4770->4773 4787 404427 EnableWindow 4771->4787 4774 404b69 4772->4774 4773->4771 4776 404b7e SetDlgItemTextA 4774->4776 4777 404b6e 4774->4777 4776->4770 4779 404c4e 20 API calls 4777->4779 4778 404bbb 4778->4780 4781 4047f0 SendMessageA 4778->4781 4779->4770 4780->4736 4781->4780 4782->4727 4783->4753 4784->4734 4785->4754 4786->4762 4787->4778 4788 40541d 4789 405441 4788->4789 4790 40542d 4788->4790 4793 405449 IsWindowVisible 4789->4793 4799 405460 4789->4799 4791 405433 4790->4791 4792 40548a 4790->4792 4794 404451 SendMessageA 4791->4794 4796 40548f CallWindowProcA 4792->4796 4793->4792 4795 405456 4793->4795 4797 40543d 4794->4797 4798 404d58 5 API calls 4795->4798 4796->4797 4798->4799 4799->4796 4800 404dd8 4 API calls 4799->4800 4800->4792 4801 40149d 4802 4014ab PostQuitMessage 4801->4802 4803 40238f 4801->4803 4802->4803 4804 40159d 4805 402c39 17 API calls 4804->4805 4806 4015a4 SetFileAttributesA 4805->4806 4807 4015b6 4806->4807 3997 40251e 4008 402c79 3997->4008 4000 402c39 17 API calls 4001 402531 4000->4001 4002 40253b RegQueryValueExA 4001->4002 4006 4027c8 4001->4006 4003 402561 RegCloseKey 4002->4003 4004 40255b 4002->4004 4003->4006 4004->4003 4013 4062e6 wsprintfA 4004->4013 4009 402c39 17 API calls 4008->4009 4010 402c90 4009->4010 4011 40620e RegOpenKeyExA 4010->4011 4012 402528 4011->4012 4012->4000 4013->4003 4808 401a1e 4809 402c39 17 API calls 4808->4809 4810 401a27 ExpandEnvironmentStringsA 4809->4810 4811 401a3b 4810->4811 4813 401a4e 4810->4813 4812 401a40 lstrcmpA 4811->4812 4811->4813 4812->4813 4819 40171f 4820 402c39 17 API calls 4819->4820 4821 401726 SearchPathA 4820->4821 4822 401741 4821->4822 4823 401d1f 4824 402c17 17 API calls 4823->4824 4825 401d26 4824->4825 4826 402c17 17 API calls 4825->4826 4827 401d32 GetDlgItem 4826->4827 4828 402628 4827->4828 4829 402aa0 SendMessageA 4830 402ac5 4829->4830 4831 402aba InvalidateRect 4829->4831 4831->4830 4832 10001363 4833 10001426 2 API calls 4832->4833 4834 1000138f 4833->4834 4835 100010d0 28 API calls 4834->4835 4836 10001399 4835->4836 4837 100014ba 3 API calls 4836->4837 4838 100013a2 4837->4838 4839 4023a4 4840 4023b2 4839->4840 4841 4023ac 4839->4841 4843 4023c2 4840->4843 4845 402c39 17 API calls 4840->4845 4842 402c39 17 API calls 4841->4842 4842->4840 4844 4023d0 4843->4844 4846 402c39 17 API calls 4843->4846 4847 402c39 17 API calls 4844->4847 4845->4843 4846->4844 4848 4023d9 WritePrivateProfileStringA 4847->4848 3286 4020a5 3287 4020b7 3286->3287 3297 402165 3286->3297 3304 402c39 3287->3304 3289 401423 24 API calls 3292 4022ea 3289->3292 3291 402c39 17 API calls 3293 4020c7 3291->3293 3294 4020dc LoadLibraryExA 3293->3294 3295 4020cf GetModuleHandleA 3293->3295 3296 4020ec GetProcAddress 3294->3296 3294->3297 3295->3294 3295->3296 3298 402138 3296->3298 3299 4020fb 3296->3299 3297->3289 3313 4054a9 3298->3313 3302 40210b 3299->3302 3310 401423 3299->3310 3302->3292 3303 402159 FreeLibrary 3302->3303 3303->3292 3305 402c45 3304->3305 3324 40641b 3305->3324 3307 4020be 3307->3291 3311 4054a9 24 API calls 3310->3311 3312 401431 3311->3312 3312->3302 3314 4054c4 3313->3314 3323 405567 3313->3323 3315 4054e1 lstrlenA 3314->3315 3316 40641b 17 API calls 3314->3316 3317 40550a 3315->3317 3318 4054ef lstrlenA 3315->3318 3316->3315 3320 405510 SetWindowTextA 3317->3320 3321 40551d 3317->3321 3319 405501 lstrcatA 3318->3319 3318->3323 3319->3317 3320->3321 3322 405523 SendMessageA SendMessageA SendMessageA 3321->3322 3321->3323 3322->3323 3323->3302 3325 406428 3324->3325 3326 40664d 3325->3326 3329 406627 lstrlenA 3325->3329 3330 40641b 10 API calls 3325->3330 3334 406543 GetSystemDirectoryA 3325->3334 3335 406556 GetWindowsDirectoryA 3325->3335 3336 406666 5 API calls 3325->3336 3337 40641b 10 API calls 3325->3337 3338 4065d0 lstrcatA 3325->3338 3339 40658a SHGetSpecialFolderLocation 3325->3339 3350 40626f 3325->3350 3355 4062e6 wsprintfA 3325->3355 3356 406388 lstrcpynA 3325->3356 3327 402c66 3326->3327 3357 406388 lstrcpynA 3326->3357 3327->3307 3341 406666 3327->3341 3329->3325 3330->3329 3334->3325 3335->3325 3336->3325 3337->3325 3338->3325 3339->3325 3340 4065a2 SHGetPathFromIDListA CoTaskMemFree 3339->3340 3340->3325 3347 406672 3341->3347 3342 4066da 3343 4066de CharPrevA 3342->3343 3346 4066f9 3342->3346 3343->3342 3344 4066cf CharNextA 3344->3342 3344->3347 3346->3307 3347->3342 3347->3344 3348 4066bd CharNextA 3347->3348 3349 4066ca CharNextA 3347->3349 3362 405d45 3347->3362 3348->3347 3349->3344 3358 40620e 3350->3358 3353 4062a3 RegQueryValueExA RegCloseKey 3354 4062d2 3353->3354 3354->3325 3355->3325 3356->3325 3357->3327 3359 40621d 3358->3359 3360 406221 3359->3360 3361 406226 RegOpenKeyExA 3359->3361 3360->3353 3360->3354 3361->3360 3363 405d4b 3362->3363 3364 405d5e 3363->3364 3365 405d51 CharNextA 3363->3365 3364->3347 3365->3363 4849 402e25 4850 402e34 SetTimer 4849->4850 4851 402e4d 4849->4851 4850->4851 4852 402e9b 4851->4852 4853 402ea1 MulDiv 4851->4853 4854 402e5b wsprintfA SetWindowTextA SetDlgItemTextA 4853->4854 4854->4852 4870 402429 4871 402430 4870->4871 4872 40245b 4870->4872 4873 402c79 17 API calls 4871->4873 4874 402c39 17 API calls 4872->4874 4875 402437 4873->4875 4876 402462 4874->4876 4878 402c39 17 API calls 4875->4878 4879 40246f 4875->4879 4881 402cf7 4876->4881 4880 402448 RegDeleteValueA RegCloseKey 4878->4880 4880->4879 4882 402d03 4881->4882 4883 402d0a 4881->4883 4882->4879 4883->4882 4885 402d3b 4883->4885 4886 40620e RegOpenKeyExA 4885->4886 4887 402d69 4886->4887 4888 402d79 RegEnumValueA 4887->4888 4889 402d9c 4887->4889 4896 402e13 4887->4896 4888->4889 4890 402e03 RegCloseKey 4888->4890 4889->4890 4891 402dd8 RegEnumKeyA 4889->4891 4892 402de1 RegCloseKey 4889->4892 4895 402d3b 6 API calls 4889->4895 4890->4896 4891->4889 4891->4892 4893 406794 5 API calls 4892->4893 4894 402df1 4893->4894 4894->4896 4897 402df5 RegDeleteKeyA 4894->4897 4895->4889 4896->4882 4897->4896 4898 4027aa 4899 402c39 17 API calls 4898->4899 4900 4027b1 FindFirstFileA 4899->4900 4901 4027d4 4900->4901 4902 4027c4 4900->4902 4903 4027db 4901->4903 4906 4062e6 wsprintfA 4901->4906 4907 406388 lstrcpynA 4903->4907 4906->4903 4907->4902 4908 403b2c 4909 403b37 4908->4909 4910 403b3b 4909->4910 4911 403b3e GlobalAlloc 4909->4911 4911->4910 4912 401c2e 4913 402c17 17 API calls 4912->4913 4914 401c35 4913->4914 4915 402c17 17 API calls 4914->4915 4916 401c42 4915->4916 4917 402c39 17 API calls 4916->4917 4918 401c57 4916->4918 4917->4918 4919 401c67 4918->4919 4920 402c39 17 API calls 4918->4920 4921 401c72 4919->4921 4922 401cbe 4919->4922 4920->4919 4924 402c17 17 API calls 4921->4924 4923 402c39 17 API calls 4922->4923 4925 401cc3 4923->4925 4926 401c77 4924->4926 4927 402c39 17 API calls 4925->4927 4928 402c17 17 API calls 4926->4928 4929 401ccc FindWindowExA 4927->4929 4930 401c83 4928->4930 4933 401cea 4929->4933 4931 401c90 SendMessageTimeoutA 4930->4931 4932 401cae SendMessageA 4930->4932 4931->4933 4932->4933 4934 40262e 4935 402633 4934->4935 4936 402647 4934->4936 4937 402c17 17 API calls 4935->4937 4938 402c39 17 API calls 4936->4938 4940 40263c 4937->4940 4939 40264e lstrlenA 4938->4939 4939->4940 4941 402670 4940->4941 4942 405fc2 WriteFile 4940->4942 4942->4941 3817 401932 3818 401934 3817->3818 3819 402c39 17 API calls 3818->3819 3820 401939 3819->3820 3823 405b4a 3820->3823 3824 405e08 18 API calls 3823->3824 3825 405b6a 3824->3825 3826 405b72 DeleteFileA 3825->3826 3827 405b89 3825->3827 3856 401942 3826->3856 3828 405cb7 3827->3828 3860 406388 lstrcpynA 3827->3860 3833 4066ff 2 API calls 3828->3833 3828->3856 3830 405baf 3831 405bc2 3830->3831 3832 405bb5 lstrcatA 3830->3832 3835 405d61 2 API calls 3831->3835 3834 405bc8 3832->3834 3836 405cdb 3833->3836 3837 405bd6 lstrcatA 3834->3837 3838 405be1 lstrlenA FindFirstFileA 3834->3838 3835->3834 3839 405d1a 3 API calls 3836->3839 3836->3856 3837->3838 3838->3828 3847 405c05 3838->3847 3841 405ce5 3839->3841 3840 405d45 CharNextA 3840->3847 3842 405b02 5 API calls 3841->3842 3843 405cf1 3842->3843 3844 405cf5 3843->3844 3845 405d0b 3843->3845 3851 4054a9 24 API calls 3844->3851 3844->3856 3846 4054a9 24 API calls 3845->3846 3846->3856 3847->3840 3848 405c96 FindNextFileA 3847->3848 3855 405b4a 60 API calls 3847->3855 3857 4054a9 24 API calls 3847->3857 3858 4054a9 24 API calls 3847->3858 3859 406161 36 API calls 3847->3859 3861 406388 lstrcpynA 3847->3861 3862 405b02 3847->3862 3848->3847 3850 405cae FindClose 3848->3850 3850->3828 3852 405d02 3851->3852 3853 406161 36 API calls 3852->3853 3853->3856 3855->3847 3857->3848 3858->3847 3859->3847 3860->3830 3861->3847 3870 405ef6 GetFileAttributesA 3862->3870 3865 405b2f 3865->3847 3866 405b25 DeleteFileA 3868 405b2b 3866->3868 3867 405b1d RemoveDirectoryA 3867->3868 3868->3865 3869 405b3b SetFileAttributesA 3868->3869 3869->3865 3871 405b0e 3870->3871 3872 405f08 SetFileAttributesA 3870->3872 3871->3865 3871->3866 3871->3867 3872->3871 4943 402733 4944 40273a 4943->4944 4946 402a47 4943->4946 4945 402c17 17 API calls 4944->4945 4947 402741 4945->4947 4948 402750 SetFilePointer 4947->4948 4948->4946 4949 402760 4948->4949 4951 4062e6 wsprintfA 4949->4951 4951->4946 4952 401e35 GetDC 4953 402c17 17 API calls 4952->4953 4954 401e47 GetDeviceCaps MulDiv ReleaseDC 4953->4954 4955 402c17 17 API calls 4954->4955 4956 401e78 4955->4956 4957 40641b 17 API calls 4956->4957 4958 401eb5 CreateFontIndirectA 4957->4958 4959 402628 4958->4959 4960 4014b7 4961 4014bd 4960->4961 4962 401389 2 API calls 4961->4962 4963 4014c5 4962->4963 3935 4015bb 3936 402c39 17 API calls 3935->3936 3937 4015c2 3936->3937 3938 405db3 4 API calls 3937->3938 3948 4015ca 3938->3948 3939 401624 3941 401652 3939->3941 3942 401629 3939->3942 3940 405d45 CharNextA 3940->3948 3944 401423 24 API calls 3941->3944 3943 401423 24 API calls 3942->3943 3945 401630 3943->3945 3951 40164a 3944->3951 3955 406388 lstrcpynA 3945->3955 3946 4059ec 2 API calls 3946->3948 3948->3939 3948->3940 3948->3946 3949 405a09 5 API calls 3948->3949 3952 40160c GetFileAttributesA 3948->3952 3954 4015f3 3948->3954 3949->3948 3950 40163b SetCurrentDirectoryA 3950->3951 3952->3948 3953 40596f 4 API calls 3953->3954 3954->3948 3954->3953 3955->3950 4964 40453b lstrcpynA lstrlenA 4965 4016bb 4966 402c39 17 API calls 4965->4966 4967 4016c1 GetFullPathNameA 4966->4967 4968 4016d8 4967->4968 4974 4016f9 4967->4974 4971 4066ff 2 API calls 4968->4971 4968->4974 4969 402ac5 4970 40170d GetShortPathNameA 4970->4969 4972 4016e9 4971->4972 4972->4974 4975 406388 lstrcpynA 4972->4975 4974->4969 4974->4970 4975->4974

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4034cc-40351c SetErrorMode GetVersionExA 1 40355d 0->1 2 40351e-403538 GetVersionExA 0->2 3 403564 1->3 2->3 4 40353a-403559 2->4 5 403566-403571 3->5 6 403588-40358f 3->6 4->1 7 403573-403582 5->7 8 403584 5->8 9 403591 6->9 10 403599-4035d9 6->10 7->6 8->6 9->10 11 4035db-4035e3 call 406794 10->11 12 4035ec 10->12 11->12 18 4035e5 11->18 14 4035f1-403605 call 406726 lstrlenA 12->14 19 403607-403623 call 406794 * 3 14->19 18->12 26 403634-403694 #17 OleInitialize SHGetFileInfoA call 406388 GetCommandLineA call 406388 19->26 27 403625-40362b 19->27 34 403696-40369a 26->34 35 40369f-4036b2 call 405d45 CharNextA 26->35 27->26 32 40362d 27->32 32->26 34->35 38 403773-403777 35->38 39 4036b7-4036ba 38->39 40 40377d 38->40 41 4036c2-4036c9 39->41 42 4036bc-4036c0 39->42 43 403791-4037ab GetTempPathA call 40349b 40->43 44 4036d0-4036d3 41->44 45 4036cb-4036cc 41->45 42->41 42->42 53 403803-40381b DeleteFileA call 402f5c 43->53 54 4037ad-4037cb GetWindowsDirectoryA lstrcatA call 40349b 43->54 47 403764-403770 call 405d45 44->47 48 4036d9-4036dd 44->48 45->44 47->38 66 403772 47->66 51 4036f5-403722 48->51 52 4036df-4036e5 48->52 55 403734-403762 51->55 56 403724-40372a 51->56 60 4036e7-4036e9 52->60 61 4036eb 52->61 69 403821-403827 53->69 70 4038ae-4038bf ExitProcess OleUninitialize 53->70 54->53 68 4037cd-4037fd GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40349b 54->68 55->47 65 40377f-40378c call 406388 55->65 62 403730 56->62 63 40372c-40372e 56->63 60->51 60->61 61->51 62->55 63->55 63->62 65->43 66->38 68->53 68->70 73 403829-403834 call 405d45 69->73 74 40389f-4038a6 call 403b6e 69->74 75 4038c5-4038d4 call 405a9e ExitProcess 70->75 76 4039e8-4039ee 70->76 91 403836-40385f 73->91 92 40386a-403873 73->92 85 4038ab 74->85 77 4039f0-403a05 GetCurrentProcess OpenProcessToken 76->77 78 403a66-403a6e 76->78 83 403a36-403a44 call 406794 77->83 84 403a07-403a30 LookupPrivilegeValueA AdjustTokenPrivileges 77->84 87 403a70 78->87 88 403a73-403a76 ExitProcess 78->88 99 403a52-403a5d ExitWindowsEx 83->99 100 403a46-403a50 83->100 84->83 85->70 87->88 96 403861-403863 91->96 93 403875-403883 call 405e08 92->93 94 4038da-4038ee call 405a09 lstrcatA 92->94 93->70 107 403885-40389b call 406388 * 2 93->107 105 4038f0-4038f6 lstrcatA 94->105 106 4038fb-403915 lstrcatA lstrcmpiA 94->106 96->92 101 403865-403868 96->101 99->78 104 403a5f-403a61 call 40140b 99->104 100->99 100->104 101->92 101->96 104->78 105->106 106->70 110 403917-40391a 106->110 107->74 112 403923 call 4059ec 110->112 113 40391c-403921 call 40596f 110->113 120 403928-403936 SetCurrentDirectoryA 112->120 113->120 121 403943-40396e call 406388 120->121 122 403938-40393e call 406388 120->122 126 403974-403991 call 40641b DeleteFileA 121->126 122->121 129 4039d1-4039da 126->129 130 403993-4039a3 CopyFileA 126->130 129->126 132 4039dc-4039e3 call 406161 129->132 130->129 131 4039a5-4039c5 call 406161 call 40641b call 405a21 130->131 131->129 141 4039c7-4039ce CloseHandle 131->141 132->70 141->129
                    APIs
                    • SetErrorMode.KERNEL32(00008001), ref: 004034EF
                    • GetVersionExA.KERNEL32(?), ref: 00403518
                    • GetVersionExA.KERNEL32(0000009C), ref: 0040352F
                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F8
                    • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403635
                    • OleInitialize.OLE32(00000000), ref: 0040363C
                    • SHGetFileInfoA.SHELL32(0041FD10,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 0040365A
                    • GetCommandLineA.KERNEL32(00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 0040366F
                    • CharNextA.USER32(00000000,C:\Users\user\AppData\Local\Temp\218A.exe,00000020,C:\Users\user\AppData\Local\Temp\218A.exe,00000000,?,00000007,00000009,0000000B), ref: 004036A9
                    • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 004037A2
                    • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004037B3
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037BF
                    • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037D3
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037DB
                    • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037EC
                    • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004037F4
                    • DeleteFileA.KERNEL32(1033,?,00000007,00000009,0000000B), ref: 00403808
                    • ExitProcess.KERNEL32(?,?,00000007,00000009,0000000B), ref: 004038AE
                    • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 004038B3
                    • ExitProcess.KERNEL32 ref: 004038D4
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\218A.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038E7
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A1B0,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\218A.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038F6
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\218A.exe,00000000,?,?,00000007,00000009,0000000B), ref: 00403901
                    • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp), ref: 0040390D
                    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403929
                    • DeleteFileA.KERNEL32(0041F910,0041F910,?,00425000,?,?,00000007,00000009,0000000B), ref: 00403986
                    • CopyFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\218A.exe,0041F910,00000001), ref: 0040399B
                    • CloseHandle.KERNEL32(00000000,0041F910,0041F910,?,0041F910,00000000,?,00000007,00000009,0000000B), ref: 004039C8
                    • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004039F6
                    • OpenProcessToken.ADVAPI32(00000000), ref: 004039FD
                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A11
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A30
                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403A55
                    • ExitProcess.KERNEL32 ref: 00403A76
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Processlstrcat$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                    • String ID: "$.tmp$1033$A$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\218A.exe$C:\Users\user\AppData\Local\Temp\218A.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Users\user\AppData\Roaming\GamePall\update$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                    • API String ID: 2882342585-1067146837
                    • Opcode ID: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                    • Instruction ID: 1a4863036e4e50ed5e1acae1e6299f6db15da00d6e87979e5214c03ba8a99dba
                    • Opcode Fuzzy Hash: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                    • Instruction Fuzzy Hash: 99E1D270A04354AADB21AF659D49B6F7EB89F86306F0540BFF441B61D2CB7C4A05CB2E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 216 100010d0-100010fa GetVersionExA 217 10001106-1000110c 216->217 218 100010fc-10001101 216->218 219 10001122-10001139 LoadLibraryW 217->219 220 1000110e-10001112 217->220 221 1000135d-10001362 218->221 224 100011a5 219->224 225 1000113b-1000114c GetProcAddress 219->225 222 10001225-10001237 LoadLibraryA 220->222 223 10001118-1000111d 220->223 229 10001332-10001337 222->229 230 1000123d-10001265 GetProcAddress * 3 222->230 226 1000135b-1000135c 223->226 231 100011aa-100011ae 224->231 227 10001195 225->227 228 1000114e-1000115a LocalAlloc 225->228 226->221 233 1000119a-100011a3 FreeLibrary 227->233 232 10001189-1000118c 228->232 229->226 234 10001323-10001326 FreeLibrary 230->234 235 1000126b-1000126d 230->235 236 100011b0-100011b2 231->236 237 100011b7 231->237 240 1000115c-1000116d NtQuerySystemInformation 232->240 241 1000118e-10001193 232->241 233->231 239 1000132c-10001330 234->239 235->234 242 10001273-10001275 235->242 236->226 238 100011ba-100011bf 237->238 243 100011c1-100011ec WideCharToMultiByte lstrcmpiA 238->243 244 1000120d-10001211 238->244 239->229 245 10001339-1000133d 239->245 240->233 246 1000116f-1000117e LocalFree 240->246 241->233 242->234 247 1000127b-10001286 242->247 243->244 248 100011ee-100011f5 243->248 251 10001213-10001215 244->251 252 10001217-10001220 LocalFree 244->252 249 10001359 245->249 250 1000133f-10001343 245->250 246->241 253 10001180-10001187 LocalAlloc 246->253 247->234 258 1000128c-100012a0 247->258 248->252 254 100011f7-1000120a call 1000103f 248->254 249->226 255 10001345-1000134a 250->255 256 1000134c-10001350 250->256 251->238 252->239 253->232 254->244 255->226 256->249 260 10001352-10001357 256->260 263 10001318-1000131a 258->263 260->226 264 100012a2-100012b6 lstrlenA 263->264 265 1000131c-1000131d CloseHandle 263->265 266 100012bd-100012c2 264->266 265->234 267 100012c4-100012ea lstrcpynA lstrcmpiA 266->267 268 100012b8-100012ba 266->268 270 100012ec-100012f3 267->270 271 1000130e-10001315 267->271 268->267 269 100012bc 268->269 269->266 270->265 272 100012f5-1000130b call 1000103f 270->272 271->263 272->271
                    APIs
                    • GetVersionExA.KERNEL32(?), ref: 100010F2
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3693735867.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000008.00000002.3693640237.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693773706.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693816432.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_10000000_218A.jbxd
                    Similarity
                    • API ID: Version
                    • String ID: CreateToolhelp32Snapshot$KERNEL32.DLL$NTDLL.DLL$NtQuerySystemInformation$Process32First$Process32Next
                    • API String ID: 1889659487-877962304
                    • Opcode ID: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                    • Instruction ID: 3df706415bff85d1043f51983ae3f68c733976b3404a17f8fb4488dcc6387507
                    • Opcode Fuzzy Hash: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                    • Instruction Fuzzy Hash: 19715871900659EFFB11DFA4CC88ADE3BEAEB483C4F250026FA19D2159E6358E49CB50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 405b4a-405b70 call 405e08 449 405b72-405b84 DeleteFileA 446->449 450 405b89-405b90 446->450 451 405d13-405d17 449->451 452 405b92-405b94 450->452 453 405ba3-405bb3 call 406388 450->453 454 405cc1-405cc6 452->454 455 405b9a-405b9d 452->455 461 405bc2-405bc3 call 405d61 453->461 462 405bb5-405bc0 lstrcatA 453->462 454->451 457 405cc8-405ccb 454->457 455->453 455->454 459 405cd5-405cdd call 4066ff 457->459 460 405ccd-405cd3 457->460 459->451 470 405cdf-405cf3 call 405d1a call 405b02 459->470 460->451 464 405bc8-405bcb 461->464 462->464 467 405bd6-405bdc lstrcatA 464->467 468 405bcd-405bd4 464->468 469 405be1-405bff lstrlenA FindFirstFileA 467->469 468->467 468->469 471 405c05-405c1c call 405d45 469->471 472 405cb7-405cbb 469->472 485 405cf5-405cf8 470->485 486 405d0b-405d0e call 4054a9 470->486 479 405c27-405c2a 471->479 480 405c1e-405c22 471->480 472->454 474 405cbd 472->474 474->454 483 405c2c-405c31 479->483 484 405c3d-405c4b call 406388 479->484 480->479 482 405c24 480->482 482->479 488 405c33-405c35 483->488 489 405c96-405ca8 FindNextFileA 483->489 497 405c62-405c6d call 405b02 484->497 498 405c4d-405c55 484->498 485->460 491 405cfa-405d09 call 4054a9 call 406161 485->491 486->451 488->484 492 405c37-405c3b 488->492 489->471 494 405cae-405cb1 FindClose 489->494 491->451 492->484 492->489 494->472 506 405c8e-405c91 call 4054a9 497->506 507 405c6f-405c72 497->507 498->489 501 405c57-405c60 call 405b4a 498->501 501->489 506->489 508 405c74-405c84 call 4054a9 call 406161 507->508 509 405c86-405c8c 507->509 508->489 509->489
                    APIs
                    • DeleteFileA.KERNEL32(?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405B73
                    • lstrcatA.KERNEL32(00421D58,\*.*,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405BBB
                    • lstrcatA.KERNEL32(?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405BDC
                    • lstrlenA.KERNEL32(?,?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405BE2
                    • FindFirstFileA.KERNEL32(00421D58,?,?,?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405BF3
                    • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405CA0
                    • FindClose.KERNEL32(00000000), ref: 00405CB1
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\218A.exe$\*.*
                    • API String ID: 2035342205-2607376649
                    • Opcode ID: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                    • Instruction ID: 9e5d3321e74a3647b1fb2cdcf4bec0a51507e3563529971eb59e862f6dba24c5
                    • Opcode Fuzzy Hash: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                    • Instruction Fuzzy Hash: 2B519130908B04AAEB316B61CC49BAF7AB8DF82755F14813FF851B51D2C73C5982DE69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 713 406a88-406a8d 714 406afe-406b1c 713->714 715 406a8f-406abe 713->715 716 4070f4-407109 714->716 717 406ac0-406ac3 715->717 718 406ac5-406ac9 715->718 719 407123-407139 716->719 720 40710b-407121 716->720 721 406ad5-406ad8 717->721 722 406ad1 718->722 723 406acb-406acf 718->723 724 40713c-407143 719->724 720->724 725 406af6-406af9 721->725 726 406ada-406ae3 721->726 722->721 723->721 728 407145-407149 724->728 729 40716a-407176 724->729 727 406ccb-406ce9 725->727 730 406ae5 726->730 731 406ae8-406af4 726->731 732 406d01-406d13 727->732 733 406ceb-406cff 727->733 734 4072f8-407302 728->734 735 40714f-407167 728->735 742 40690c-406915 729->742 730->731 737 406b5e-406b8c 731->737 741 406d16-406d20 732->741 733->741 740 40730e-407321 734->740 735->729 738 406ba8-406bc2 737->738 739 406b8e-406ba6 737->739 743 406bc5-406bcf 738->743 739->743 748 407326-40732a 740->748 746 406d22 741->746 747 406cc3-406cc9 741->747 744 407323 742->744 745 40691b 742->745 750 406bd5 743->750 751 406b46-406b4c 743->751 744->748 752 406922-406926 745->752 753 406a62-406a83 745->753 754 4069c7-4069cb 745->754 755 406a37-406a3b 745->755 756 406e33-406e40 746->756 757 406c9e-406ca2 746->757 747->727 749 406c67-406c71 747->749 758 4072b6-4072c0 749->758 759 406c77-406c99 749->759 771 407292-40729c 750->771 772 406b2b-406b43 750->772 760 406b52-406b58 751->760 761 406bff-406c05 751->761 752->740 768 40692c-406939 752->768 753->716 762 4069d1-4069ea 754->762 763 407277-407281 754->763 769 406a41-406a55 755->769 770 407286-407290 755->770 756->742 767 406e8f-406e9e 756->767 764 406ca8-406cc0 757->764 765 4072aa-4072b4 757->765 758->740 759->756 760->737 773 406c63 760->773 761->773 775 406c07-406c25 761->775 776 4069ed-4069f1 762->776 763->740 764->747 765->740 767->716 768->744 774 40693f-406985 768->774 777 406a58-406a60 769->777 770->740 771->740 772->751 773->749 779 406987-40698b 774->779 780 4069ad-4069af 774->780 781 406c27-406c3b 775->781 782 406c3d-406c4f 775->782 776->754 778 4069f3-4069f9 776->778 777->753 777->755 788 406a23-406a35 778->788 789 4069fb-406a02 778->789 783 406996-4069a4 GlobalAlloc 779->783 784 40698d-406990 GlobalFree 779->784 786 4069b1-4069bb 780->786 787 4069bd-4069c5 780->787 785 406c52-406c5c 781->785 782->785 783->744 790 4069aa 783->790 784->783 785->761 791 406c5e 785->791 786->786 786->787 787->776 788->777 792 406a04-406a07 GlobalFree 789->792 793 406a0d-406a1d GlobalAlloc 789->793 790->780 795 406be4-406bfc 791->795 796 40729e-4072a8 791->796 792->793 793->744 793->788 795->761 796->740
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                    • Instruction ID: c2ee61ea0ab5e5811791f69f03c7ffba3fbd093a674906ee4b434ab4c587e2e9
                    • Opcode Fuzzy Hash: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                    • Instruction Fuzzy Hash: 0FF18A70D04269CBDF28CF98C8946ADBBB0FF44305F24816ED856BB281D7786A86DF45
                    APIs
                    • FindFirstFileA.KERNEL32(74DF3410,004225A0,C:\,00405E4B,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0), ref: 0040670A
                    • FindClose.KERNEL32(00000000), ref: 00406716
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID: C:\
                    • API String ID: 2295610775-3404278061
                    • Opcode ID: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                    • Instruction ID: 083b1303d1f5dd1ba3b50291930e0491dd498af142a60d7bee4daa0eb941c193
                    • Opcode Fuzzy Hash: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                    • Instruction Fuzzy Hash: B3D01231515120BBC3405B38AE0C95B7E589F093747618A36F066F22E4DB74CC6286AC

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 142 403b6e-403b86 call 406794 145 403b88-403b98 call 4062e6 142->145 146 403b9a-403bcb call 40626f 142->146 155 403bee-403c17 call 403e33 call 405e08 145->155 150 403be3-403be9 lstrcatA 146->150 151 403bcd-403bde call 40626f 146->151 150->155 151->150 160 403c1d-403c22 155->160 161 403c9e-403ca6 call 405e08 155->161 160->161 162 403c24-403c48 call 40626f 160->162 166 403cb4-403cd9 LoadImageA 161->166 167 403ca8-403caf call 40641b 161->167 162->161 169 403c4a-403c4c 162->169 171 403d5a-403d62 call 40140b 166->171 172 403cdb-403d0b RegisterClassA 166->172 167->166 173 403c5d-403c69 lstrlenA 169->173 174 403c4e-403c5b call 405d45 169->174 185 403d64-403d67 171->185 186 403d6c-403d77 call 403e33 171->186 175 403d11-403d55 SystemParametersInfoA CreateWindowExA 172->175 176 403e29 172->176 180 403c91-403c99 call 405d1a call 406388 173->180 181 403c6b-403c79 lstrcmpiA 173->181 174->173 175->171 179 403e2b-403e32 176->179 180->161 181->180 184 403c7b-403c85 GetFileAttributesA 181->184 188 403c87-403c89 184->188 189 403c8b-403c8c call 405d61 184->189 185->179 195 403e00-403e08 call 40557b 186->195 196 403d7d-403d97 ShowWindow call 406726 186->196 188->180 188->189 189->180 203 403e22-403e24 call 40140b 195->203 204 403e0a-403e10 195->204 201 403da3-403db5 GetClassInfoA 196->201 202 403d99-403d9e call 406726 196->202 207 403db7-403dc7 GetClassInfoA RegisterClassA 201->207 208 403dcd-403dfe DialogBoxParamA call 40140b call 403abe 201->208 202->201 203->176 204->185 209 403e16-403e1d call 40140b 204->209 207->208 208->179 209->185
                    APIs
                      • Part of subcall function 00406794: GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                      • Part of subcall function 00406794: GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                    • lstrcatA.KERNEL32(1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,?,C:\Users\user\AppData\Local\Temp\218A.exe,00000009,0000000B), ref: 00403BE9
                    • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,?,?,C:\Windows\wininit.ini,00000000,C:\Users\user\AppData\Roaming\GamePall,1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,74DF3410), ref: 00403C5E
                    • lstrcmpiA.KERNEL32(?,.exe), ref: 00403C71
                    • GetFileAttributesA.KERNEL32(C:\Windows\wininit.ini,?,C:\Users\user\AppData\Local\Temp\218A.exe,00000009,0000000B), ref: 00403C7C
                    • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\GamePall), ref: 00403CC5
                      • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                    • RegisterClassA.USER32(00423EE0), ref: 00403D02
                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403D1A
                    • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403D4F
                    • ShowWindow.USER32(00000005,00000000,?,C:\Users\user\AppData\Local\Temp\218A.exe,00000009,0000000B), ref: 00403D85
                    • GetClassInfoA.USER32(00000000,RichEdit20A,00423EE0), ref: 00403DB1
                    • GetClassInfoA.USER32(00000000,RichEdit,00423EE0), ref: 00403DBE
                    • RegisterClassA.USER32(00423EE0), ref: 00403DC7
                    • DialogBoxParamA.USER32(?,00000000,00403F0B,00000000), ref: 00403DE6
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                    • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\218A.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$Control Panel\Desktop\ResourceLocale$PB$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$>B
                    • API String ID: 1975747703-1922394156
                    • Opcode ID: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                    • Instruction ID: 5836c5bb6a6ef8c4ff0aed12ec42ff3eebf2d58129c507535c8ab2622d1094a3
                    • Opcode Fuzzy Hash: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                    • Instruction Fuzzy Hash: 4F61D670204200AED620AF65AD45F3B3A7CEB8574AF41453FF951B62E2CB7D9D028B6D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 275 402f5c-402faa GetTickCount GetModuleFileNameA call 405f1b 278 402fb6-402fe4 call 406388 call 405d61 call 406388 GetFileSize 275->278 279 402fac-402fb1 275->279 287 402fea 278->287 288 4030cf-4030dd call 402ebd 278->288 280 4031f6-4031fa 279->280 290 402fef-403006 287->290 295 4030e3-4030e6 288->295 296 4031ae-4031b3 288->296 292 403008 290->292 293 40300a-403013 call 40346e 290->293 292->293 300 403019-403020 293->300 301 40316a-403172 call 402ebd 293->301 298 403112-40315e GlobalAlloc call 4068b9 call 405f4a CreateFileA 295->298 299 4030e8-403100 call 403484 call 40346e 295->299 296->280 326 403160-403165 298->326 327 403174-4031a4 call 403484 call 4031fd 298->327 299->296 321 403106-40310c 299->321 305 403022-403036 call 405ed6 300->305 306 40309c-4030a0 300->306 301->296 311 4030aa-4030b0 305->311 324 403038-40303f 305->324 310 4030a2-4030a9 call 402ebd 306->310 306->311 310->311 317 4030b2-4030bc call 40684b 311->317 318 4030bf-4030c7 311->318 317->318 318->290 325 4030cd 318->325 321->296 321->298 324->311 329 403041-403048 324->329 325->288 326->280 335 4031a9-4031ac 327->335 329->311 331 40304a-403051 329->331 331->311 334 403053-40305a 331->334 334->311 336 40305c-40307c 334->336 335->296 337 4031b5-4031c6 335->337 336->296 338 403082-403086 336->338 339 4031c8 337->339 340 4031ce-4031d3 337->340 341 403088-40308c 338->341 342 40308e-403096 338->342 339->340 343 4031d4-4031da 340->343 341->325 341->342 342->311 344 403098-40309a 342->344 343->343 345 4031dc-4031f4 call 405ed6 343->345 344->311 345->280
                    APIs
                    • GetTickCount.KERNEL32 ref: 00402F70
                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\218A.exe,00000400), ref: 00402F8C
                      • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00405F1F
                      • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\218A.exe,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00402FD5
                    • GlobalAlloc.KERNEL32(00000040,00000009), ref: 00403117
                    Strings
                    • C:\Users\user\AppData\Local\Temp\218A.exe, xrefs: 00402F76, 00402F85, 00402F99, 00402FB6
                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 004031AE
                    • C:\Users\user\AppData\Local\Temp\218A.exe, xrefs: 00402F65
                    • Error launching installer, xrefs: 00402FAC
                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403160
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F66, 0040312F
                    • soft, xrefs: 0040304A
                    • C:\Users\user\AppData\Local\Temp, xrefs: 00402FB7, 00402FBC, 00402FC2
                    • Inst, xrefs: 00403041
                    • Null, xrefs: 00403053
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                    • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\218A.exe$C:\Users\user\AppData\Local\Temp\218A.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                    • API String ID: 2803837635-3736398914
                    • Opcode ID: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                    • Instruction ID: 8a05da1d373fd2b3e089436e62a275652004ed3b6aa6cfe031be989f12afac8e
                    • Opcode Fuzzy Hash: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                    • Instruction Fuzzy Hash: 0771E231A01218ABDB20EF65DD85B9E7BACEB44356F10813BF910BA2C1D77C9E458B5C

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 348 405ff1-406015 349 406017-40602f call 405f1b CloseHandle GetShortPathNameA 348->349 350 40603d-40604c GetShortPathNameA 348->350 353 40615c-406160 349->353 357 406035-406037 349->357 352 406052-406054 350->352 350->353 352->353 355 40605a-406098 wsprintfA call 40641b call 405f1b 352->355 355->353 361 40609e-4060ba GetFileSize GlobalAlloc 355->361 357->350 357->353 362 4060c0-4060ca call 405f93 361->362 363 406155-406156 CloseHandle 361->363 362->363 366 4060d0-4060dd call 405e80 362->366 363->353 369 4060f3-406105 call 405e80 366->369 370 4060df-4060f1 lstrcpyA 366->370 376 406124 369->376 377 406107-40610d 369->377 371 406128 370->371 373 40612a-40614f call 405ed6 SetFilePointer call 405fc2 GlobalFree 371->373 373->363 376->371 378 406115-406117 377->378 380 406119-406122 378->380 381 40610f-406114 378->381 380->373 381->378
                    APIs
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                    • GetShortPathNameA.KERNEL32(?,NUL,00000400), ref: 0040602B
                      • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                      • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                    • GetShortPathNameA.KERNEL32(?,C:\Windows\wininit.ini,00000400), ref: 00406048
                    • wsprintfA.USER32 ref: 00406066
                    • GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                    • SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                    • GlobalFree.KERNEL32(00000000), ref: 0040614F
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406156
                      • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00405F1F
                      • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                    • String ID: %s=%s$C:\Windows\wininit.ini$NUL$NUL=C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\$[Rename]
                    • API String ID: 2171350718-2586212515
                    • Opcode ID: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                    • Instruction ID: 7566a5a9e9d08134d14435fb5d3e1561ad96112206bac95af022f508aac3f812
                    • Opcode Fuzzy Hash: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                    • Instruction Fuzzy Hash: 68310531200715BBC2207B659D49F6B3A5DDF85754F15003EFE42BA2C3EA7CD8228AAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 384 40641b-406426 385 406428-406437 384->385 386 406439-40644f 384->386 385->386 387 406643-406647 386->387 388 406455-406460 386->388 390 406472-40647c 387->390 391 40664d-406657 387->391 388->387 389 406466-40646d 388->389 389->387 390->391 392 406482-406489 390->392 393 406662-406663 391->393 394 406659-40665d call 406388 391->394 395 406636 392->395 396 40648f-4064c3 392->396 394->393 398 406640-406642 395->398 399 406638-40663e 395->399 400 4065e3-4065e6 396->400 401 4064c9-4064d3 396->401 398->387 399->387 404 406616-406619 400->404 405 4065e8-4065eb 400->405 402 4064f0 401->402 403 4064d5-4064de 401->403 411 4064f7-4064fe 402->411 403->402 408 4064e0-4064e3 403->408 406 406627-406634 lstrlenA 404->406 407 40661b-406622 call 40641b 404->407 409 4065fb-406607 call 406388 405->409 410 4065ed-4065f9 call 4062e6 405->410 406->387 407->406 408->402 413 4064e5-4064e8 408->413 422 40660c-406612 409->422 410->422 415 406500-406502 411->415 416 406503-406505 411->416 413->402 418 4064ea-4064ee 413->418 415->416 420 406507-40652a call 40626f 416->420 421 40653e-406541 416->421 418->411 432 406530-406539 call 40641b 420->432 433 4065ca-4065ce 420->433 425 406551-406554 421->425 426 406543-40654f GetSystemDirectoryA 421->426 422->406 424 406614 422->424 428 4065db-4065e1 call 406666 424->428 430 4065c1-4065c3 425->430 431 406556-406564 GetWindowsDirectoryA 425->431 429 4065c5-4065c8 426->429 428->406 429->428 429->433 430->429 434 406566-406570 430->434 431->430 432->429 433->428 437 4065d0-4065d6 lstrcatA 433->437 439 406572-406575 434->439 440 40658a-4065a0 SHGetSpecialFolderLocation 434->440 437->428 439->440 442 406577-40657e 439->442 443 4065a2-4065bc SHGetPathFromIDListA CoTaskMemFree 440->443 444 4065be 440->444 445 406586-406588 442->445 443->429 443->444 444->430 445->429 445->440
                    APIs
                    • GetSystemDirectoryA.KERNEL32(C:\Windows\wininit.ini,00000400), ref: 00406549
                    • GetWindowsDirectoryA.KERNEL32(C:\Windows\wininit.ini,00000400,?,00420530,00000000,004054E1,00420530,00000000), ref: 0040655C
                    • SHGetSpecialFolderLocation.SHELL32(004054E1,00000000,?,00420530,00000000,004054E1,00420530,00000000), ref: 00406598
                    • SHGetPathFromIDListA.SHELL32(00000000,C:\Windows\wininit.ini), ref: 004065A6
                    • CoTaskMemFree.OLE32(00000000), ref: 004065B2
                    • lstrcatA.KERNEL32(C:\Windows\wininit.ini,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D6
                    • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,00420530,00000000,004054E1,00420530,00000000,00000000,00000000,00000000), ref: 00406628
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                    • String ID: C:\Windows\wininit.ini$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                    • API String ID: 717251189-1428620962
                    • Opcode ID: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                    • Instruction ID: f38e20b3a3e0c1a2470d5ac0c6d90f06be75126661b475aa23e0086d5b044b98
                    • Opcode Fuzzy Hash: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                    • Instruction Fuzzy Hash: 9F612370900114AEDF205F24EC90BBA3BA4EB52314F52403FE913B62D1D37D8A62DB4E

                    Control-flow Graph

                    APIs
                    • lstrcatA.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 00401798
                    • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Local\Temp\setup.exe,00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 004017C2
                      • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                    • String ID: C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\INetC.dll$C:\Users\user\AppData\Local\Temp\setup.exe$C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 1941528284-2651245900
                    • Opcode ID: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                    • Instruction ID: 0d76be79c55a0237b493b10f9ec5be6125ba7ce9be49b25e4c886387d44134cc
                    • Opcode Fuzzy Hash: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                    • Instruction Fuzzy Hash: E141B731900615BBCB107BB5CC45DAF3668EF45329B61833BF422F10E1D67C8A529AAE

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 582 406726-406746 GetSystemDirectoryA 583 406748 582->583 584 40674a-40674c 582->584 583->584 585 40675c-40675e 584->585 586 40674e-406756 584->586 588 40675f-406791 wsprintfA LoadLibraryExA 585->588 586->585 587 406758-40675a 586->587 587->588
                    APIs
                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040673D
                    • wsprintfA.USER32 ref: 00406776
                    • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: DirectoryLibraryLoadSystemwsprintf
                    • String ID: %s%s.dll$UXTHEME$\
                    • API String ID: 2200240437-4240819195
                    • Opcode ID: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                    • Instruction ID: 0c3db372634d2cfba6f48721b0c795b31ebca02323a8b7d7371d162bf0ec7b9a
                    • Opcode Fuzzy Hash: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                    • Instruction Fuzzy Hash: FBF0FC7050021966DB15A764DD0DFEA365CAB08309F1404BEA586E20C1D6B8D5258B69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 589 4068d9-4068fc 590 406906-406909 589->590 591 4068fe-406901 589->591 593 40690c-406915 590->593 592 407326-40732a 591->592 594 407323 593->594 595 40691b 593->595 594->592 596 406922-406926 595->596 597 406a62-407109 595->597 598 4069c7-4069cb 595->598 599 406a37-406a3b 595->599 603 40692c-406939 596->603 604 40730e-407321 596->604 608 407123-407139 597->608 609 40710b-407121 597->609 601 4069d1-4069ea 598->601 602 407277-407281 598->602 605 406a41-406a55 599->605 606 407286-407290 599->606 607 4069ed-4069f1 601->607 602->604 603->594 610 40693f-406985 603->610 604->592 611 406a58-406a60 605->611 606->604 607->598 613 4069f3-4069f9 607->613 612 40713c-407143 608->612 609->612 614 406987-40698b 610->614 615 4069ad-4069af 610->615 611->597 611->599 620 407145-407149 612->620 621 40716a-407176 612->621 618 406a23-406a35 613->618 619 4069fb-406a02 613->619 622 406996-4069a4 GlobalAlloc 614->622 623 40698d-406990 GlobalFree 614->623 616 4069b1-4069bb 615->616 617 4069bd-4069c5 615->617 616->616 616->617 617->607 618->611 625 406a04-406a07 GlobalFree 619->625 626 406a0d-406a1d GlobalAlloc 619->626 627 4072f8-407302 620->627 628 40714f-407167 620->628 621->593 622->594 624 4069aa 622->624 623->622 624->615 625->626 626->594 626->618 627->604 628->621
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 004068E3
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 0-292220189
                    • Opcode ID: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                    • Instruction ID: 8182d74baebb800b0d472bca2432a1a472ea96a2662ae7b36db949844af6c4d7
                    • Opcode Fuzzy Hash: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                    • Instruction Fuzzy Hash: DF815971E04228DBEF24CFA8C844BADBBB1FF44305F10816AD956BB281C7786986DF45

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 630 403305-40332d GetTickCount 631 403333-40335e call 403484 SetFilePointer 630->631 632 40345d-403465 call 402ebd 630->632 638 403363-403375 631->638 637 403467-40346b 632->637 639 403377 638->639 640 403379-403387 call 40346e 638->640 639->640 643 40338d-403399 640->643 644 40344f-403452 640->644 645 40339f-4033a5 643->645 644->637 646 4033d0-4033ec call 4068d9 645->646 647 4033a7-4033ad 645->647 653 403458 646->653 654 4033ee-4033f6 646->654 647->646 648 4033af-4033cf call 402ebd 647->648 648->646 655 40345a-40345b 653->655 656 4033f8-403400 call 405fc2 654->656 657 403419-40341f 654->657 655->637 661 403405-403407 656->661 657->653 659 403421-403423 657->659 659->653 660 403425-403438 659->660 660->638 662 40343e-40344d SetFilePointer 660->662 663 403454-403456 661->663 664 403409-403415 661->664 662->632 663->655 664->645 665 403417 664->665 665->660
                    APIs
                    • GetTickCount.KERNEL32 ref: 00403319
                      • Part of subcall function 00403484: SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                    • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 0040334C
                    • SetFilePointer.KERNEL32(?,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000), ref: 00403447
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403379, 0040337F
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FilePointer$CountTick
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 1092082344-292220189
                    • Opcode ID: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                    • Instruction ID: 5f41a1ef9683aad456499e8308d87ccfcfa217f8aa92108fcff4f05b83e24891
                    • Opcode Fuzzy Hash: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                    • Instruction Fuzzy Hash: 1F319F72A002059FC711BF2AFE849663BACE741356710C13BE814B62F0CB3859458FAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 666 405f4a-405f54 667 405f55-405f80 GetTickCount GetTempFileNameA 666->667 668 405f82-405f84 667->668 669 405f8f-405f91 667->669 668->667 671 405f86 668->671 670 405f89-405f8c 669->670 671->670
                    APIs
                    • GetTickCount.KERNEL32 ref: 00405F5E
                    • GetTempFileNameA.KERNEL32(0000000B,?,00000000,?,?,004034CA,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007), ref: 00405F78
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CountFileNameTempTick
                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                    • API String ID: 1716503409-678247507
                    • Opcode ID: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                    • Instruction ID: 05c77450f8afc2c62a5a11a921c51d956a1ea51751b09822177720344b0c8500
                    • Opcode Fuzzy Hash: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                    • Instruction Fuzzy Hash: 02F082363042087BDB109F55DD44BAB7B9CDF91750F14C03BFE48DA180D6B4D9988798

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 672 4020a5-4020b1 673 4020b7-4020cd call 402c39 * 2 672->673 674 40216c-40216e 672->674 684 4020dc-4020ea LoadLibraryExA 673->684 685 4020cf-4020da GetModuleHandleA 673->685 676 4022e5-4022ea call 401423 674->676 681 402ac5-402ad4 676->681 687 4020ec-4020f9 GetProcAddress 684->687 688 402165-402167 684->688 685->684 685->687 689 402138-40213d call 4054a9 687->689 690 4020fb-402101 687->690 688->676 694 402142-402145 689->694 692 402103-40210f call 401423 690->692 693 40211a-402136 690->693 692->694 703 402111-402118 692->703 693->694 694->681 697 40214b-402153 call 403b0e 694->697 697->681 702 402159-402160 FreeLibrary 697->702 702->681 703->694
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 004020D0
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                    • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004020E0
                    • GetProcAddress.KERNEL32(00000000,?), ref: 004020F0
                    • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040215A
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                    • String ID:
                    • API String ID: 2987980305-0
                    • Opcode ID: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                    • Instruction ID: efc1da79dccaef9ffb2761d2644f5cd4432d5c2edc08e83b6cf0327c91c21bf2
                    • Opcode Fuzzy Hash: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                    • Instruction Fuzzy Hash: 2B210832904214E7CF207FA58E4DAAE3A60AF44358F60413FF601B61E0DBBD49819A6E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 704 403a7c-403a8b 705 403a97-403a9f 704->705 706 403a8d-403a90 CloseHandle 704->706 707 403aa1-403aa4 CloseHandle 705->707 708 403aab-403ab7 call 403ad9 call 405b4a 705->708 706->705 707->708 712 403abc-403abd 708->712
                    APIs
                    • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403A8E
                    • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403AA2
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A81
                    • C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\, xrefs: 00403AB2
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\
                    • API String ID: 2962429428-2456826853
                    • Opcode ID: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                    • Instruction ID: f2bf129958ed6937e4157d035670f95a6da1e01cb45a681b65e96f9405f647bf
                    • Opcode Fuzzy Hash: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                    • Instruction Fuzzy Hash: F4E08631640B1896C130EF7CAD4D8853B189B413357204726F1B9F20F0C738A9574EE9
                    APIs
                    • SetFilePointer.KERNEL32(00000009,00000000,00000000,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 00403222
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403277, 0040328E, 004032A4
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 973152223-292220189
                    • Opcode ID: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                    • Instruction ID: 301e065564a74905a78554ad982773151ad037ba2d6e6f8d8cd401a7b941de18
                    • Opcode Fuzzy Hash: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                    • Instruction Fuzzy Hash: E2318D30200219FFDB109F95ED45A9A3FA8EB05755B20847EB914E61D0D738DB509FA9
                    APIs
                      • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405DC1
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                    • GetFileAttributesA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                      • Part of subcall function 0040596F: CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                    • SetCurrentDirectoryA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,000000F0), ref: 0040163C
                    Strings
                    • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00401631
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                    • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 1892508949-3327167313
                    • Opcode ID: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                    • Instruction ID: f3b3600b6319d637c5497ea1020ed17c5aedac6227b62b2eaa768bc98e31f113
                    • Opcode Fuzzy Hash: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                    • Instruction Fuzzy Hash: 09115731508140EBCF306FA54D405BF23B09E96324B28453FF8D1B22E2DA3D0C42AA3E
                    APIs
                      • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                      • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405DC1
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                    • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405E5B
                    • GetFileAttributesA.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0), ref: 00405E6B
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                    • String ID: C:\
                    • API String ID: 3248276644-3404278061
                    • Opcode ID: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                    • Instruction ID: eca821d8ca18e415d707ee210574ba5bb9731226a542ad11e9256983d04766a4
                    • Opcode Fuzzy Hash: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                    • Instruction Fuzzy Hash: F7F02831105D5116C6223336AD09AAF1644CE9732471A453FFCE1B52D2DB3C8A539CEE
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                    • Instruction ID: 14484b0326c8a5630d33184448731c7578348ec986130544f859662fecd3ad08
                    • Opcode Fuzzy Hash: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                    • Instruction Fuzzy Hash: 04A12471E04229CBDF28CFA8C844BADBBB1FF44305F14816AD956BB281C7786986DF45
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                    • Instruction ID: 16a3963220edad981734dfbd86db7ae4535d0e52bcc7a87e0ef86c627c8cfaa4
                    • Opcode Fuzzy Hash: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                    • Instruction Fuzzy Hash: 2D912370D04268CBDF28CF98C854BADBBB1FF44305F14816AD956BB281C7786986DF45
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                    • Instruction ID: e981be8a744509f315cfd76b32476d9c10b76e0a4aa84739a8d113cb33934a41
                    • Opcode Fuzzy Hash: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                    • Instruction Fuzzy Hash: 37812471E04228CBDF24CFA8C844BADBBB1FF45305F24816AD856BB291C7789986DF45
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                    • Instruction ID: 516ab04208dd2bc2fd7cdea6c41d3130492ff38fa800e35acf718bd73fbf6333
                    • Opcode Fuzzy Hash: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                    • Instruction Fuzzy Hash: A4712271E04228CBDF24CF98C844BADBBB1FF48305F14806AD856BB281C778A986DF45
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                    • Instruction ID: 835baf8de871759411e2c74e4a47f0112f02d54065241c3c7dcda5dc236b3f46
                    • Opcode Fuzzy Hash: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                    • Instruction Fuzzy Hash: 92712571E04228CBEF28CF98C844BADBBB1FF44305F15816AD856BB281C7786996DF45
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                    • Instruction ID: ccec74d0ee3a806077926e8984c2e201e8b1f3d886c73ab216be699138b2bca7
                    • Opcode Fuzzy Hash: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                    • Instruction Fuzzy Hash: 39715771E04228CBEF28CF98C844BADBBB1FF44305F14806AD956BB281C778A946DF45
                    APIs
                    • lstrlenA.KERNEL32(0040AC20,00000023,00000011,00000002), ref: 004024C9
                    • RegSetValueExA.KERNEL32(?,?,?,?,0040AC20,00000000,00000011,00000002), ref: 00402509
                    • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseValuelstrlen
                    • String ID:
                    • API String ID: 2655323295-0
                    • Opcode ID: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                    • Instruction ID: e1e6ae2a7b536448810537a1ffa9a52b32d6c636ce9630cd27147c6707bb0a71
                    • Opcode Fuzzy Hash: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                    • Instruction Fuzzy Hash: 04116371E04208AFEB10AFA5DE49AAEBA74EB84714F21443BF504F71C1DAB94D409B68
                    APIs
                    • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025C2
                    • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025D5
                    • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Enum$CloseValue
                    • String ID:
                    • API String ID: 397863658-0
                    • Opcode ID: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                    • Instruction ID: 33ff3e85e785963e302667c06a3cb1355a7acd8bf142a31c2560ef5bcfc7d759
                    • Opcode Fuzzy Hash: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                    • Instruction Fuzzy Hash: 2C017571904104FFE7158F54DE88ABF7BACEF81358F20443EF101A61C0DAB44E449679
                    APIs
                      • Part of subcall function 00405EF6: GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                      • Part of subcall function 00405EF6: SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                    • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B1D
                    • DeleteFileA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B25
                    • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B3D
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: File$Attributes$DeleteDirectoryRemove
                    • String ID:
                    • API String ID: 1655745494-0
                    • Opcode ID: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                    • Instruction ID: eeb49a2f717892c2e0964ab94aaac89db2a73fdd151ed94c70539e0cf44bba43
                    • Opcode Fuzzy Hash: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                    • Instruction Fuzzy Hash: 6CE0E531109A9097C62067349908A5B7AF8EF86314F094D3AF9A1F20D0DB38B9468EBD
                    APIs
                    • WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 0040682F
                    • GetExitCodeProcess.KERNEL32(?,?), ref: 0040683C
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: ObjectSingleWait$CodeExitProcess
                    • String ID:
                    • API String ID: 2567322000-0
                    • Opcode ID: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                    • Instruction ID: abee92fc01d0549169be82d64ea8a54f8020188e09ec540bf7ef67874f21f581
                    • Opcode Fuzzy Hash: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                    • Instruction Fuzzy Hash: 9DE0D832600118FBDB00AB54DD05E9E7F6EEB44704F114033F601B6190C7B59E21DB98
                    APIs
                    • ReadFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,0040B8F8,00403481,00000009,00000009,00403385,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F), ref: 00405FA7
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00405F96
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 2738559852-292220189
                    • Opcode ID: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                    • Instruction ID: 61a6516da629700e98a59d605e8380186fb5f41ecf47873683bd74a9a2ef61d4
                    • Opcode Fuzzy Hash: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                    • Instruction Fuzzy Hash: 8BE08C3220161EEBEF119E508C00AEBBB6CEB00360F004433FD25E3140E234E9218BA8
                    APIs
                    • RegQueryValueExA.KERNEL32(00000000,00000000,?,?,?,?), ref: 0040254E
                    • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID:
                    • API String ID: 3356406503-0
                    • Opcode ID: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                    • Instruction ID: 7c766f3f1fb2abd04e903467a79d83897fdaad9d0bba0580308fe752c8381985
                    • Opcode Fuzzy Hash: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                    • Instruction Fuzzy Hash: 1B11BF71905205EFDB25CF64DA985AE7BB4AF11355F20483FE042B72C0D6B88A85DA1D
                    APIs
                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                    • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                    • Instruction ID: c6e23866af321c238b4b59365f681da1ab702c54c00e726fca3ee5b0521d1f72
                    • Opcode Fuzzy Hash: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                    • Instruction Fuzzy Hash: 5201D131B242109BE7194B38AE04B2A36A8E754315F51813AF851F61F1DB78CC129B4D
                    APIs
                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422558,00000009,00000009,0000000B), ref: 00405A4A
                    • CloseHandle.KERNEL32(?), ref: 00405A57
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseCreateHandleProcess
                    • String ID:
                    • API String ID: 3712363035-0
                    • Opcode ID: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                    • Instruction ID: 70dcd79ab4e1e9e84cc9ba673cd08f466e07e48f17d85ed3475224309c024e1a
                    • Opcode Fuzzy Hash: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                    • Instruction Fuzzy Hash: A5E04FB4600209BFEB009B64ED09F7B77ACFB04244F808421BE40F2150D67899658A78
                    APIs
                    • GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                    • GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                      • Part of subcall function 00406726: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040673D
                      • Part of subcall function 00406726: wsprintfA.USER32 ref: 00406776
                      • Part of subcall function 00406726: LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                    • String ID:
                    • API String ID: 2547128583-0
                    • Opcode ID: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                    • Instruction ID: 2a593beb9babc16b4b5ae8275dbdfb46ef4ebf17ea7291b62b5d373670c31446
                    • Opcode Fuzzy Hash: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                    • Instruction Fuzzy Hash: B6E0863260421157D21067705E4897773ACAF94B54302043EF546F3144D7389C76966D
                    APIs
                    • GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00405F1F
                    • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: File$AttributesCreate
                    • String ID:
                    • API String ID: 415043291-0
                    • Opcode ID: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                    • Instruction ID: c1cd633b288b309c16b37b55694bd397a2d2f3fd27c3ea135bedd35eac3c4d3c
                    • Opcode Fuzzy Hash: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                    • Instruction Fuzzy Hash: D9D09E31254602AFEF0D8F20DE16F2E7AA2EB84B00F11952CB682944E2DA715819AB19
                    APIs
                    • GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                    • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                    • Instruction ID: 2a9487917742c73a52daa6fa2dda6e447083e2efb983b62a69771bacbdb33add
                    • Opcode Fuzzy Hash: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                    • Instruction Fuzzy Hash: E3D0C972504422ABD2102728AE0889BBB55DB94271702CA35FDA5A26F1DB304C569A9C
                    APIs
                    • CreateDirectoryA.KERNEL32(?,00000000,004034BF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004059F2
                    • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405A00
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CreateDirectoryErrorLast
                    • String ID:
                    • API String ID: 1375471231-0
                    • Opcode ID: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                    • Instruction ID: 42ce2bd36b25b14d2ed8d631edf33fc643f4c4eb5ed9af5e51ab4a49ffb09bba
                    • Opcode Fuzzy Hash: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                    • Instruction Fuzzy Hash: 9BC04C303145419AD6505B309F4DB177A54AB50741F51553A638AE01A0DA348465DD2D
                    APIs
                    • lstrcpynA.KERNEL32(?,10003024,?,10003020,1000138F,10003020,00000400), ref: 10001454
                    • GlobalFree.KERNELBASE(10003020), ref: 10001464
                    Memory Dump Source
                    • Source File: 00000008.00000002.3693735867.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000008.00000002.3693640237.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693773706.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693816432.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_10000000_218A.jbxd
                    Similarity
                    • API ID: FreeGloballstrcpyn
                    • String ID:
                    • API String ID: 1459762280-0
                    • Opcode ID: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                    • Instruction ID: 61cff6a9ed434c6726c3e265b98623322506fe6e864b2b4fb358a1092e6d6a6c
                    • Opcode Fuzzy Hash: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                    • Instruction Fuzzy Hash: 8DF0F8312152209FE315DF24CC94B9777E9FB0A385F018429E691C7278D770E804CB22
                    APIs
                    • RegCreateKeyExA.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CEA,00000000,?,?), ref: 00406265
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                    • Instruction ID: 57b18be241489d6c3509c0f1b2cb500900bdd64e2c84313365475615acd8ae2e
                    • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                    • Instruction Fuzzy Hash: 16E0E672010109BEDF196F50DD0AD7B371DEB04341F01492EF916D4091E6B5A9309734
                    APIs
                    • WriteFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,004114F7,0040B8F8,00403405,0040B8F8,004114F7,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004), ref: 00405FD6
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FileWrite
                    • String ID:
                    • API String ID: 3934441357-0
                    • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction ID: d5187e51ab0d96a1766449b5dbb93cac2cdd9e80b7d20ab2fc0b5d8c8d5322e8
                    • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction Fuzzy Hash: 4AE0EC3221065BABDF109E659C04EEB7B6CEB05360F004437FA55E3150D675E8219BA4
                    APIs
                    • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?,00420530,?,?,0040629C,00420530,?,?,?,00000002,C:\Windows\wininit.ini), ref: 00406232
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                    • Instruction ID: e678259d492eddc69303d735af6c58fa5eb03465f078c5ba6a1a088e01eebb4c
                    • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                    • Instruction Fuzzy Hash: 64D0123244020DBBDF116F90ED01FAB3B1DEB18350F014826FE06A80A1D775D530A725
                    APIs
                    • MoveFileExA.KERNEL32(?,?,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040616B
                      • Part of subcall function 00405FF1: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                      • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32(?,NUL,00000400), ref: 0040602B
                      • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32(?,C:\Windows\wininit.ini,00000400), ref: 00406048
                      • Part of subcall function 00405FF1: wsprintfA.USER32 ref: 00406066
                      • Part of subcall function 00405FF1: GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                      • Part of subcall function 00405FF1: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                      • Part of subcall function 00405FF1: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                      • Part of subcall function 00405FF1: SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsn1FE5.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                      • Part of subcall function 00405FF1: GlobalFree.KERNEL32(00000000), ref: 0040614F
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: File$GlobalNamePathShort$AllocCloseFreeHandleMovePointerSizelstrcpywsprintf
                    • String ID:
                    • API String ID: 299535525-0
                    • Opcode ID: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                    • Instruction ID: 0556bd0dd0e376f9d1944fcc72f0db357db156cd0d89a75f2f72d3c973fa690a
                    • Opcode Fuzzy Hash: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                    • Instruction Fuzzy Hash: F0D0C731108602FFDB111B10ED0591B7BA5FF90355F11943EF599940B1DB368461DF09
                    APIs
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                    • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                    • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                    • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                    APIs
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                      • Part of subcall function 00405A21: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422558,00000009,00000009,0000000B), ref: 00405A4A
                      • Part of subcall function 00405A21: CloseHandle.KERNEL32(?), ref: 00405A57
                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                      • Part of subcall function 00406809: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                      • Part of subcall function 00406809: GetExitCodeProcess.KERNEL32(?,?), ref: 0040683C
                      • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                    • String ID:
                    • API String ID: 2972824698-0
                    • Opcode ID: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                    • Instruction ID: dce1314ccbc215d7d9c334b017be086f7c4cc40ba0f87dfe0d8145fd67a5eb82
                    • Opcode Fuzzy Hash: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                    • Instruction Fuzzy Hash: 2DF0B432A05121DBDB20BFA59EC49EEB2A4DF41318B25463FF502B21D1CB7C4D418A6E
                    APIs
                    • GetDlgItem.USER32(?,00000403), ref: 00405646
                    • GetDlgItem.USER32(?,000003EE), ref: 00405655
                    • GetClientRect.USER32(?,?), ref: 00405692
                    • GetSystemMetrics.USER32(00000002), ref: 00405699
                    • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004056BA
                    • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004056CB
                    • SendMessageA.USER32(?,00001001,00000000,?), ref: 004056DE
                    • SendMessageA.USER32(?,00001026,00000000,?), ref: 004056EC
                    • SendMessageA.USER32(?,00001024,00000000,?), ref: 004056FF
                    • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405721
                    • ShowWindow.USER32(?,00000008), ref: 00405735
                    • GetDlgItem.USER32(?,000003EC), ref: 00405756
                    • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405766
                    • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040577F
                    • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040578B
                    • GetDlgItem.USER32(?,000003F8), ref: 00405664
                      • Part of subcall function 0040443A: SendMessageA.USER32(00000028,?,00000001,0040426A), ref: 00404448
                    • GetDlgItem.USER32(?,000003EC), ref: 004057A7
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000557B,00000000), ref: 004057B5
                    • CloseHandle.KERNEL32(00000000), ref: 004057BC
                    • ShowWindow.USER32(00000000), ref: 004057DF
                    • ShowWindow.USER32(?,00000008), ref: 004057E6
                    • ShowWindow.USER32(00000008), ref: 0040582C
                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405860
                    • CreatePopupMenu.USER32 ref: 00405871
                    • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405886
                    • GetWindowRect.USER32(?,000000FF), ref: 004058A6
                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004058BF
                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004058FB
                    • OpenClipboard.USER32(00000000), ref: 0040590B
                    • EmptyClipboard.USER32 ref: 00405911
                    • GlobalAlloc.KERNEL32(00000042,?), ref: 0040591A
                    • GlobalLock.KERNEL32(00000000), ref: 00405924
                    • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405938
                    • GlobalUnlock.KERNEL32(00000000), ref: 00405951
                    • SetClipboardData.USER32(00000001,00000000), ref: 0040595C
                    • CloseClipboard.USER32 ref: 00405962
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                    • String ID: PB
                    • API String ID: 590372296-3196168531
                    • Opcode ID: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                    • Instruction ID: 44a2cb424ceca129f1c721a27905a8e57bc1109532c064cce4e419f7e60c3497
                    • Opcode Fuzzy Hash: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                    • Instruction Fuzzy Hash: 18A13971900608FFDB11AF64DE85AAE7BB9FB48355F00403AFA41BA1A0CB754E51DF58
                    APIs
                    • GetDlgItem.USER32(?,000003FB), ref: 004048E6
                    • SetWindowTextA.USER32(00000000,?), ref: 00404910
                    • SHBrowseForFolderA.SHELL32(?,00420128,?), ref: 004049C1
                    • CoTaskMemFree.OLE32(00000000), ref: 004049CC
                    • lstrcmpiA.KERNEL32(C:\Windows\wininit.ini,00420D50), ref: 004049FE
                    • lstrcatA.KERNEL32(?,C:\Windows\wininit.ini), ref: 00404A0A
                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404A1C
                      • Part of subcall function 00405A82: GetDlgItemTextA.USER32(?,?,00000400,00404A53), ref: 00405A95
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,*?|<>/":,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                      • Part of subcall function 00406666: CharPrevA.USER32(0000000B,0000000B,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                    • GetDiskFreeSpaceA.KERNEL32(0041FD20,?,?,0000040F,?,0041FD20,0041FD20,?,00000001,0041FD20,?,?,000003FB,?), ref: 00404ADA
                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AF5
                      • Part of subcall function 00404C4E: lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                      • Part of subcall function 00404C4E: wsprintfA.USER32 ref: 00404CF4
                      • Part of subcall function 00404C4E: SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                    • String ID: A$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$PB
                    • API String ID: 2624150263-3088350716
                    • Opcode ID: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                    • Instruction ID: 03633cdec68ae3b48ba4c7d33c4768738bfb21d85bfcf2e4b9185cba9ee35c0f
                    • Opcode Fuzzy Hash: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                    • Instruction Fuzzy Hash: 7DA150B1A00208AADB11EFA5DD45BAFB6B8EF84315F10803BF601B62D1D77C99418F6D
                    APIs
                    • CoCreateInstance.OLE32(00408418,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F8
                    • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022AA
                    Strings
                    • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00402238
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: ByteCharCreateInstanceMultiWide
                    • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 123533781-3327167313
                    • Opcode ID: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                    • Instruction ID: 4a55140eb955682c0845ac661669d1effe53c60cfc8a987c49de3bb9103baba8
                    • Opcode Fuzzy Hash: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                    • Instruction Fuzzy Hash: B2513575A00208AFDF10DFE4CA88A9D7BB5EF48314F2045BAF505EB2D1DA799981CB54
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027B9
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID:
                    • API String ID: 1974802433-0
                    • Opcode ID: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                    • Instruction ID: 9767438fe71d1176ff9aac627a01f72906af616df08219c0cc944b63bddc0547
                    • Opcode Fuzzy Hash: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                    • Instruction Fuzzy Hash: CCF0A0726082049AD710EBA49A49AEEB7689F51324F60057BF142F20C1D6B889459B2A
                    APIs
                    • GetDlgItem.USER32(?,000003F9), ref: 00404E21
                    • GetDlgItem.USER32(?,00000408), ref: 00404E2E
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E7D
                    • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E94
                    • SetWindowLongA.USER32(?,000000FC,0040541D), ref: 00404EAE
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404EC0
                    • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404ED4
                    • SendMessageA.USER32(?,00001109,00000002), ref: 00404EEA
                    • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404EF6
                    • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404F06
                    • DeleteObject.GDI32(00000110), ref: 00404F0B
                    • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404F36
                    • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404F42
                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404FDC
                    • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 0040500C
                      • Part of subcall function 0040443A: SendMessageA.USER32(00000028,?,00000001,0040426A), ref: 00404448
                    • SendMessageA.USER32(?,00001100,00000000,?), ref: 00405020
                    • GetWindowLongA.USER32(?,000000F0), ref: 0040504E
                    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040505C
                    • ShowWindow.USER32(?,00000005), ref: 0040506C
                    • SendMessageA.USER32(?,00000419,00000000,?), ref: 00405167
                    • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004051CC
                    • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 004051E1
                    • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00405205
                    • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00405225
                    • ImageList_Destroy.COMCTL32(?), ref: 0040523A
                    • GlobalFree.KERNEL32(?), ref: 0040524A
                    • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004052C3
                    • SendMessageA.USER32(?,00001102,?,?), ref: 0040536C
                    • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040537B
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004053A6
                    • ShowWindow.USER32(?,00000000), ref: 004053F4
                    • GetDlgItem.USER32(?,000003FE), ref: 004053FF
                    • ShowWindow.USER32(00000000), ref: 00405406
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                    • String ID: $M$N
                    • API String ID: 2564846305-813528018
                    • Opcode ID: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                    • Instruction ID: c306c4130ea67d8582adb4b0d0e706bf782d7aff15223233fd0d43401108afdf
                    • Opcode Fuzzy Hash: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                    • Instruction Fuzzy Hash: 6C025CB0A00609AFDB209F94DD45AAE7BB5FB84354F10817AF610BA2E1D7789D42CF58
                    APIs
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403F47
                    • ShowWindow.USER32(?), ref: 00403F67
                    • GetWindowLongA.USER32(?,000000F0), ref: 00403F79
                    • ShowWindow.USER32(?,00000004), ref: 00403F92
                    • DestroyWindow.USER32 ref: 00403FA6
                    • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403FBF
                    • GetDlgItem.USER32(?,?), ref: 00403FDE
                    • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403FF2
                    • IsWindowEnabled.USER32(00000000), ref: 00403FF9
                    • GetDlgItem.USER32(?,00000001), ref: 004040A4
                    • GetDlgItem.USER32(?,00000002), ref: 004040AE
                    • SetClassLongA.USER32(?,000000F2,?), ref: 004040C8
                    • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404119
                    • GetDlgItem.USER32(?,00000003), ref: 004041BF
                    • ShowWindow.USER32(00000000,?), ref: 004041E0
                    • EnableWindow.USER32(?,?), ref: 004041F2
                    • EnableWindow.USER32(?,?), ref: 0040420D
                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404223
                    • EnableMenuItem.USER32(00000000), ref: 0040422A
                    • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00404242
                    • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00404255
                    • lstrlenA.KERNEL32(00420D50,?,00420D50,00000000), ref: 0040427F
                    • SetWindowTextA.USER32(?,00420D50), ref: 0040428E
                    • ShowWindow.USER32(?,0000000A), ref: 004043C2
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                    • String ID: PB
                    • API String ID: 1860320154-3196168531
                    • Opcode ID: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                    • Instruction ID: 6b3c419a8b2de2434844e8cd53afab52d63163afb5b1bd925d395a768d9dd0e6
                    • Opcode Fuzzy Hash: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                    • Instruction Fuzzy Hash: ECC1D2B1A00204BBCB206F61EE45E2B3A78EB85745F41053EF781B61F1CB3998929B5D
                    APIs
                    • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004045FB
                    • GetDlgItem.USER32(00000000,000003E8), ref: 0040460F
                    • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040462D
                    • GetSysColor.USER32(?), ref: 0040463E
                    • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040464D
                    • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040465C
                    • lstrlenA.KERNEL32(?), ref: 0040465F
                    • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040466E
                    • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404683
                    • GetDlgItem.USER32(?,0000040A), ref: 004046E5
                    • SendMessageA.USER32(00000000), ref: 004046E8
                    • GetDlgItem.USER32(?,000003E8), ref: 00404713
                    • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404753
                    • LoadCursorA.USER32(00000000,00007F02), ref: 00404762
                    • SetCursor.USER32(00000000), ref: 0040476B
                    • LoadCursorA.USER32(00000000,00007F00), ref: 00404781
                    • SetCursor.USER32(00000000), ref: 00404784
                    • SendMessageA.USER32(00000111,00000001,00000000), ref: 004047B0
                    • SendMessageA.USER32(00000010,00000000,00000000), ref: 004047C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                    • String ID: N$6B
                    • API String ID: 3103080414-649610290
                    • Opcode ID: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                    • Instruction ID: 424ea1d81b5f8fd67bb79b8421ee67f108f717641e3cc5fc4ea293435da972af
                    • Opcode Fuzzy Hash: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                    • Instruction Fuzzy Hash: CE6190B1A40208BFDB109F61DD45B6A7B69FB84715F10843AFB01BB2D1C7B8A951CF98
                    APIs
                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                    • BeginPaint.USER32(?,?), ref: 00401047
                    • GetClientRect.USER32(?,?), ref: 0040105B
                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                    • DeleteObject.GDI32(?), ref: 004010ED
                    • CreateFontIndirectA.GDI32(?), ref: 00401105
                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                    • SelectObject.GDI32(00000000,?), ref: 00401140
                    • DrawTextA.USER32(00000000,00423F40,000000FF,00000010,00000820), ref: 00401156
                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                    • DeleteObject.GDI32(?), ref: 00401165
                    • EndPaint.USER32(?,?), ref: 0040116E
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                    • String ID: F
                    • API String ID: 941294808-1304234792
                    • Opcode ID: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                    • Instruction ID: bc851ab26da2bb863bf3a2ee07eb2f950de800ada4cbee7b2d64f78586a04119
                    • Opcode Fuzzy Hash: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                    • Instruction Fuzzy Hash: 2C419D71800249AFCF058FA5DE459AF7FB9FF45314F00802AF991AA1A0C734DA55DFA4
                    APIs
                    • lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                    • lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                    • lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                    • SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                    • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                    • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                    • String ID: 4/@
                    • API String ID: 2531174081-3101945251
                    • Opcode ID: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                    • Instruction ID: 7ab3267fb946cf8e7efc5916356ec1270af3577e2396c2c3629ce5ef3fcb69de
                    • Opcode Fuzzy Hash: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                    • Instruction Fuzzy Hash: 0F217A71E00118BBCF119FA5DD8099EBFB9EF09354F04807AF944A6291C7788A90CFA8
                    APIs
                    • CharNextA.USER32(0000000B,*?|<>/":,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                    • CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                    • CharNextA.USER32(0000000B,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                    • CharPrevA.USER32(0000000B,0000000B,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\218A.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                    Strings
                    • C:\Users\user\AppData\Local\Temp\218A.exe, xrefs: 00406666
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406667
                    • *?|<>/":, xrefs: 004066AE
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Char$Next$Prev
                    • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\218A.exe
                    • API String ID: 589700163-1953214001
                    • Opcode ID: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                    • Instruction ID: 80d428334b402c3338f843ea799862c1973996ffb1638880579f4ae0c72fc655
                    • Opcode Fuzzy Hash: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                    • Instruction Fuzzy Hash: 7E1108518047902DEB3206340C04B7B7F894F977A0F2A087FD8C6722C2D67E5C62967D
                    APIs
                    • DestroyWindow.USER32(?,00000000), ref: 00402ED5
                    • GetTickCount.KERNEL32 ref: 00402EF3
                    • wsprintfA.USER32 ref: 00402F21
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                    • CreateDialogParamA.USER32(0000006F,00000000,00402E25,00000000), ref: 00402F45
                    • ShowWindow.USER32(00000000,00000005), ref: 00402F53
                      • Part of subcall function 00402EA1: MulDiv.KERNEL32(?,00000064,?), ref: 00402EB6
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                    • String ID: ... %d%%$#Vh%.@
                    • API String ID: 722711167-1706192003
                    • Opcode ID: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                    • Instruction ID: ac0ca11ee9366edb0cc6a28cc5aeb329eacd7d00ab00b3c3670f6d564c8935e4
                    • Opcode Fuzzy Hash: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                    • Instruction Fuzzy Hash: 3F01A170542225EBCB21BB50EF0CBAB3778EB40744B04443BF505B21D0C7F894469AEE
                    APIs
                    • GetWindowLongA.USER32(?,000000EB), ref: 00404489
                    • GetSysColor.USER32(00000000), ref: 004044C7
                    • SetTextColor.GDI32(?,00000000), ref: 004044D3
                    • SetBkMode.GDI32(?,?), ref: 004044DF
                    • GetSysColor.USER32(?), ref: 004044F2
                    • SetBkColor.GDI32(?,?), ref: 00404502
                    • DeleteObject.GDI32(?), ref: 0040451C
                    • CreateBrushIndirect.GDI32(?), ref: 00404526
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                    • String ID:
                    • API String ID: 2320649405-0
                    • Opcode ID: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                    • Instruction ID: 76b6fc4927f6120469f5ffa52701fcd3ddd76896e52d32ad6f55637f73cee333
                    • Opcode Fuzzy Hash: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                    • Instruction Fuzzy Hash: 9E2147B1501704AFCB31DF68ED08B5BBBF8AF41715B04892EEA96A26E0D734E904CB54
                    APIs
                    • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404D73
                    • GetMessagePos.USER32 ref: 00404D7B
                    • ScreenToClient.USER32(?,?), ref: 00404D95
                    • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404DA7
                    • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404DCD
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Message$Send$ClientScreen
                    • String ID: f
                    • API String ID: 41195575-1993550816
                    • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                    • Instruction ID: de178be9688f757f82ef56a4cbeb6693d0582b60b2ea90e1a00f6814b48fd044
                    • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                    • Instruction Fuzzy Hash: BB014871900219BADB01DBA4DD85BFEBBF8AF95B11F10016ABA40B61C0C6B499058BA4
                    APIs
                    • CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                    • GetLastError.KERNEL32 ref: 004059C6
                    • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004059DB
                    • GetLastError.KERNEL32 ref: 004059E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                    • String ID: !9@$C:\Users\user\AppData\Local\Temp\
                    • API String ID: 3449924974-2369717338
                    • Opcode ID: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                    • Instruction ID: 4cd508ff09270142ca7a6984d66ae253fefa4e1f6983b248f3af4f59f5a14231
                    • Opcode Fuzzy Hash: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                    • Instruction Fuzzy Hash: 610108B1D00259DAEF109BA0CA45BEFBBB8EB04354F00403AD645B6290D7789648CF99
                    APIs
                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E40
                    • wsprintfA.USER32 ref: 00402E74
                    • SetWindowTextA.USER32(?,?), ref: 00402E84
                    • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E96
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Text$ItemTimerWindowwsprintf
                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                    • API String ID: 1451636040-1158693248
                    • Opcode ID: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                    • Instruction ID: 7ad4584a5e884be7344c254f70e0401137e7e46ce86c3cf658bb2ab9d23be74a
                    • Opcode Fuzzy Hash: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                    • Instruction Fuzzy Hash: 1DF01D7054020DBAEF219F60DE0ABAE3769EB44344F00803AFA16B91D0DBB899558F99
                    APIs
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402849
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402865
                    • GlobalFree.KERNEL32(?), ref: 004028A4
                    • GlobalFree.KERNEL32(00000000), ref: 004028B7
                    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028D3
                    • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028E6
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                    • String ID:
                    • API String ID: 2667972263-0
                    • Opcode ID: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                    • Instruction ID: cd924008ac91bdcd896aacfcc8aadc4f9c7de1b4393fc14a433ce499bdbf1d56
                    • Opcode Fuzzy Hash: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                    • Instruction Fuzzy Hash: D931AC32800128ABDF216FA5DE49D9E7A75FF08364F24423AF450B62D0CB7949419F68
                    APIs
                    • OpenProcess.KERNEL32(00100401,00000000,?,0000025E,?,00000000,?), ref: 10001054
                    • EnumWindows.USER32(10001007,?), ref: 10001074
                    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 10001084
                    • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 1000109D
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 100010AE
                    • CloseHandle.KERNEL32(00000000), ref: 100010C5
                    Memory Dump Source
                    • Source File: 00000008.00000002.3693735867.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000008.00000002.3693640237.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693773706.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                    • Associated: 00000008.00000002.3693816432.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_10000000_218A.jbxd
                    Similarity
                    • API ID: Process$CloseCodeEnumExitHandleObjectOpenSingleTerminateWaitWindows
                    • String ID:
                    • API String ID: 3465249596-0
                    • Opcode ID: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                    • Instruction ID: 6b4dcd5717a232181223c093e4f4244ae1ce1555a3c8e15b92772d9ea2fb9ae7
                    • Opcode Fuzzy Hash: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                    • Instruction Fuzzy Hash: 5211E235A00299EFFB00DFA5CCC8AEE77BCEB456C5F014069FA4192149D7B49981CB62
                    APIs
                    • lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                    • wsprintfA.USER32 ref: 00404CF4
                    • SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: ItemTextlstrlenwsprintf
                    • String ID: %u.%u%s%s$PB
                    • API String ID: 3540041739-838025833
                    • Opcode ID: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                    • Instruction ID: 635705270cf82d3fa6c033b13715314544988666452c3f341a93ad76d23c3d90
                    • Opcode Fuzzy Hash: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                    • Instruction Fuzzy Hash: 5F11E77360512837EB00656D9D45EAE3298DB85374F26423BFE26F71D1E978CC1286E8
                    APIs
                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D8F
                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402DDB
                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DE4
                    • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402DFB
                    • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E06
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseEnum$DeleteValue
                    • String ID:
                    • API String ID: 1354259210-0
                    • Opcode ID: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                    • Instruction ID: 1f7d8097ab2fb743d310579a2b4365e3e31c1a4ec17ce584dda370d325fd3950
                    • Opcode Fuzzy Hash: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                    • Instruction Fuzzy Hash: 1D214B7150010CBBDF129F90CE89EEB7B7DEF44344F11007AF955B11A0D7B49EA49AA8
                    APIs
                    • GetDlgItem.USER32(?,?), ref: 00401D7E
                    • GetClientRect.USER32(?,?), ref: 00401DCC
                    • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                    • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                    • DeleteObject.GDI32(00000000), ref: 00401E20
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                    • String ID:
                    • API String ID: 1849352358-0
                    • Opcode ID: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                    • Instruction ID: cb7cd4706ec086029cb46641885d9617bace417a5341e65c45b3777010ef1041
                    • Opcode Fuzzy Hash: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                    • Instruction Fuzzy Hash: 35212A72E00109AFDF15DFA4DD85AAEBBB5EB88300F24417EF911F62A0DB389941DB14
                    APIs
                    • GetDC.USER32(?), ref: 00401E38
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                    • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                    • CreateFontIndirectA.GDI32(0040B820), ref: 00401EBA
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CapsCreateDeviceFontIndirectRelease
                    • String ID:
                    • API String ID: 3808545654-0
                    • Opcode ID: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                    • Instruction ID: bfe7ce59390996d5b2ac71ca67757b7c78ff13e1b53bdd881068f9c0e557254e
                    • Opcode Fuzzy Hash: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                    • Instruction Fuzzy Hash: 66018072504340AEE7007BB0AF8AA9A7FE8E755701F109439F241B61E2CB790449CB6C
                    APIs
                    • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                    • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: MessageSend$Timeout
                    • String ID: !
                    • API String ID: 1777923405-2657877971
                    • Opcode ID: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                    • Instruction ID: a12cfbdd51ff26f17676da16b1bc06906883597644a76ef85f46b7bf1251d8d3
                    • Opcode Fuzzy Hash: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                    • Instruction Fuzzy Hash: 2A218271948208BEEB059FF5DA8AAAD7FB4EF84304F20447EF101B61D1D7B989819B18
                    APIs
                    • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D20
                    • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D29
                    • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405D3A
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405D1A
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharPrevlstrcatlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 2659869361-3081826266
                    • Opcode ID: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                    • Instruction ID: 6a6775ee8fa4d5d8d60a890cb1840bbff54d6a4bc9e312217f61a2b57c53a4e0
                    • Opcode Fuzzy Hash: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                    • Instruction Fuzzy Hash: 82D0A7625015307AD20167154C09DDF29488F523017094027F501B7191C67C5C1187FD
                    APIs
                    • CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\218A.exe), ref: 00405DC1
                    • CharNextA.USER32(00000000), ref: 00405DC6
                    • CharNextA.USER32(00000000), ref: 00405DDA
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharNext
                    • String ID: C:\
                    • API String ID: 3213498283-3404278061
                    • Opcode ID: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                    • Instruction ID: a81d310af092f64b8c374c4571b8fed5a60269d48026fa3bbeeaae68e06855d2
                    • Opcode Fuzzy Hash: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                    • Instruction Fuzzy Hash: 71F09661904F542BFB3293648C4CB776B8DCF55351F28947BE6807A6C1C27C59808FEA
                    APIs
                    • IsWindowVisible.USER32(?), ref: 0040544C
                    • CallWindowProcA.USER32(?,?,?,?), ref: 0040549D
                      • Part of subcall function 00404451: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00404463
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: Window$CallMessageProcSendVisible
                    • String ID:
                    • API String ID: 3748168415-3916222277
                    • Opcode ID: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                    • Instruction ID: ce4d6245f7a5538c18ae28323cba1b5bdda0ccdff68052f186ad3da5f1ae13b7
                    • Opcode Fuzzy Hash: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                    • Instruction Fuzzy Hash: 2A015E31200608AFDF216F51DD80BAF3A66EB84716F104537FA05761D2C7799CD29F6A
                    APIs
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,C:\Windows\wininit.ini,00420530,?,?,?,00000002,C:\Windows\wininit.ini,?,00406527,80000002), ref: 004062B5
                    • RegCloseKey.ADVAPI32(?,?,00406527,80000002,Software\Microsoft\Windows\CurrentVersion,C:\Windows\wininit.ini,C:\Windows\wininit.ini,C:\Windows\wininit.ini,?,00420530), ref: 004062C0
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID: C:\Windows\wininit.ini
                    • API String ID: 3356406503-2725141966
                    • Opcode ID: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                    • Instruction ID: 5c8aa4f59809ec7c4ed175be077f356401e74c3ba082423fbe1b6bbc42bea5f4
                    • Opcode Fuzzy Hash: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                    • Instruction Fuzzy Hash: 8101BC72100209ABDF229F60CC09FDB3FA8EF45364F01407AFD56A6190D638C974CBA8
                    APIs
                    • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\218A.exe,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00405D67
                    • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\218A.exe,C:\Users\user\AppData\Local\Temp\218A.exe,80000000,00000003), ref: 00405D75
                    Strings
                    • C:\Users\user\AppData\Local\Temp, xrefs: 00405D61
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: CharPrevlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp
                    • API String ID: 2709904686-47812868
                    • Opcode ID: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                    • Instruction ID: 27c40c0738421aba4af956c8f0f705930dfe744a77a65273bf6dbb66402e0641
                    • Opcode Fuzzy Hash: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                    • Instruction Fuzzy Hash: CBD0A772409D706EE31353208C04B8F6A48CF13300F0D4063E481A6190C2785C424BFD
                    APIs
                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405EA8
                    • CharNextA.USER32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EB9
                    • lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                    Memory Dump Source
                    • Source File: 00000008.00000002.3689493299.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000008.00000002.3689454534.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689534071.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3689962249.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 00000008.00000002.3690157301.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_400000_218A.jbxd
                    Similarity
                    • API ID: lstrlen$CharNextlstrcmpi
                    • String ID:
                    • API String ID: 190613189-0
                    • Opcode ID: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                    • Instruction ID: 98ea32bb50e75ca8be10b873c57fc005eda9f523d07111d413316ed06cfa332a
                    • Opcode Fuzzy Hash: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                    • Instruction Fuzzy Hash: 5FF06235104918AFCB129BA5DD4099EBFA8EF55350B2540B9E880F7211D674DF019BA9

                    Execution Graph

                    Execution Coverage:1.3%
                    Dynamic/Decrypted Code Coverage:22.9%
                    Signature Coverage:3.5%
                    Total number of Nodes:1472
                    Total number of Limit Nodes:103
                    execution_graph 144953 423052 144954 423061 144953->144954 144955 42306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 144954->144955 144956 4230ce 144954->144956 144955->144956 144957 39521f5 InitializeCriticalSectionAndSpinCount 144955->144957 144958 3952214 144957->144958 144959 3952219 CreateMutexA 144957->144959 144960 3952235 GetLastError 144959->144960 144961 3952678 ExitProcess 144959->144961 144960->144961 144962 3952246 144960->144962 145035 3953bd2 144962->145035 144964 395264f DeleteCriticalSection 144964->144961 144965 3952251 144965->144964 145039 39547e6 144965->145039 144968 3952647 144970 3953536 2 API calls 144968->144970 144970->144964 144975 39522e0 145062 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 144975->145062 144977 39522ef 145063 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 144977->145063 144979 39525df 145128 3953d76 EnterCriticalSection 144979->145128 144981 39522fe 144981->144979 145064 39546d4 GetModuleHandleA 144981->145064 144982 39525f8 145141 3953536 144982->145141 144985 3952360 144985->144979 145067 3951f2d GetUserDefaultUILanguage 144985->145067 144987 3953536 2 API calls 144989 3952610 144987->144989 144991 3953536 2 API calls 144989->144991 144993 395261b 144991->144993 144992 39523b4 144992->144958 144996 39523dd ExitProcess 144992->144996 144999 39523e5 144992->144999 144995 3953536 2 API calls 144993->144995 144994 39546d4 2 API calls 144994->144992 144997 3952626 144995->144997 144997->144968 145144 395536d 144997->145144 145000 3952412 ExitProcess 144999->145000 145001 395241a 144999->145001 145002 3952447 ExitProcess 145001->145002 145003 395244f 145001->145003 145078 3954ba2 145003->145078 145011 3952532 145156 3955239 145011->145156 145012 395251f 145013 39535db 11 API calls 145012->145013 145013->145011 145015 3952543 145016 3955239 4 API calls 145015->145016 145017 3952551 145016->145017 145018 3955239 4 API calls 145017->145018 145019 3952561 145018->145019 145020 3955239 4 API calls 145019->145020 145021 3952570 145020->145021 145022 3955239 4 API calls 145021->145022 145023 3952580 145022->145023 145024 3955239 4 API calls 145023->145024 145025 395258f 145024->145025 145160 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145025->145160 145027 3952599 145028 39525a2 GetModuleFileNameW 145027->145028 145029 39525b2 145027->145029 145028->145029 145030 3955239 4 API calls 145029->145030 145031 39525cc 145030->145031 145032 3955239 4 API calls 145031->145032 145033 39525d7 145032->145033 145034 3953536 2 API calls 145033->145034 145034->144979 145036 3953bda 145035->145036 145161 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145036->145161 145038 3953be5 145038->144965 145040 39546d4 2 API calls 145039->145040 145041 3954812 145040->145041 145042 3952283 145041->145042 145043 3955239 4 API calls 145041->145043 145042->144968 145048 39535db 145042->145048 145044 3954828 145043->145044 145045 3955239 4 API calls 145044->145045 145046 3954833 145045->145046 145047 3955239 4 API calls 145046->145047 145047->145042 145162 3952c08 145048->145162 145051 395484b 145052 3954860 VirtualAlloc 145051->145052 145055 39522c4 145051->145055 145053 395487f 145052->145053 145052->145055 145054 39546d4 2 API calls 145053->145054 145056 39548a1 145054->145056 145055->144968 145061 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145055->145061 145056->145055 145057 39548d0 GetCurrentProcess IsWow64Process 145056->145057 145059 3955239 4 API calls 145057->145059 145060 39548fa 145059->145060 145060->145055 145061->144975 145062->144977 145063->144981 145065 39546f2 LoadLibraryA 145064->145065 145066 39546ff 145064->145066 145065->145066 145066->144985 145068 3951fa0 145067->145068 145069 39535db 11 API calls 145068->145069 145070 3951fd8 145069->145070 145071 39535db 11 API calls 145070->145071 145072 3951fe7 GetKeyboardLayoutList 145071->145072 145073 3952042 145072->145073 145075 3952001 145072->145075 145074 39535db 11 API calls 145073->145074 145076 395204e 145074->145076 145075->145073 145077 39535db 11 API calls 145075->145077 145076->144992 145076->144994 145077->145075 145079 3954bb8 145078->145079 145088 3952468 CreateThread CreateThread WaitForMultipleObjects 145078->145088 145080 39546d4 2 API calls 145079->145080 145081 3954be9 145080->145081 145082 39546d4 2 API calls 145081->145082 145081->145088 145083 3954bfe 145082->145083 145084 3954c06 KiUserCallbackDispatcher GetSystemMetrics 145083->145084 145083->145088 145085 3954c2b 145084->145085 145086 3954c51 GetDC 145085->145086 145087 3954c65 GetCurrentObject 145086->145087 145086->145088 145089 3954e17 ReleaseDC 145087->145089 145090 3954c78 GetObjectW 145087->145090 145105 39519df 145088->145105 145337 3951d3c 145088->145337 145353 395519f 145088->145353 145089->145088 145090->145089 145091 3954c8f 145090->145091 145092 39535db 11 API calls 145091->145092 145093 3954caf DeleteObject CreateCompatibleDC 145092->145093 145093->145089 145094 3954d24 CreateDIBSection 145093->145094 145095 3954d45 SelectObject 145094->145095 145096 3954e10 DeleteDC 145094->145096 145097 3954d55 BitBlt 145095->145097 145098 3954e09 DeleteObject 145095->145098 145096->145089 145097->145098 145099 3954d7a 145097->145099 145098->145096 145177 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145099->145177 145101 3954d85 145101->145098 145102 3953d76 10 API calls 145101->145102 145103 3954dfe 145102->145103 145104 3953536 2 API calls 145103->145104 145104->145098 145106 39519ed 145105->145106 145110 3951a26 145105->145110 145108 3951a09 145106->145108 145178 3951000 145106->145178 145109 3951000 57 API calls 145108->145109 145108->145110 145109->145110 145111 3952054 145110->145111 145332 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145111->145332 145113 3952103 GetCurrentHwProfileA 145114 3952117 145113->145114 145115 395212d GetSystemInfo 145113->145115 145116 39535db 11 API calls 145114->145116 145117 39535db 11 API calls 145115->145117 145119 395212a 145116->145119 145120 395214f 145117->145120 145118 3952079 145118->145113 145119->145115 145121 3953536 2 API calls 145120->145121 145122 3952159 GlobalMemoryStatusEx 145121->145122 145123 39535db 11 API calls 145122->145123 145126 3952188 145123->145126 145124 39521db EnumDisplayDevicesA 145125 39521ee ObtainUserAgentString 145124->145125 145124->145126 145125->145011 145125->145012 145126->145124 145127 39535db 11 API calls 145126->145127 145127->145126 145129 3953ea4 LeaveCriticalSection 145128->145129 145130 3953d98 145128->145130 145129->144982 145130->145129 145333 3953d1c 6 API calls 145130->145333 145132 3953dc1 145132->145129 145334 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145132->145334 145134 3953dec 145335 3956c7f EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145134->145335 145136 3953df6 145137 3953536 2 API calls 145136->145137 145138 3953e4f 145137->145138 145139 3953536 2 API calls 145138->145139 145140 3953e9f 145139->145140 145140->145129 145142 3952605 145141->145142 145143 395353a GetProcessHeap RtlFreeHeap 145141->145143 145142->144987 145143->145142 145145 39546d4 2 API calls 145144->145145 145146 39553f0 145145->145146 145147 395546d socket 145146->145147 145155 39553f8 145146->145155 145148 3955491 145147->145148 145147->145155 145149 39554b1 connect 145148->145149 145148->145155 145150 3955517 Sleep 145149->145150 145151 39554c8 send 145149->145151 145150->145148 145151->145150 145152 39554ea send 145151->145152 145152->145150 145153 3955506 145152->145153 145154 3953536 2 API calls 145153->145154 145154->145155 145155->144997 145158 3955288 145156->145158 145159 395525c 145156->145159 145158->145015 145159->145158 145336 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145159->145336 145160->145027 145161->145038 145163 3952c18 145162->145163 145171 3952c26 145162->145171 145174 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145163->145174 145165 3952c76 145167 39522a9 145165->145167 145176 39551f6 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145165->145176 145167->145051 145168 3953036 145169 3953536 2 API calls 145168->145169 145169->145167 145171->145165 145172 3952e29 WideCharToMultiByte 145171->145172 145173 3952eb1 WideCharToMultiByte 145171->145173 145175 3952991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145171->145175 145172->145171 145173->145171 145174->145171 145175->145171 145176->145168 145177->145101 145179 3951412 145178->145179 145180 395101e 145178->145180 145179->145108 145180->145179 145215 395407d GetFileAttributesW 145180->145215 145182 3951035 145182->145179 145216 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145182->145216 145184 3951049 145217 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145184->145217 145186 3951052 145192 39513d5 145186->145192 145218 3953600 145186->145218 145187 3953536 2 API calls 145189 395140b 145187->145189 145191 3953536 2 API calls 145189->145191 145191->145179 145192->145187 145193 39513bd FindNextFileW 145193->145192 145195 3951173 145193->145195 145195->145193 145196 3953600 7 API calls 145195->145196 145197 3953eb6 41 API calls 145195->145197 145202 3951662 EnterCriticalSection 145195->145202 145204 3953536 GetProcessHeap RtlFreeHeap 145195->145204 145208 3953d76 10 API calls 145195->145208 145211 3951389 145195->145211 145213 3951000 53 API calls 145195->145213 145221 395446c 145195->145221 145253 395369c 145195->145253 145257 3951a62 145195->145257 145265 3951c94 145195->145265 145272 3951ba5 145195->145272 145309 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145195->145309 145196->145195 145197->145195 145283 3954e27 145202->145283 145204->145195 145207 3953efc 43 API calls 145207->145211 145208->145195 145209 39540ba 15 API calls 145209->145211 145211->145195 145211->145207 145211->145209 145212 3953600 7 API calls 145211->145212 145275 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145211->145275 145276 3953eb6 145211->145276 145212->145211 145213->145195 145215->145182 145216->145184 145217->145186 145310 3953084 145218->145310 145319 395407d GetFileAttributesW 145221->145319 145223 395447e 145224 39546cd 145223->145224 145320 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145223->145320 145224->145195 145226 3954494 145227 39546c5 145226->145227 145229 3953600 7 API calls 145226->145229 145228 3953536 2 API calls 145227->145228 145228->145224 145230 39544b1 145229->145230 145231 39544cf EnterCriticalSection 145230->145231 145232 3954539 LeaveCriticalSection 145231->145232 145233 3954552 145232->145233 145234 395459b 145232->145234 145233->145234 145236 395456f 145233->145236 145234->145227 145235 39545be EnterCriticalSection 145234->145235 145238 39545f5 LeaveCriticalSection 145235->145238 145322 39542ec 21 API calls 145236->145322 145240 3954691 EnterCriticalSection 145238->145240 145241 395460d 145238->145241 145239 3954574 145239->145234 145242 3954578 145239->145242 145246 39546ba LeaveCriticalSection 145240->145246 145321 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145241->145321 145244 3953536 2 API calls 145242->145244 145245 3954580 145244->145245 145248 395446c 29 API calls 145245->145248 145246->145227 145247 3954617 145247->145240 145250 3954634 EnterCriticalSection 145247->145250 145249 3954594 145248->145249 145249->145224 145251 3954675 LeaveCriticalSection 145250->145251 145251->145240 145252 3954689 145251->145252 145252->145240 145254 39536b0 145253->145254 145255 39536b4 145254->145255 145323 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145254->145323 145255->145195 145258 3951a7a 145257->145258 145260 3951a7f 145257->145260 145324 3951a2d EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145258->145324 145263 3951a84 145260->145263 145325 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145260->145325 145263->145195 145264 3951ab3 145264->145263 145326 3951a4f GetProcessHeap RtlFreeHeap 145264->145326 145266 39546d4 2 API calls 145265->145266 145267 3951ccd 145266->145267 145268 3951cdd CryptUnprotectData 145267->145268 145270 3951cfa 145267->145270 145269 3951d05 145268->145269 145268->145270 145269->145270 145271 3951d0c CryptProtectData 145269->145271 145270->145195 145271->145270 145327 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145272->145327 145274 3951bcb 145274->145195 145275->145211 145277 395446c 37 API calls 145276->145277 145278 3953ecc 145277->145278 145280 3953d76 10 API calls 145278->145280 145282 3953eeb 145278->145282 145279 3953536 2 API calls 145281 3953ef4 145279->145281 145280->145282 145281->145211 145282->145279 145284 3954e49 145283->145284 145285 3954e8a 145283->145285 145287 3953600 7 API calls 145284->145287 145300 395167e LeaveCriticalSection 145285->145300 145328 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145285->145328 145289 3954e80 145287->145289 145288 3954eaa 145329 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145288->145329 145330 395407d GetFileAttributesW 145289->145330 145292 3954eb4 145293 3953600 7 API calls 145292->145293 145294 3954ec2 FindFirstFileW 145293->145294 145295 3955183 145294->145295 145308 3954edf 145294->145308 145296 3953536 2 API calls 145295->145296 145298 395518a 145296->145298 145297 3953600 7 API calls 145297->145308 145299 3953536 2 API calls 145298->145299 145299->145300 145300->145195 145301 395516b FindNextFileW 145301->145295 145301->145308 145302 3953eb6 41 API calls 145302->145308 145303 3954f84 EnterCriticalSection 145305 3954e27 41 API calls 145303->145305 145306 3954f9f LeaveCriticalSection 145305->145306 145306->145301 145307 3954e27 41 API calls 145307->145308 145308->145297 145308->145301 145308->145302 145308->145303 145308->145307 145331 395407d GetFileAttributesW 145308->145331 145309->145195 145316 3953090 145310->145316 145311 3951156 FindFirstFileW 145311->145192 145311->145195 145313 395329d IsDBCSLeadByte 145314 39532aa MultiByteToWideChar 145313->145314 145313->145316 145314->145316 145315 3953308 IsDBCSLeadByte 145315->145316 145316->145311 145316->145313 145316->145315 145317 3953329 MultiByteToWideChar 145316->145317 145318 3952991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145316->145318 145317->145316 145318->145316 145319->145223 145320->145226 145321->145247 145322->145239 145323->145255 145324->145260 145325->145264 145326->145263 145327->145274 145328->145288 145329->145292 145330->145285 145331->145308 145332->145118 145333->145132 145334->145134 145335->145136 145336->145159 145338 3951f25 145337->145338 145339 3951d54 145337->145339 145339->145338 145340 3953600 7 API calls 145339->145340 145341 3951d75 FindFirstFileW 145340->145341 145341->145338 145342 3951d94 145341->145342 145361 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145342->145361 145344 3951f01 FindNextFileW 145346 3951f1c 145344->145346 145351 3951d9e 145344->145351 145345 3953600 7 API calls 145345->145351 145347 3953536 2 API calls 145346->145347 145347->145338 145349 3953536 2 API calls 145349->145351 145350 3951d3c 41 API calls 145350->145351 145351->145344 145351->145345 145351->145349 145351->145350 145352 3953eb6 41 API calls 145351->145352 145362 395408d 145351->145362 145352->145351 145354 39551ad 145353->145354 145355 39551ee 145353->145355 145368 3953508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145354->145368 145357 39551b7 145358 3954e27 45 API calls 145357->145358 145359 39551e7 145357->145359 145358->145357 145360 3953536 2 API calls 145359->145360 145360->145355 145361->145351 145363 3954095 145362->145363 145364 39540a7 145363->145364 145367 3953657 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145363->145367 145364->145351 145366 39540b7 145366->145351 145367->145366 145368->145357 145369 46fca5 145371 46fcb9 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 145369->145371 145370 46fcbf 145371->145370 145372 46fd40 145371->145372 145400 47762e 39 API calls 4 library calls 145371->145400 145391 4705aa 145372->145391 145377 46fd4e 145378 46fd5b 145377->145378 145401 4705e0 GetModuleHandleW 145378->145401 145380 46fd62 145381 46fd66 145380->145381 145382 46fdd0 145380->145382 145383 46fd6f 145381->145383 145402 47816c 21 API calls std::locale::_Setgloballocale 145381->145402 145404 4781b7 21 API calls std::locale::_Setgloballocale 145382->145404 145403 46ffd0 75 API calls ___scrt_uninitialize_crt 145383->145403 145387 46fdd6 145405 47817b 21 API calls std::locale::_Setgloballocale 145387->145405 145388 46fd77 145388->145370 145390 46fdde 145406 470e90 145391->145406 145393 4705bd GetStartupInfoW 145394 46fd46 145393->145394 145395 477e0a 145394->145395 145407 482f03 145395->145407 145397 477e4d 145397->145377 145399 477e13 145399->145397 145413 4831b6 39 API calls 145399->145413 145400->145372 145401->145380 145402->145383 145403->145388 145404->145387 145405->145390 145406->145393 145408 482f3e 145407->145408 145409 482f0c 145407->145409 145408->145399 145414 47a9ab 145409->145414 145413->145399 145415 47a9b6 145414->145415 145416 47a9bc 145414->145416 145465 47e015 6 API calls __Wcrtomb 145415->145465 145420 47a9c2 145416->145420 145466 47e054 6 API calls __Wcrtomb 145416->145466 145419 47a9d6 145419->145420 145421 47a9da 145419->145421 145426 47a9c7 145420->145426 145478 477134 39 API calls std::locale::_Setgloballocale 145420->145478 145467 47db5d 14 API calls 2 library calls 145421->145467 145424 47a9e6 145427 47aa03 145424->145427 145428 47a9ee 145424->145428 145442 482d0e 145426->145442 145475 47e054 6 API calls __Wcrtomb 145427->145475 145468 47e054 6 API calls __Wcrtomb 145428->145468 145431 47a9fa 145469 47abdb 145431->145469 145432 47aa0f 145433 47aa13 145432->145433 145434 47aa22 145432->145434 145476 47e054 6 API calls __Wcrtomb 145433->145476 145477 47a71e 14 API calls __Wcrtomb 145434->145477 145438 47aa2d 145440 47abdb ___free_lconv_mon 14 API calls 145438->145440 145441 47aa34 145440->145441 145441->145426 145480 482e63 145442->145480 145449 482d78 145505 482f61 145449->145505 145450 482d6a 145451 47abdb ___free_lconv_mon 14 API calls 145450->145451 145454 482d51 145451->145454 145454->145408 145455 482db0 145516 4753de 14 API calls __Wcrtomb 145455->145516 145457 482db5 145460 47abdb ___free_lconv_mon 14 API calls 145457->145460 145458 482df7 145459 482e40 145458->145459 145517 482987 39 API calls 2 library calls 145458->145517 145464 47abdb ___free_lconv_mon 14 API calls 145459->145464 145460->145454 145461 482dcb 145461->145458 145462 47abdb ___free_lconv_mon 14 API calls 145461->145462 145462->145458 145464->145454 145465->145416 145466->145419 145467->145424 145468->145431 145470 47abe6 RtlFreeHeap 145469->145470 145471 47aa00 145469->145471 145470->145471 145472 47abfb GetLastError 145470->145472 145471->145420 145473 47ac08 __dosmaperr 145472->145473 145479 4753de 14 API calls __Wcrtomb 145473->145479 145475->145432 145476->145431 145477->145438 145479->145471 145481 482e6f __FrameHandler3::FrameUnwindToState 145480->145481 145482 482e89 145481->145482 145518 4749ca EnterCriticalSection 145481->145518 145484 482d38 145482->145484 145520 477134 39 API calls std::locale::_Setgloballocale 145482->145520 145491 482a95 145484->145491 145488 482e99 145489 47abdb ___free_lconv_mon 14 API calls 145488->145489 145490 482ec5 145488->145490 145489->145490 145519 482ee2 LeaveCriticalSection std::_Lockit::~_Lockit 145490->145519 145521 477178 145491->145521 145493 482aa7 145494 482ac8 145493->145494 145495 482ab6 GetOEMCP 145493->145495 145496 482acd GetACP 145494->145496 145497 482adf 145494->145497 145495->145497 145496->145497 145497->145454 145498 47ac15 145497->145498 145499 47ac53 145498->145499 145503 47ac23 __Wcrtomb 145498->145503 145532 4753de 14 API calls __Wcrtomb 145499->145532 145500 47ac3e RtlAllocateHeap 145502 47ac51 145500->145502 145500->145503 145502->145449 145502->145450 145503->145499 145503->145500 145531 477694 EnterCriticalSection LeaveCriticalSection codecvt 145503->145531 145506 482a95 41 API calls 145505->145506 145507 482f81 145506->145507 145509 482fbe IsValidCodePage 145507->145509 145510 483086 145507->145510 145515 482fd9 codecvt 145507->145515 145509->145510 145512 482fd0 145509->145512 145544 47003d 145510->145544 145511 482da5 145511->145455 145511->145461 145513 482ff9 GetCPInfo 145512->145513 145512->145515 145513->145510 145513->145515 145515->145515 145533 482b69 145515->145533 145516->145457 145517->145459 145518->145488 145519->145482 145522 477196 145521->145522 145528 47a8f0 39 API calls 3 library calls 145522->145528 145524 4771b7 145529 47ac63 39 API calls __Getctype 145524->145529 145526 4771cd 145530 47acc1 39 API calls ctype 145526->145530 145528->145524 145529->145526 145531->145503 145532->145502 145534 482b91 GetCPInfo 145533->145534 145543 482c5a 145533->145543 145535 482ba9 145534->145535 145534->145543 145551 47ece1 145535->145551 145537 47003d __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 145539 482d0c 145537->145539 145539->145510 145542 47efd1 44 API calls 145542->145543 145543->145537 145545 470046 IsProcessorFeaturePresent 145544->145545 145546 470045 145544->145546 145548 47072d 145545->145548 145546->145511 145629 4706f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 145548->145629 145550 470810 145550->145511 145552 477178 ctype 39 API calls 145551->145552 145553 47ed01 145552->145553 145571 481e03 145553->145571 145555 47edbd 145559 47003d __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 145555->145559 145556 47edb5 145574 46faaa 14 API calls ___std_exception_destroy 145556->145574 145557 47ed2e 145557->145555 145557->145556 145558 47ed53 ctype codecvt 145557->145558 145561 47ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 145557->145561 145558->145556 145563 481e03 ctype MultiByteToWideChar 145558->145563 145562 47ede0 145559->145562 145561->145558 145566 47efd1 145562->145566 145564 47ed9c 145563->145564 145564->145556 145565 47eda3 GetStringTypeW 145564->145565 145565->145556 145567 477178 ctype 39 API calls 145566->145567 145568 47efe4 145567->145568 145577 47ede2 145568->145577 145575 481d6b 145571->145575 145574->145555 145576 481d7c MultiByteToWideChar 145575->145576 145576->145557 145578 47edfd ctype 145577->145578 145579 481e03 ctype MultiByteToWideChar 145578->145579 145582 47ee41 145579->145582 145580 47efbc 145581 47003d __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 5 API calls 145580->145581 145583 47efcf 145581->145583 145582->145580 145584 47ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 145582->145584 145586 47ee67 ctype 145582->145586 145597 47ef0f 145582->145597 145583->145542 145584->145586 145587 481e03 ctype MultiByteToWideChar 145586->145587 145586->145597 145588 47eeb0 145587->145588 145588->145597 145605 47e1d3 145588->145605 145591 47eee6 145594 47e1d3 7 API calls 145591->145594 145591->145597 145592 47ef1e 145593 47efa7 145592->145593 145595 47ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 145592->145595 145598 47ef30 ctype 145592->145598 145616 46faaa 14 API calls ___std_exception_destroy 145593->145616 145594->145597 145595->145598 145617 46faaa 14 API calls ___std_exception_destroy 145597->145617 145598->145593 145599 47e1d3 7 API calls 145598->145599 145600 47ef73 145599->145600 145600->145593 145614 481ebd WideCharToMultiByte _Fputc 145600->145614 145602 47ef8d 145602->145593 145603 47ef96 145602->145603 145615 46faaa 14 API calls ___std_exception_destroy 145603->145615 145618 47dd60 145605->145618 145608 47e1e4 LCMapStringEx 145613 47e22b 145608->145613 145609 47e20b 145621 47e230 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 145609->145621 145612 47e224 LCMapStringW 145612->145613 145613->145591 145613->145592 145613->145597 145614->145602 145615->145597 145616->145597 145617->145580 145622 47de5f 145618->145622 145621->145612 145623 47de8f 145622->145623 145626 47dd76 145622->145626 145624 47dd94 __Wcrtomb LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 145623->145624 145623->145626 145625 47dea3 145624->145625 145625->145626 145627 47dea9 GetProcAddress 145625->145627 145626->145608 145626->145609 145627->145626 145628 47deb9 __Wcrtomb 145627->145628 145628->145626 145629->145550 145630 46c900 145637 413200 145630->145637 145632 46c9a0 145644 414120 39 API calls task 145632->145644 145634 46c9fb 145635 46c937 std::runtime_error::runtime_error 145635->145632 145641 46c8c0 145635->145641 145638 413231 std::ios_base::failure::failure 145637->145638 145645 4114f0 145638->145645 145640 41325a 145640->145635 145704 46ca80 145641->145704 145643 46c8d4 145643->145635 145644->145634 145646 411507 Concurrency::task_continuation_context::task_continuation_context 145645->145646 145648 411511 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 145646->145648 145651 423fc0 41 API calls std::_Xinvalid_argument 145646->145651 145650 411539 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 145648->145650 145652 4113d0 145648->145652 145650->145640 145651->145648 145655 4113b0 145652->145655 145654 4113f0 std::ios_base::failure::failure allocator Concurrency::task_continuation_context::task_continuation_context 145654->145650 145658 424bc0 145655->145658 145659 424bd0 allocator 145658->145659 145662 411370 145659->145662 145663 411378 allocator 145662->145663 145664 411388 145663->145664 145666 411396 145663->145666 145669 411460 145664->145669 145665 411391 145665->145654 145666->145665 145677 423220 145666->145677 145670 411477 145669->145670 145671 41147c 145669->145671 145680 423d80 RaiseException stdext::threads::lock_error::lock_error std::_Xinvalid_argument 145670->145680 145673 423220 allocator 16 API calls 145671->145673 145674 411485 145673->145674 145676 4114a0 145674->145676 145681 47458f 39 API calls 2 library calls 145674->145681 145676->145665 145682 46fb05 145677->145682 145680->145671 145686 46fb0a 145682->145686 145684 42322c 145684->145665 145686->145684 145688 46fb26 codecvt 145686->145688 145692 474a40 145686->145692 145699 477694 EnterCriticalSection LeaveCriticalSection codecvt 145686->145699 145687 470371 stdext::threads::lock_error::lock_error 145701 47106c RaiseException 145687->145701 145688->145687 145700 47106c RaiseException 145688->145700 145691 47038e 145697 47ac15 __Wcrtomb 145692->145697 145693 47ac53 145703 4753de 14 API calls __Wcrtomb 145693->145703 145694 47ac3e RtlAllocateHeap 145696 47ac51 145694->145696 145694->145697 145696->145686 145697->145693 145697->145694 145702 477694 EnterCriticalSection LeaveCriticalSection codecvt 145697->145702 145699->145686 145700->145687 145701->145691 145702->145697 145703->145696 145705 46cae4 145704->145705 145707 46ca9d std::runtime_error::runtime_error Concurrency::task_continuation_context::task_continuation_context 145704->145707 145708 46c700 145705->145708 145707->145643 145709 46c720 Concurrency::task_continuation_context::task_continuation_context 145708->145709 145711 46c72d Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 145709->145711 145719 423fc0 41 API calls std::_Xinvalid_argument 145709->145719 145712 4113d0 Concurrency::task_continuation_context::task_continuation_context 41 API calls 145711->145712 145713 46c766 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 145712->145713 145715 46c7d6 Concurrency::task_continuation_context::task_continuation_context 145713->145715 145716 423410 145713->145716 145715->145707 145720 424f90 145716->145720 145719->145711 145723 4118c0 145720->145723 145722 42343b 145722->145715 145724 4118dd allocator 145723->145724 145725 4118e4 error_info_injector 145724->145725 145727 4231a0 39 API calls allocator 145724->145727 145725->145722 145727->145725 145728 415ed9 145739 415ee2 145728->145739 145729 4161ae 145730 4161f5 LoadLibraryA 145729->145730 145735 416205 145730->145735 145753 41621e 145730->145753 145731 4160de 145733 4161b6 145731->145733 145734 41618c 145731->145734 146150 474870 15 API calls 145733->146150 146149 474870 15 API calls 145734->146149 145739->145729 145739->145731 146147 411d90 15 API calls 145739->146147 146148 411de0 20 API calls 145739->146148 145740 41680d 145741 416854 GetProcAddress 145740->145741 145767 416877 145741->145767 145742 41642c 145744 416503 145742->145744 145745 4164d9 145742->145745 146154 474870 15 API calls 145744->146154 146153 474870 15 API calls 145745->146153 145746 41673e 145751 416815 145746->145751 145752 4167eb 145746->145752 146158 474870 15 API calls 145751->146158 146157 474870 15 API calls 145752->146157 145753->145742 145757 4164fb 145753->145757 146151 411d90 15 API calls 145753->146151 146152 411de0 20 API calls 145753->146152 145757->145740 145757->145746 146155 411d90 15 API calls 145757->146155 146156 411de0 20 API calls 145757->146156 145759 416a73 145760 416b21 145759->145760 145761 416b4b 145759->145761 146161 474870 15 API calls 145760->146161 146162 474870 15 API calls 145761->146162 145764 416d86 145768 416e34 145764->145768 145769 416e5e 145764->145769 145767->145759 145778 416b43 145767->145778 146159 411d90 15 API calls 145767->146159 146160 411de0 20 API calls 145767->146160 146165 474870 15 API calls 145768->146165 146166 474870 15 API calls 145769->146166 145773 417099 145775 417171 145773->145775 145776 417147 145773->145776 146170 474870 15 API calls 145775->146170 146169 474870 15 API calls 145776->146169 145778->145764 145786 416e56 145778->145786 146163 411d90 15 API calls 145778->146163 146164 411de0 20 API calls 145778->146164 145782 4173ac 145783 417484 145782->145783 145784 41745a 145782->145784 146174 474870 15 API calls 145783->146174 146173 474870 15 API calls 145784->146173 145786->145773 145793 417169 145786->145793 146167 411d90 15 API calls 145786->146167 146168 411de0 20 API calls 145786->146168 145790 417797 146178 474870 15 API calls 145790->146178 145791 41776d 146177 474870 15 API calls 145791->146177 145792 4176bf 145792->145790 145792->145791 145793->145782 145803 41747c 145793->145803 146171 411d90 15 API calls 145793->146171 146172 411de0 20 API calls 145793->146172 145797 4179d2 145799 417a80 145797->145799 145800 417aaa 145797->145800 146181 474870 15 API calls 145799->146181 146182 474870 15 API calls 145800->146182 145803->145792 145813 41778f 145803->145813 146175 411d90 15 API calls 145803->146175 146176 411de0 20 API calls 145803->146176 145806 417d93 146185 474870 15 API calls 145806->146185 145807 417dbd 146186 474870 15 API calls 145807->146186 145808 417ce5 145808->145806 145808->145807 145810 4186ee 145816 418735 GetProcAddress 145810->145816 145811 417ff8 145817 4180d0 145811->145817 145818 4180a6 145811->145818 145813->145797 145820 417aa2 145813->145820 146179 411d90 15 API calls 145813->146179 146180 411de0 20 API calls 145813->146180 145852 418758 145816->145852 146190 474870 15 API calls 145817->146190 146189 474870 15 API calls 145818->146189 145820->145808 145827 417db5 145820->145827 146183 411d90 15 API calls 145820->146183 146184 411de0 20 API calls 145820->146184 145824 41830b 145825 4183e3 145824->145825 145826 4183b9 145824->145826 146194 474870 15 API calls 145825->146194 146193 474870 15 API calls 145826->146193 145827->145811 145836 4180c8 145827->145836 146187 411d90 15 API calls 145827->146187 146188 411de0 20 API calls 145827->146188 145832 41861e 145833 4186f6 145832->145833 145834 4186cc 145832->145834 146198 474870 15 API calls 145833->146198 146197 474870 15 API calls 145834->146197 145836->145824 145839 4183db 145836->145839 146191 411d90 15 API calls 145836->146191 146192 411de0 20 API calls 145836->146192 145839->145810 145839->145832 146195 411d90 15 API calls 145839->146195 146196 411de0 20 API calls 145839->146196 145841 418954 145842 418a02 145841->145842 145843 418a2c 145841->145843 146201 474870 15 API calls 145842->146201 146202 474870 15 API calls 145843->146202 145845 418c67 145849 418d15 145845->145849 145850 418d3f 145845->145850 146205 474870 15 API calls 145849->146205 146206 474870 15 API calls 145850->146206 145852->145841 145859 418a24 145852->145859 146199 411d90 15 API calls 145852->146199 146200 411de0 20 API calls 145852->146200 145856 418f7a 145857 419052 145856->145857 145858 419028 145856->145858 146210 474870 15 API calls 145857->146210 146209 474870 15 API calls 145858->146209 145859->145845 145874 418d37 145859->145874 146203 411d90 15 API calls 145859->146203 146204 411de0 20 API calls 145859->146204 145863 4199a1 145867 4199e8 GetProcAddress 145863->145867 145865 419365 146214 474870 15 API calls 145865->146214 145866 41933b 146213 474870 15 API calls 145866->146213 145899 419a14 145867->145899 145868 41928d 145868->145865 145868->145866 145872 4195a0 145875 419678 145872->145875 145876 41964e 145872->145876 145874->145856 145880 41904a 145874->145880 146207 411d90 15 API calls 145874->146207 146208 411de0 20 API calls 145874->146208 146218 474870 15 API calls 145875->146218 146217 474870 15 API calls 145876->146217 145878 4198cb 145883 4199a9 145878->145883 145884 41997f 145878->145884 145880->145868 145886 41935d 145880->145886 146211 411d90 15 API calls 145880->146211 146212 411de0 20 API calls 145880->146212 146222 474870 15 API calls 145883->146222 146221 474870 15 API calls 145884->146221 145886->145872 145889 419670 145886->145889 146215 411d90 15 API calls 145886->146215 146216 411de0 20 API calls 145886->146216 145889->145863 145889->145878 146219 411d90 15 API calls 145889->146219 146220 411de0 20 API calls 145889->146220 145891 419c1f 145892 419cd2 145891->145892 145893 419cfc 145891->145893 146225 474870 15 API calls 145892->146225 146226 474870 15 API calls 145893->146226 145898 419f4f 145900 41a002 145898->145900 145901 41a02c 145898->145901 145899->145891 145911 419cf4 145899->145911 146223 411d90 15 API calls 145899->146223 146224 411de0 20 API calls 145899->146224 146229 474870 15 API calls 145900->146229 146230 474870 15 API calls 145901->146230 145905 41a27f 145907 41a332 145905->145907 145908 41a35c 145905->145908 146233 474870 15 API calls 145907->146233 146234 474870 15 API calls 145908->146234 145911->145898 145920 41a024 145911->145920 146227 411d90 15 API calls 145911->146227 146228 411de0 20 API calls 145911->146228 145914 41a5af 145915 41a662 145914->145915 145916 41a68c 145914->145916 146237 474870 15 API calls 145915->146237 146238 474870 15 API calls 145916->146238 145918 41a8df 145923 41a992 145918->145923 145924 41a9bc 145918->145924 145920->145905 145927 41a354 145920->145927 146231 411d90 15 API calls 145920->146231 146232 411de0 20 API calls 145920->146232 146241 474870 15 API calls 145923->146241 146242 474870 15 API calls 145924->146242 145925 41ac0f 145931 41acc2 145925->145931 145932 41acec 145925->145932 145927->145914 145933 41a684 145927->145933 146235 411d90 15 API calls 145927->146235 146236 411de0 20 API calls 145927->146236 146245 474870 15 API calls 145931->146245 146246 474870 15 API calls 145932->146246 145933->145918 145947 41a9b4 145933->145947 146239 411d90 15 API calls 145933->146239 146240 411de0 20 API calls 145933->146240 145937 41b674 145939 41b6bb GetProcAddress 145937->145939 145977 41b6e7 145939->145977 145940 41af3f 145941 41aff2 145940->145941 145942 41b01c 145940->145942 146249 474870 15 API calls 145941->146249 146250 474870 15 API calls 145942->146250 145945 41b26f 145949 41b322 145945->145949 145950 41b34c 145945->145950 145947->145925 145953 41ace4 145947->145953 146243 411d90 15 API calls 145947->146243 146244 411de0 20 API calls 145947->146244 146253 474870 15 API calls 145949->146253 146254 474870 15 API calls 145950->146254 145953->145940 145960 41b014 145953->145960 146247 411d90 15 API calls 145953->146247 146248 411de0 20 API calls 145953->146248 145956 41b59f 145957 41b652 145956->145957 145958 41b67c 145956->145958 146257 474870 15 API calls 145957->146257 146258 474870 15 API calls 145958->146258 145960->145945 145963 41b344 145960->145963 146251 411d90 15 API calls 145960->146251 146252 411de0 20 API calls 145960->146252 145963->145937 145963->145956 146255 411d90 15 API calls 145963->146255 146256 411de0 20 API calls 145963->146256 145965 41b8f2 145967 41b9d0 145965->145967 145968 41b9a6 145965->145968 145966 41c68c 145972 41c6e5 FreeLibrary 145966->145972 146017 41c708 145966->146017 146262 474870 15 API calls 145967->146262 146261 474870 15 API calls 145968->146261 145972->145735 145974 41bd01 146266 474870 15 API calls 145974->146266 145975 41bcd7 146265 474870 15 API calls 145975->146265 145976 41bc23 145976->145974 145976->145975 145977->145965 145988 41b9c8 145977->145988 146259 411d90 15 API calls 145977->146259 146260 411de0 20 API calls 145977->146260 145981 41bf54 145983 41c032 145981->145983 145984 41c008 145981->145984 146270 474870 15 API calls 145983->146270 146269 474870 15 API calls 145984->146269 145986 41c285 145991 41c363 145986->145991 145992 41c339 145986->145992 145988->145976 145996 41bcf9 145988->145996 146263 411d90 15 API calls 145988->146263 146264 411de0 20 API calls 145988->146264 146274 474870 15 API calls 145991->146274 146273 474870 15 API calls 145992->146273 145994 41c5b6 145999 41c694 145994->145999 146000 41c66a 145994->146000 145996->145981 146002 41c02a 145996->146002 146267 411d90 15 API calls 145996->146267 146268 411de0 20 API calls 145996->146268 146278 474870 15 API calls 145999->146278 146277 474870 15 API calls 146000->146277 146002->145986 146005 41c35b 146002->146005 146271 411d90 15 API calls 146002->146271 146272 411de0 20 API calls 146002->146272 146005->145966 146005->145994 146275 411d90 15 API calls 146005->146275 146276 411de0 20 API calls 146005->146276 146006 41c92e 146008 41c9e1 146006->146008 146009 41ca0b 146006->146009 146281 474870 15 API calls 146008->146281 146282 474870 15 API calls 146009->146282 146014 41cd11 146285 474870 15 API calls 146014->146285 146015 41cd3b 146286 474870 15 API calls 146015->146286 146016 41cc5e 146016->146014 146016->146015 146017->146006 146028 41ca03 146017->146028 146279 411d90 15 API calls 146017->146279 146280 411de0 20 API calls 146017->146280 146022 41cf8e 146023 41d041 146022->146023 146024 41d06b 146022->146024 146289 474870 15 API calls 146023->146289 146290 474870 15 API calls 146024->146290 146026 41d2be 146031 41d371 146026->146031 146032 41d39b 146026->146032 146028->146016 146036 41cd33 146028->146036 146283 411d90 15 API calls 146028->146283 146284 411de0 20 API calls 146028->146284 146293 474870 15 API calls 146031->146293 146294 474870 15 API calls 146032->146294 146034 41d5ee 146039 41d6a1 146034->146039 146040 41d6cb 146034->146040 146036->146022 146042 41d063 146036->146042 146287 411d90 15 API calls 146036->146287 146288 411de0 20 API calls 146036->146288 146297 474870 15 API calls 146039->146297 146298 474870 15 API calls 146040->146298 146042->146026 146045 41d393 146042->146045 146291 411d90 15 API calls 146042->146291 146292 411de0 20 API calls 146042->146292 146045->146034 146060 41d6c3 146045->146060 146295 411d90 15 API calls 146045->146295 146296 411de0 20 API calls 146045->146296 146046 41d936 146048 41da13 146046->146048 146049 41d9e9 146046->146049 146302 474870 15 API calls 146048->146302 146301 474870 15 API calls 146049->146301 146054 41dc66 146055 41dd43 146054->146055 146056 41dd19 146054->146056 146306 474870 15 API calls 146055->146306 146305 474870 15 API calls 146056->146305 146058 41df96 146063 41e073 146058->146063 146064 41e049 146058->146064 146060->146046 146069 41da0b 146060->146069 146299 411d90 15 API calls 146060->146299 146300 411de0 20 API calls 146060->146300 146310 474870 15 API calls 146063->146310 146309 474870 15 API calls 146064->146309 146066 41e9dd 146072 41ea38 InternetOpenA 146066->146072 146067 41e2c6 146073 41e3a3 146067->146073 146074 41e379 146067->146074 146069->146054 146077 41dd3b 146069->146077 146303 411d90 15 API calls 146069->146303 146304 411de0 20 API calls 146069->146304 146110 41ea57 146072->146110 146314 474870 15 API calls 146073->146314 146313 474870 15 API calls 146074->146313 146075 41e5de 146081 41e6b5 146075->146081 146082 41e68b 146075->146082 146077->146058 146083 41e06b 146077->146083 146307 411d90 15 API calls 146077->146307 146308 411de0 20 API calls 146077->146308 146318 474870 15 API calls 146081->146318 146317 474870 15 API calls 146082->146317 146083->146067 146095 41e39b 146083->146095 146311 411d90 15 API calls 146083->146311 146312 411de0 20 API calls 146083->146312 146087 41e908 146090 41e9e5 146087->146090 146091 41e9bb 146087->146091 146089 41f036 146094 41f074 FreeLibrary 146089->146094 146127 41f097 146089->146127 146322 474870 15 API calls 146090->146322 146321 474870 15 API calls 146091->146321 146094->145735 146095->146075 146097 41e6ad 146095->146097 146315 411d90 15 API calls 146095->146315 146316 411de0 20 API calls 146095->146316 146097->146066 146097->146087 146319 411d90 15 API calls 146097->146319 146320 411de0 20 API calls 146097->146320 146099 41ec53 146100 41ed01 146099->146100 146101 41ed2b 146099->146101 146325 474870 15 API calls 146100->146325 146326 474870 15 API calls 146101->146326 146103 41ef66 146107 41f014 146103->146107 146108 41f03e 146103->146108 146329 474870 15 API calls 146107->146329 146330 474870 15 API calls 146108->146330 146110->146099 146116 41ed23 146110->146116 146323 411d90 15 API calls 146110->146323 146324 411de0 20 API calls 146110->146324 146114 41f2a5 146118 41f352 146114->146118 146119 41f37c 146114->146119 146115 41f698 std::runtime_error::runtime_error _strlen 146117 41f6f6 InternetOpenUrlA 146115->146117 146116->146089 146116->146103 146327 411d90 15 API calls 146116->146327 146328 411de0 20 API calls 146116->146328 146121 41f782 InternetReadFile 146117->146121 146122 41f734 FreeLibrary 146117->146122 146333 474870 15 API calls 146118->146333 146334 474870 15 API calls 146119->146334 146125 41f7b2 146121->146125 146126 41f7bb FreeLibrary 146121->146126 146133 41f75f 146122->146133 146125->146121 146125->146126 146143 424c60 146125->146143 146141 41f82a std::ios_base::failure::failure 146126->146141 146127->146114 146140 41f374 146127->146140 146331 411d90 15 API calls 146127->146331 146332 411de0 20 API calls 146127->146332 146130 41f5c9 146131 41f6a0 146130->146131 146132 41f676 146130->146132 146338 474870 15 API calls 146131->146338 146337 474870 15 API calls 146132->146337 146339 414120 39 API calls task 146133->146339 146140->146115 146140->146130 146335 411d90 15 API calls 146140->146335 146336 411de0 20 API calls 146140->146336 146340 414120 39 API calls task 146141->146340 146144 424ccd 146143->146144 146145 424c80 std::ios_base::failure::failure std::runtime_error::runtime_error Concurrency::task_continuation_context::task_continuation_context 146143->146145 146144->146145 146341 4119b0 146144->146341 146145->146125 146147->145739 146148->145739 146149->145729 146150->145729 146151->145753 146152->145753 146153->145757 146154->145757 146155->145757 146156->145757 146157->145740 146158->145740 146159->145767 146160->145767 146161->145778 146162->145778 146163->145778 146164->145778 146165->145786 146166->145786 146167->145786 146168->145786 146169->145793 146170->145793 146171->145793 146172->145793 146173->145803 146174->145803 146175->145803 146176->145803 146177->145813 146178->145813 146179->145813 146180->145813 146181->145820 146182->145820 146183->145820 146184->145820 146185->145827 146186->145827 146187->145827 146188->145827 146189->145836 146190->145836 146191->145836 146192->145836 146193->145839 146194->145839 146195->145839 146196->145839 146197->145810 146198->145810 146199->145852 146200->145852 146201->145859 146202->145859 146203->145859 146204->145859 146205->145874 146206->145874 146207->145874 146208->145874 146209->145880 146210->145880 146211->145880 146212->145880 146213->145886 146214->145886 146215->145886 146216->145886 146217->145889 146218->145889 146219->145889 146220->145889 146221->145863 146222->145863 146223->145899 146224->145899 146225->145911 146226->145911 146227->145911 146228->145911 146229->145920 146230->145920 146231->145920 146232->145920 146233->145927 146234->145927 146235->145927 146236->145927 146237->145933 146238->145933 146239->145933 146240->145933 146241->145947 146242->145947 146243->145947 146244->145947 146245->145953 146246->145953 146247->145953 146248->145953 146249->145960 146250->145960 146251->145960 146252->145960 146253->145963 146254->145963 146255->145963 146256->145963 146257->145937 146258->145937 146259->145977 146260->145977 146261->145988 146262->145988 146263->145988 146264->145988 146265->145996 146266->145996 146267->145996 146268->145996 146269->146002 146270->146002 146271->146002 146272->146002 146273->146005 146274->146005 146275->146005 146276->146005 146277->145966 146278->145966 146279->146017 146280->146017 146281->146028 146282->146028 146283->146028 146284->146028 146285->146036 146286->146036 146287->146036 146288->146036 146289->146042 146290->146042 146291->146042 146292->146042 146293->146045 146294->146045 146295->146045 146296->146045 146297->146060 146298->146060 146299->146060 146300->146060 146301->146069 146302->146069 146303->146069 146304->146069 146305->146077 146306->146077 146307->146077 146308->146077 146309->146083 146310->146083 146311->146083 146312->146083 146313->146095 146314->146095 146315->146095 146316->146095 146317->146097 146318->146097 146319->146097 146320->146097 146321->146066 146322->146066 146323->146110 146324->146110 146325->146116 146326->146116 146327->146116 146328->146116 146329->146089 146330->146089 146331->146127 146332->146127 146333->146140 146334->146140 146335->146140 146336->146140 146337->146115 146338->146115 146339->145735 146340->145735 146342 4119d0 Concurrency::task_continuation_context::task_continuation_context 146341->146342 146344 4119dd Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 146342->146344 146349 423fc0 41 API calls std::_Xinvalid_argument 146342->146349 146345 4113d0 Concurrency::task_continuation_context::task_continuation_context 41 API calls 146344->146345 146346 411a16 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source 146345->146346 146347 423410 task 39 API calls 146346->146347 146348 411a89 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 146346->146348 146347->146348 146348->146145 146349->146344 146350 46fe5f 146351 46fe68 146350->146351 146358 47013c IsProcessorFeaturePresent 146351->146358 146353 46fe74 146359 472f0e 10 API calls 2 library calls 146353->146359 146355 46fe79 146356 46fe7d 146355->146356 146360 472f2d 7 API calls 2 library calls 146355->146360 146358->146353 146359->146355 146360->146356 146361 47496e 146362 47abdb ___free_lconv_mon 14 API calls 146361->146362 146363 474986 146362->146363 146364 425d29 146373 425d32 146364->146373 146365 425f2e 146367 426006 146365->146367 146368 425fdc 146365->146368 146639 474870 15 API calls 146367->146639 146638 474870 15 API calls 146368->146638 146372 426250 146375 426327 146372->146375 146376 4262fd 146372->146376 146373->146365 146384 425ffe 146373->146384 146636 411d90 15 API calls 146373->146636 146637 411de0 20 API calls 146373->146637 146643 474870 15 API calls 146375->146643 146642 474870 15 API calls 146376->146642 146380 426562 146382 426639 146380->146382 146383 42660f 146380->146383 146647 474870 15 API calls 146382->146647 146646 474870 15 API calls 146383->146646 146384->146372 146393 42631f 146384->146393 146607 42c4b7 146384->146607 146640 411d90 15 API calls 146384->146640 146641 411de0 20 API calls 146384->146641 146387 426880 146390 426958 146387->146390 146391 42692e 146387->146391 146651 474870 15 API calls 146390->146651 146650 474870 15 API calls 146391->146650 146393->146380 146400 426631 146393->146400 146644 411d90 15 API calls 146393->146644 146645 411de0 20 API calls 146393->146645 146397 426c41 146654 474870 15 API calls 146397->146654 146398 426c6b 146655 474870 15 API calls 146398->146655 146399 426b93 146399->146397 146399->146398 146400->146387 146411 426950 146400->146411 146648 411d90 15 API calls 146400->146648 146649 411de0 20 API calls 146400->146649 146404 426eb7 146406 426f64 146404->146406 146407 426f8e 146404->146407 146658 474870 15 API calls 146406->146658 146659 474870 15 API calls 146407->146659 146409 4271c9 146414 4272a0 146409->146414 146415 427276 146409->146415 146411->146399 146419 426c63 146411->146419 146652 411d90 15 API calls 146411->146652 146653 411de0 20 API calls 146411->146653 146663 474870 15 API calls 146414->146663 146662 474870 15 API calls 146415->146662 146417 4274e7 146422 427595 146417->146422 146423 4275bf 146417->146423 146419->146404 146425 426f86 146419->146425 146656 411d90 15 API calls 146419->146656 146657 411de0 20 API calls 146419->146657 146666 474870 15 API calls 146422->146666 146667 474870 15 API calls 146423->146667 146425->146409 146432 427298 146425->146432 146660 411d90 15 API calls 146425->146660 146661 411de0 20 API calls 146425->146661 146429 4277fa 146430 4278d2 146429->146430 146431 4278a8 146429->146431 146671 474870 15 API calls 146430->146671 146670 474870 15 API calls 146431->146670 146432->146417 146443 4275b7 146432->146443 146664 411d90 15 API calls 146432->146664 146665 411de0 20 API calls 146432->146665 146436 427b0d 146438 427be5 146436->146438 146439 427bbb 146436->146439 146675 474870 15 API calls 146438->146675 146674 474870 15 API calls 146439->146674 146441 427e20 146446 427ef8 146441->146446 146447 427ece 146441->146447 146443->146429 146452 4278ca 146443->146452 146668 411d90 15 API calls 146443->146668 146669 411de0 20 API calls 146443->146669 146679 474870 15 API calls 146446->146679 146678 474870 15 API calls 146447->146678 146448 428b71 VirtualAlloc 146466 428ba8 146448->146466 146450 428133 146455 4281e1 146450->146455 146456 42820b 146450->146456 146452->146436 146459 427bdd 146452->146459 146672 411d90 15 API calls 146452->146672 146673 411de0 20 API calls 146452->146673 146682 474870 15 API calls 146455->146682 146683 474870 15 API calls 146456->146683 146457 428446 146463 4284f4 146457->146463 146464 42851e 146457->146464 146459->146441 146467 427ef0 146459->146467 146676 411d90 15 API calls 146459->146676 146677 411de0 20 API calls 146459->146677 146686 474870 15 API calls 146463->146686 146687 474870 15 API calls 146464->146687 146465 428203 146465->146457 146475 428516 146465->146475 146684 411d90 15 API calls 146465->146684 146685 411de0 20 API calls 146465->146685 146474 428db3 146466->146474 146515 428e89 146466->146515 146696 411d90 15 API calls 146466->146696 146697 411de0 20 API calls 146466->146697 146467->146450 146467->146465 146680 411d90 15 API calls 146467->146680 146681 411de0 20 API calls 146467->146681 146470 42919c 146505 4293df 146470->146505 146518 4294af 146470->146518 146704 411d90 15 API calls 146470->146704 146705 411de0 20 API calls 146470->146705 146473 428759 146476 428831 146473->146476 146477 428807 146473->146477 146491 428e91 146474->146491 146492 428e67 146474->146492 146475->146473 146480 428829 146475->146480 146688 411d90 15 API calls 146475->146688 146689 411de0 20 API calls 146475->146689 146691 474870 15 API calls 146476->146691 146690 474870 15 API calls 146477->146690 146480->146448 146482 428a6c 146480->146482 146692 411d90 15 API calls 146480->146692 146693 411de0 20 API calls 146480->146693 146484 428b44 146482->146484 146485 428b1a 146482->146485 146695 474870 15 API calls 146484->146695 146694 474870 15 API calls 146485->146694 146490 428b3c 146490->146448 146699 474870 15 API calls 146491->146699 146698 474870 15 API calls 146492->146698 146497 429815 VirtualAlloc 146501 42983f 146497->146501 146537 42985a 146497->146537 146498 4290cc 146499 4291a4 146498->146499 146500 42917a 146498->146500 146703 474870 15 API calls 146499->146703 146702 474870 15 API calls 146500->146702 146712 47106c RaiseException 146501->146712 146508 4294b7 146505->146508 146509 42948d 146505->146509 146707 474870 15 API calls 146508->146707 146706 474870 15 API calls 146509->146706 146513 4296f2 146516 4297a0 146513->146516 146517 4297ca 146513->146517 146515->146470 146515->146498 146700 411d90 15 API calls 146515->146700 146701 411de0 20 API calls 146515->146701 146710 474870 15 API calls 146516->146710 146711 474870 15 API calls 146517->146711 146518->146513 146522 4297c2 146518->146522 146708 411d90 15 API calls 146518->146708 146709 411de0 20 API calls 146518->146709 146522->146497 146522->146537 146524 429a68 146525 429b40 146524->146525 146526 429b16 146524->146526 146716 474870 15 API calls 146525->146716 146715 474870 15 API calls 146526->146715 146530 429d7b 146532 429e53 146530->146532 146533 429e29 146530->146533 146720 474870 15 API calls 146532->146720 146719 474870 15 API calls 146533->146719 146534 42a09a 146540 42a172 146534->146540 146541 42a148 146534->146541 146537->146524 146542 429b38 146537->146542 146713 411d90 15 API calls 146537->146713 146714 411de0 20 API calls 146537->146714 146724 474870 15 API calls 146540->146724 146723 474870 15 API calls 146541->146723 146542->146530 146553 429e4b 146542->146553 146717 411d90 15 API calls 146542->146717 146718 411de0 20 API calls 146542->146718 146546 42a3ad 146548 42a485 146546->146548 146549 42a45b 146546->146549 146728 474870 15 API calls 146548->146728 146727 474870 15 API calls 146549->146727 146551 42a6ca 146556 42a7a2 146551->146556 146557 42a778 146551->146557 146553->146534 146561 42a16a 146553->146561 146721 411d90 15 API calls 146553->146721 146722 411de0 20 API calls 146553->146722 146732 474870 15 API calls 146556->146732 146731 474870 15 API calls 146557->146731 146559 42a9dd 146564 42aab5 146559->146564 146565 42aa8b 146559->146565 146561->146546 146568 42a47d 146561->146568 146725 411d90 15 API calls 146561->146725 146726 411de0 20 API calls 146561->146726 146736 474870 15 API calls 146564->146736 146735 474870 15 API calls 146565->146735 146566 42ad04 146572 42adb2 146566->146572 146573 42addc 146566->146573 146568->146551 146574 42a79a 146568->146574 146729 411d90 15 API calls 146568->146729 146730 411de0 20 API calls 146568->146730 146739 474870 15 API calls 146572->146739 146740 474870 15 API calls 146573->146740 146574->146559 146587 42aaad 146574->146587 146733 411d90 15 API calls 146574->146733 146734 411de0 20 API calls 146574->146734 146578 42b017 146580 42b0c5 146578->146580 146581 42b0ef 146578->146581 146743 474870 15 API calls 146580->146743 146744 474870 15 API calls 146581->146744 146585 42b336 146588 42b3e4 146585->146588 146589 42b40e 146585->146589 146587->146566 146593 42add4 146587->146593 146737 411d90 15 API calls 146587->146737 146738 411de0 20 API calls 146587->146738 146747 474870 15 API calls 146588->146747 146748 474870 15 API calls 146589->146748 146591 42b661 146596 42b715 146591->146596 146597 42b73f 146591->146597 146593->146578 146599 42b0e7 146593->146599 146741 411d90 15 API calls 146593->146741 146742 411de0 20 API calls 146593->146742 146751 474870 15 API calls 146596->146751 146752 474870 15 API calls 146597->146752 146599->146585 146603 42b406 146599->146603 146745 411d90 15 API calls 146599->146745 146746 411de0 20 API calls 146599->146746 146603->146591 146615 42b737 _Yarn 146603->146615 146749 411d90 15 API calls 146603->146749 146750 411de0 20 API calls 146603->146750 146604 42b9af 146605 42ba63 146604->146605 146606 42ba8d 146604->146606 146755 474870 15 API calls 146605->146755 146756 474870 15 API calls 146606->146756 146612 42bd94 146759 474870 15 API calls 146612->146759 146613 42bdbe 146760 474870 15 API calls 146613->146760 146614 42bce0 146614->146612 146614->146613 146615->146604 146621 42ba85 146615->146621 146753 411d90 15 API calls 146615->146753 146754 411de0 20 API calls 146615->146754 146620 42c0b2 146622 42c165 146620->146622 146623 42c18f 146620->146623 146621->146614 146632 42bdb6 _Yarn 146621->146632 146757 411d90 15 API calls 146621->146757 146758 411de0 20 API calls 146621->146758 146763 474870 15 API calls 146622->146763 146764 474870 15 API calls 146623->146764 146626 42c3e2 146629 42c495 146626->146629 146630 42c4bf 146626->146630 146767 474870 15 API calls 146629->146767 146768 474870 15 API calls 146630->146768 146632->146620 146635 42c187 146632->146635 146761 411d90 15 API calls 146632->146761 146762 411de0 20 API calls 146632->146762 146635->146607 146635->146626 146765 411d90 15 API calls 146635->146765 146766 411de0 20 API calls 146635->146766 146636->146373 146637->146373 146638->146384 146639->146384 146640->146384 146641->146384 146642->146393 146643->146393 146644->146393 146645->146393 146646->146400 146647->146400 146648->146400 146649->146400 146650->146411 146651->146411 146652->146411 146653->146411 146654->146419 146655->146419 146656->146419 146657->146419 146658->146425 146659->146425 146660->146425 146661->146425 146662->146432 146663->146432 146664->146432 146665->146432 146666->146443 146667->146443 146668->146443 146669->146443 146670->146452 146671->146452 146672->146452 146673->146452 146674->146459 146675->146459 146676->146459 146677->146459 146678->146467 146679->146467 146680->146467 146681->146467 146682->146465 146683->146465 146684->146465 146685->146465 146686->146475 146687->146475 146688->146475 146689->146475 146690->146480 146691->146480 146692->146480 146693->146480 146694->146490 146695->146490 146696->146466 146697->146466 146698->146515 146699->146515 146700->146515 146701->146515 146702->146470 146703->146470 146704->146470 146705->146470 146706->146518 146707->146518 146708->146518 146709->146518 146710->146522 146711->146522 146712->146537 146713->146537 146714->146537 146715->146542 146716->146542 146717->146542 146718->146542 146719->146553 146720->146553 146721->146553 146722->146553 146723->146561 146724->146561 146725->146561 146726->146561 146727->146568 146728->146568 146729->146568 146730->146568 146731->146574 146732->146574 146733->146574 146734->146574 146735->146587 146736->146587 146737->146587 146738->146587 146739->146593 146740->146593 146741->146593 146742->146593 146743->146599 146744->146599 146745->146599 146746->146599 146747->146603 146748->146603 146749->146603 146750->146603 146751->146615 146752->146615 146753->146615 146754->146615 146755->146621 146756->146621 146757->146621 146758->146621 146759->146632 146760->146632 146761->146632 146762->146632 146763->146635 146764->146635 146765->146635 146766->146635 146767->146607 146768->146607 146769 4214b9 146779 4214c2 146769->146779 146770 421779 146847 423fe0 146770->146847 146772 4216a9 146774 421781 146772->146774 146775 421757 146772->146775 146885 474870 15 API calls 146774->146885 146884 474870 15 API calls 146775->146884 146779->146770 146779->146772 146882 411d90 15 API calls 146779->146882 146883 411de0 20 API calls 146779->146883 146781 4219ac 146782 421a84 146781->146782 146783 421a5a 146781->146783 146889 474870 15 API calls 146782->146889 146888 474870 15 API calls 146783->146888 146785 421cbf 146789 421d97 146785->146789 146790 421d6d 146785->146790 146893 474870 15 API calls 146789->146893 146892 474870 15 API calls 146790->146892 146792 4217b3 146792->146781 146804 421a7c 146792->146804 146886 411d90 15 API calls 146792->146886 146887 411de0 20 API calls 146792->146887 146795 421fd2 146797 422080 146795->146797 146798 4220aa 146795->146798 146896 474870 15 API calls 146797->146896 146897 474870 15 API calls 146798->146897 146801 4222ed 146805 4223c4 146801->146805 146806 42239a 146801->146806 146804->146785 146808 421d8f 146804->146808 146890 411d90 15 API calls 146804->146890 146891 411de0 20 API calls 146804->146891 146901 474870 15 API calls 146805->146901 146900 474870 15 API calls 146806->146900 146808->146795 146815 4220a2 146808->146815 146894 411d90 15 API calls 146808->146894 146895 411de0 20 API calls 146808->146895 146812 4226d6 146905 474870 15 API calls 146812->146905 146813 4226ac 146904 474870 15 API calls 146813->146904 146814 4225ff 146814->146812 146814->146813 146815->146801 146825 4223bc 146815->146825 146898 411d90 15 API calls 146815->146898 146899 411de0 20 API calls 146815->146899 146818 422911 146822 4229e8 146818->146822 146823 4229be 146818->146823 146821 423011 146828 42306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 146821->146828 146829 4230ce 146821->146829 146909 474870 15 API calls 146822->146909 146908 474870 15 API calls 146823->146908 146825->146814 146830 4226ce 146825->146830 146902 411d90 15 API calls 146825->146902 146903 411de0 20 API calls 146825->146903 146828->146829 146934 39521f5 99 API calls 146828->146934 146830->146818 146843 4229e0 146830->146843 146906 411d90 15 API calls 146830->146906 146907 411de0 20 API calls 146830->146907 146832 422c26 146833 422cd3 146832->146833 146834 422cfd 146832->146834 146912 474870 15 API calls 146833->146912 146913 474870 15 API calls 146834->146913 146838 422f42 146840 423019 146838->146840 146841 422fef 146838->146841 146917 474870 15 API calls 146840->146917 146916 474870 15 API calls 146841->146916 146843->146832 146846 422cf5 146843->146846 146910 411d90 15 API calls 146843->146910 146911 411de0 20 API calls 146843->146911 146846->146821 146846->146838 146914 411d90 15 API calls 146846->146914 146915 411de0 20 API calls 146846->146915 146862 42400f 146847->146862 146849 424bae 146849->146792 146850 424274 146923 474870 15 API calls 146850->146923 146851 42424a 146922 474870 15 API calls 146851->146922 146852 4241c0 146852->146850 146852->146851 146856 424473 146858 424527 146856->146858 146859 4244fd 146856->146859 146927 474870 15 API calls 146858->146927 146926 474870 15 API calls 146859->146926 146862->146852 146869 42426c 146862->146869 146920 411d90 15 API calls 146862->146920 146921 411de0 20 API calls 146862->146921 146865 4247a1 146930 474870 15 API calls 146865->146930 146866 4247cb 146931 474870 15 API calls 146866->146931 146867 424717 146867->146865 146867->146866 146869->146856 146875 42451f 146869->146875 146924 411d90 15 API calls 146869->146924 146925 411de0 20 API calls 146869->146925 146873 4249bb 146873->146849 146876 424a6d GetModuleHandleA GetProcAddress 146873->146876 146875->146867 146877 4247c3 146875->146877 146928 411d90 15 API calls 146875->146928 146929 411de0 20 API calls 146875->146929 146878 424a9f _Yarn 146876->146878 146877->146873 146932 411d90 15 API calls 146877->146932 146933 411de0 20 API calls 146877->146933 146879 424b3a VirtualProtect VirtualProtect 146878->146879 146918 470910 146879->146918 146882->146779 146883->146779 146884->146770 146885->146770 146886->146792 146887->146792 146888->146804 146889->146804 146890->146804 146891->146804 146892->146808 146893->146808 146894->146808 146895->146808 146896->146815 146897->146815 146898->146815 146899->146815 146900->146825 146901->146825 146902->146825 146903->146825 146904->146830 146905->146830 146906->146830 146907->146830 146908->146843 146909->146843 146910->146843 146911->146843 146912->146846 146913->146846 146914->146846 146915->146846 146916->146821 146917->146821 146919 424b84 VirtualProtect 146918->146919 146919->146849 146920->146862 146921->146862 146922->146869 146923->146869 146924->146869 146925->146869 146926->146875 146927->146875 146928->146875 146929->146875 146930->146877 146931->146877 146932->146877 146933->146877 146935 41e6ee 146950 41e6fd 146935->146950 146936 41e9dd 146937 41ea38 InternetOpenA 146936->146937 146949 41ea57 146937->146949 146938 41e908 146940 41e9e5 146938->146940 146941 41e9bb 146938->146941 146997 474870 15 API calls 146940->146997 146996 474870 15 API calls 146941->146996 146944 41f074 FreeLibrary 146948 41f086 146944->146948 146945 41f097 146968 41f2a5 146945->146968 146991 41f374 146945->146991 147006 411d90 15 API calls 146945->147006 147007 411de0 20 API calls 146945->147007 146947 41ed23 146956 41ef66 146947->146956 146966 41f036 146947->146966 147002 411d90 15 API calls 146947->147002 147003 411de0 20 API calls 146947->147003 146949->146947 146951 41ec53 146949->146951 146998 411d90 15 API calls 146949->146998 146999 411de0 20 API calls 146949->146999 146950->146936 146950->146938 146994 411d90 15 API calls 146950->146994 146995 411de0 20 API calls 146950->146995 146953 41ed01 146951->146953 146954 41ed2b 146951->146954 147000 474870 15 API calls 146953->147000 147001 474870 15 API calls 146954->147001 146960 41f014 146956->146960 146961 41f03e 146956->146961 147004 474870 15 API calls 146960->147004 147005 474870 15 API calls 146961->147005 146966->146944 146966->146945 146967 41f698 std::runtime_error::runtime_error _strlen 146969 41f6f6 InternetOpenUrlA 146967->146969 146970 41f352 146968->146970 146971 41f37c 146968->146971 146973 41f782 InternetReadFile 146969->146973 146974 41f734 FreeLibrary 146969->146974 147008 474870 15 API calls 146970->147008 147009 474870 15 API calls 146971->147009 146977 41f7b2 146973->146977 146978 41f7bb FreeLibrary 146973->146978 146985 41f75f 146974->146985 146977->146973 146977->146978 146982 424c60 std::ios_base::failure::failure 41 API calls 146977->146982 146992 41f82a std::ios_base::failure::failure 146978->146992 146979 41f5c9 146983 41f6a0 146979->146983 146984 41f676 146979->146984 146982->146977 147013 474870 15 API calls 146983->147013 147012 474870 15 API calls 146984->147012 147014 414120 39 API calls task 146985->147014 146991->146967 146991->146979 147010 411d90 15 API calls 146991->147010 147011 411de0 20 API calls 146991->147011 147015 414120 39 API calls task 146992->147015 146994->146950 146995->146950 146996->146936 146997->146936 146998->146949 146999->146949 147000->146947 147001->146947 147002->146947 147003->146947 147004->146966 147005->146966 147006->146945 147007->146945 147008->146991 147009->146991 147010->146991 147011->146991 147012->146967 147013->146967 147014->146948 147015->146948
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 100341cc5094bd6e64a049300d45587eed1a9454b03a7f4c97687a65f331fcbc
                    • Instruction ID: a8aaf862ded3a41d138cee78ce41a70c6b5b131b1f265715c89e04d84df6e3f1
                    • Opcode Fuzzy Hash: 100341cc5094bd6e64a049300d45587eed1a9454b03a7f4c97687a65f331fcbc
                    • Instruction Fuzzy Hash: C9143471D04A2DCACB62DF24CC916EEB775BF46344F1082CAD50A7A241EB359AD1CF89

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2537 3954ba2-3954bb2 2538 3954e23-3954e26 2537->2538 2539 3954bb8-3954beb call 39546d4 2537->2539 2542 3954bf1-3954c00 call 39546d4 2539->2542 2543 3954e22 2539->2543 2542->2543 2546 3954c06-3954c5f KiUserCallbackDispatcher GetSystemMetrics call 3953576 * 4 GetDC 2542->2546 2543->2538 2555 3954c65-3954c72 GetCurrentObject 2546->2555 2556 3954e20-3954e21 2546->2556 2557 3954e17-3954e1a ReleaseDC 2555->2557 2558 3954c78-3954c89 GetObjectW 2555->2558 2556->2543 2557->2556 2558->2557 2559 3954c8f-3954d1e call 39535db DeleteObject CreateCompatibleDC 2558->2559 2559->2557 2562 3954d24-3954d3f CreateDIBSection 2559->2562 2563 3954d45-3954d4f SelectObject 2562->2563 2564 3954e10-3954e11 DeleteDC 2562->2564 2565 3954d55-3954d74 BitBlt 2563->2565 2566 3954e09-3954e0a DeleteObject 2563->2566 2564->2557 2565->2566 2567 3954d7a-3954d8c call 3953508 2565->2567 2566->2564 2567->2566 2570 3954d8e-3954df9 call 395354b * 3 call 3953d76 2567->2570 2578 3954dfe-3954e04 call 3953536 2570->2578 2578->2566
                    APIs
                      • Part of subcall function 039546D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03954812), ref: 039546E6
                      • Part of subcall function 039546D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03954812), ref: 039546F3
                    • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 03954C13
                    • GetSystemMetrics.USER32(0000004D), ref: 03954C1A
                    • GetDC.USER32(00000000), ref: 03954C55
                    • GetCurrentObject.GDI32(00000000,00000007), ref: 03954C68
                    • GetObjectW.GDI32(00000000,00000018,?), ref: 03954C81
                    • DeleteObject.GDI32(00000000), ref: 03954CB3
                    • CreateCompatibleDC.GDI32(00000000), ref: 03954D14
                    • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 03954D35
                    • SelectObject.GDI32(00000000,00000000), ref: 03954D47
                    • BitBlt.GDI32(00000000,00000000,00000000,?,03952468,00000000,?,?,00CC0020), ref: 03954D6C
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                      • Part of subcall function 03953D76: EnterCriticalSection.KERNEL32(039584D4,00000000,00000000,00000000,?,?,?,?,?,03953EEB,00000000,00000000,00000000,00000000,00000000), ref: 03953D88
                      • Part of subcall function 03953536: GetProcessHeap.KERNEL32(00000000,00000000,0395518A), ref: 0395353D
                      • Part of subcall function 03953536: RtlFreeHeap.NTDLL(00000000), ref: 03953544
                    • DeleteObject.GDI32(00000000), ref: 03954E0A
                    • DeleteDC.GDI32(00000000), ref: 03954E11
                    • ReleaseDC.USER32(00000000,00000000), ref: 03954E1A
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                    • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                    • API String ID: 1387450592-1028866296
                    • Opcode ID: 10ababf5db9d970da31ce92e56abba45f9f4e3a0970a4ff634cc5f3fe2b9fb22
                    • Instruction ID: 1210c64a8a1f6553a1c54aa4f8a9bb8dba55a8e58e0c10f922838311de20b2d5
                    • Opcode Fuzzy Hash: 10ababf5db9d970da31ce92e56abba45f9f4e3a0970a4ff634cc5f3fe2b9fb22
                    • Instruction Fuzzy Hash: 0F71B076E44308ABDB21DFA4DC45BEEBBB8EF44740F144059F905BB280DB709A85CB55

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2580 3951000-3951018 2581 3951412-3951418 2580->2581 2582 395101e-3951028 2580->2582 2582->2581 2583 395102e-3951037 call 395407d 2582->2583 2583->2581 2586 395103d-3951059 call 3953508 * 2 2583->2586 2591 3951404-395140d call 3953536 * 2 2586->2591 2592 395105f-3951061 2586->2592 2591->2581 2592->2591 2593 3951067-395116d call 3953600 FindFirstFileW 2592->2593 2599 39513d5-3951401 call 3953576 * 3 2593->2599 2600 3951173-3951192 call 395363b * 2 2593->2600 2599->2591 2610 3951198-39511b7 call 3953600 2600->2610 2611 39513ba 2600->2611 2616 39511bd-39511cf call 395372b 2610->2616 2617 3951769-3951770 2610->2617 2613 39513bd-39513cf FindNextFileW 2611->2613 2613->2599 2613->2600 2616->2617 2622 39511d5-39511e7 call 395372b 2616->2622 2617->2611 2619 3951776-3951794 call 395363b call 3953b60 2617->2619 2629 3951796-39517e3 call 3953508 call 3953600 call 3953eb6 2619->2629 2630 39517eb-39517f0 2619->2630 2622->2617 2628 39511ed-395120f call 395363b call 3953b60 2622->2628 2649 3951215-395121b 2628->2649 2650 395171e-3951749 call 39540ba 2628->2650 2629->2630 2631 39517f6-39517fb 2630->2631 2632 395199b-39519d2 call 3953600 call 3953eb6 2630->2632 2631->2632 2636 3951801-3951806 2631->2636 2647 39519d7-39519da 2632->2647 2636->2632 2640 395180c-3951811 2636->2640 2640->2632 2644 3951817-395181c 2640->2644 2644->2632 2648 3951822-3951827 2644->2648 2647->2613 2648->2632 2652 395182d-3951832 2648->2652 2649->2650 2654 3951221-3951227 2649->2654 2661 395152d-3951534 call 3953536 2650->2661 2662 395174f-395175a call 395372b 2650->2662 2652->2632 2656 3951838-395183d 2652->2656 2654->2650 2658 395122d-3951233 2654->2658 2656->2632 2660 3951843-3951848 2656->2660 2658->2650 2659 3951239-395123f 2658->2659 2659->2650 2663 3951245-395124b 2659->2663 2660->2632 2664 395184e-3951853 2660->2664 2661->2611 2662->2661 2671 3951760-3951762 2662->2671 2663->2650 2667 3951251-3951257 2663->2667 2664->2632 2668 3951859-395185e 2664->2668 2667->2650 2672 395125d-3951263 2667->2672 2668->2611 2673 3951864-3951878 call 395446c 2668->2673 2671->2617 2672->2650 2674 3951269-395126f 2672->2674 2679 39514b4-39514be call 3953536 2673->2679 2680 395187e-3951883 2673->2680 2674->2650 2676 3951275-395127b 2674->2676 2676->2650 2678 3951281-3951287 2676->2678 2678->2650 2681 395128d-3951293 2678->2681 2679->2611 2680->2679 2683 3951889-39518a1 call 39536f1 2680->2683 2681->2650 2685 3951299-395129f 2681->2685 2683->2679 2689 39518a7-39518bf call 39536f1 2683->2689 2685->2650 2688 39512a5-39512ab 2685->2688 2688->2650 2690 39512b1-39512b7 2688->2690 2689->2679 2695 39518c5-39518db call 395369c 2689->2695 2690->2650 2692 39512bd-39512c3 2690->2692 2692->2650 2694 39512c9-39512cf 2692->2694 2694->2650 2696 39512d5-39512db 2694->2696 2695->2679 2702 39518e1-39518ed call 3953625 2695->2702 2696->2650 2698 39512e1-39512e7 2696->2698 2698->2650 2700 39512ed-39512f3 2698->2700 2700->2650 2701 39512f9-39512ff 2700->2701 2701->2650 2703 3951305-395130b 2701->2703 2708 39518f3-3951906 call 3951a62 2702->2708 2709 39514ad-39514af call 3953536 2702->2709 2703->2650 2705 3951311-3951317 2703->2705 2705->2650 2707 395131d-3951323 2705->2707 2707->2650 2710 3951329-395132f 2707->2710 2708->2709 2716 395190c-3951911 2708->2716 2709->2679 2710->2650 2713 3951335-395133b 2710->2713 2713->2650 2715 3951341-3951347 2713->2715 2717 395134d-3951353 2715->2717 2718 395168c-39516c1 call 39540ba 2715->2718 2716->2709 2719 3951917-3951929 call 3951c94 2716->2719 2717->2718 2722 3951359-395135f 2717->2722 2718->2679 2728 39516c7-39516d2 call 395372b 2718->2728 2726 395198e-3951996 call 3953536 2719->2726 2727 395192b-3951974 call 3951ba5 call 3953600 call 3953d76 2719->2727 2722->2718 2725 3951365-395136b 2722->2725 2729 3951371-3951377 2725->2729 2730 3951662-3951687 EnterCriticalSection call 3954e27 LeaveCriticalSection 2725->2730 2726->2709 2764 3951979-395198b call 3953536 * 2 2727->2764 2728->2679 2743 39516d8-3951719 call 3953efc 2728->2743 2729->2730 2733 395137d-3951383 2729->2733 2730->2611 2739 3951419-395141f 2733->2739 2740 3951389-39513b4 call 3953efc 2733->2740 2745 3951425-3951447 call 39540ba 2739->2745 2746 39514c3-39514c9 2739->2746 2740->2611 2743->2679 2745->2679 2760 3951449-3951454 call 395372b 2745->2760 2747 3951539-395153f 2746->2747 2748 39514cb-39514ed call 39540ba 2746->2748 2757 3951576-395157c 2747->2757 2758 3951541-3951563 call 39540ba 2747->2758 2748->2661 2767 39514ef-39514fa call 395372b 2748->2767 2762 3951582-3951588 2757->2762 2763 395165b 2757->2763 2758->2661 2770 3951565-3951570 call 395372b 2758->2770 2760->2679 2777 3951456-39514a7 call 3953508 call 3953600 call 3953eb6 2760->2777 2762->2763 2768 395158e-3951594 2762->2768 2763->2730 2764->2726 2767->2661 2785 39514fc 2767->2785 2773 3951596-395159d 2768->2773 2774 39515a9-39515af 2768->2774 2770->2661 2788 3951572-3951574 2770->2788 2773->2774 2780 39515b1-39515b7 2774->2780 2781 39515e3-395160b call 39540ba 2774->2781 2777->2709 2780->2781 2787 39515b9-39515bf 2780->2787 2781->2661 2793 3951611-395161c call 395372b 2781->2793 2791 39514fe-3951527 call 3953efc 2785->2791 2787->2781 2792 39515c1-39515c7 2787->2792 2788->2791 2791->2661 2792->2781 2796 39515c9-39515cf 2792->2796 2793->2661 2805 3951622-3951656 call 3953efc 2793->2805 2796->2781 2797 39515d1-39515d8 call 3951000 2796->2797 2804 39515dd-39515de 2797->2804 2804->2611 2805->2661
                    APIs
                    • FindNextFileW.KERNELBASE(?,?), ref: 039513C7
                      • Part of subcall function 0395407D: GetFileAttributesW.KERNELBASE(03955051,0395447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03953ECC), ref: 0395407E
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • FindFirstFileW.KERNELBASE(00000000,?,012AB930,?), ref: 03951161
                      • Part of subcall function 03953EFC: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03953F5D
                      • Part of subcall function 03953EFC: FindNextFileW.KERNEL32(03951710,?), ref: 03953FFE
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 03951668
                    • LeaveCriticalSection.KERNEL32(039584D4), ref: 03951681
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                    • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$Telegram
                    • API String ID: 1893179121-1537637304
                    • Opcode ID: bb8e16c1f88e2ff56773437a68a62ad298719d5a4b7eb8e1e841f383c4299442
                    • Instruction ID: 5fe264b0cd56e22f5ac44a4fb001e817b69237805972fd971b00da7a8fff1e1b
                    • Opcode Fuzzy Hash: bb8e16c1f88e2ff56773437a68a62ad298719d5a4b7eb8e1e841f383c4299442
                    • Instruction Fuzzy Hash: 5F32E776E053145BDF25EFA89890BFDB3B99F84290F18405AFC05AB290EB748EC5C791

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2857 3952054-39520a5 call 3953508 2860 39520a7-39520c6 2857->2860 2861 3952103-3952115 GetCurrentHwProfileA 2857->2861 2864 39520ce-39520d4 2860->2864 2865 39520c8-39520cc 2860->2865 2862 3952117-395212a call 39535db 2861->2862 2863 395212d-395219e GetSystemInfo call 39535db call 3953536 GlobalMemoryStatusEx call 39535db 2861->2863 2862->2863 2881 39521db-39521ec EnumDisplayDevicesA 2863->2881 2866 39520d6-39520dd 2864->2866 2867 39520df-39520e5 2864->2867 2870 39520ee-39520f9 call 395354b 2865->2870 2866->2870 2871 39520e7-39520eb 2867->2871 2872 39520fc-3952101 2867->2872 2870->2872 2871->2870 2872->2860 2872->2861 2882 39521a0-39521a9 2881->2882 2883 39521ee-39521f4 2881->2883 2884 39521ab-39521c7 call 39535db 2882->2884 2885 39521ca-39521da 2882->2885 2884->2885 2885->2881
                    APIs
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • GetCurrentHwProfileA.ADVAPI32(?), ref: 0395210B
                    • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 03952132
                    • GlobalMemoryStatusEx.KERNELBASE(?), ref: 03952166
                    • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 039521E8
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                    • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                    • API String ID: 330852582-565344305
                    • Opcode ID: 9836a6782f1fb98833a9edbead18f93defaf288b959abd17a416e31602ded897
                    • Instruction ID: f12cb854aa8f21c340c6ba271ce34397bb4a2602950c9d771e9e315224166367
                    • Opcode Fuzzy Hash: 9836a6782f1fb98833a9edbead18f93defaf288b959abd17a416e31602ded897
                    • Instruction Fuzzy Hash: 0A4190726083059BD725DF64C881BABB7E9EBC4350F04492DFD899B241E770DA85CBA2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2888 3954e27-3954e47 2889 3954e49-3954e8c call 3953600 call 395407d 2888->2889 2890 3954e98-3954ed9 call 3953508 * 2 call 3953600 FindFirstFileW 2888->2890 2899 3954e92 2889->2899 2900 3955198-395519e 2889->2900 2903 3955183-3955192 call 3953536 * 2 2890->2903 2904 3954edf-3954ef9 call 3953600 2890->2904 2899->2890 2903->2900 2910 3954fb1-3954fc7 call 395363b 2904->2910 2911 3954eff-3954f06 2904->2911 2915 395516b-395517d FindNextFileW 2910->2915 2919 3954fcd-39550ab call 3953600 call 3953eb6 call 395363b call 3953600 call 395407d 2910->2919 2914 3954f0c-3954f1e call 395372b 2911->2914 2911->2915 2914->2915 2920 3954f24-3954f36 call 395372b 2914->2920 2915->2903 2915->2904 2919->2915 2944 39550b1-3955165 call 395363b call 3953600 call 3953eb6 2919->2944 2920->2915 2926 3954f3c-3954f5b call 395363b call 3953b60 2920->2926 2936 3954f84-3954fac EnterCriticalSection call 3954e27 LeaveCriticalSection 2926->2936 2937 3954f5d-3954f62 2926->2937 2936->2915 2937->2936 2939 3954f64-3954f6b 2937->2939 2939->2915 2943 3954f71-3954f79 call 3954e27 2939->2943 2948 3954f7e-3954f7f 2943->2948 2950 395516a 2944->2950 2948->2950 2950->2915
                    APIs
                    • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000), ref: 03954ECD
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 03954F89
                      • Part of subcall function 03954E27: LeaveCriticalSection.KERNEL32(039584D4), ref: 03954FA6
                    • FindNextFileW.KERNELBASE(?,?), ref: 03955175
                      • Part of subcall function 0395407D: GetFileAttributesW.KERNELBASE(03955051,0395447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03953ECC), ref: 0395407E
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                    • String ID: %s\%s$%s\*$Telegram
                    • API String ID: 648860119-4994844
                    • Opcode ID: eb0c5b90e07d0d64543a8e8a3e6ea41aa1bf1368111ed842756da08e2a8932bc
                    • Instruction ID: 1bd5d18ec655dbb5cec2b5b88450854ae7f1073866aeabe5b9af6881be1b01b7
                    • Opcode Fuzzy Hash: eb0c5b90e07d0d64543a8e8a3e6ea41aa1bf1368111ed842756da08e2a8932bc
                    • Instruction Fuzzy Hash: 6BA1A729A15308A9EF10EBA0EC46BFEB775EF84750F10505AFD04EF2A0E7B14AC58759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5796 3951d3c-3951d4e 5797 3951f25-3951f2a 5796->5797 5798 3951d54-3951d5e 5796->5798 5798->5797 5799 3951d64-3951d8e call 3953600 FindFirstFileW 5798->5799 5799->5797 5802 3951d94-3951dd8 call 3953508 call 395363b 5799->5802 5807 3951ddd-3951e02 call 395363b * 2 5802->5807 5812 3951f01-3951f0f FindNextFileW 5807->5812 5813 3951e08-3951e21 call 3953600 5807->5813 5815 3951f11-3951f17 5812->5815 5816 3951f1c-3951f20 call 3953536 5812->5816 5819 3951e54-3951e59 5813->5819 5820 3951e23-3951e33 call 395372b 5813->5820 5815->5807 5816->5797 5821 3951ef2-3951efd 5819->5821 5822 3951e5f-3951e69 5819->5822 5820->5819 5827 3951e35-3951e45 call 395372b 5820->5827 5821->5812 5822->5821 5824 3951e6f-3951e7c call 395408d 5822->5824 5830 3951e7e-3951e95 call 395363b call 3953b60 5824->5830 5831 3951eeb-3951eed call 3953536 5824->5831 5827->5819 5835 3951e47-3951e4a call 3951d3c 5827->5835 5841 3951e97-3951e9c 5830->5841 5842 3951eac-3951edc call 3953600 call 3953eb6 5830->5842 5831->5821 5838 3951e4f 5835->5838 5838->5821 5841->5842 5844 3951e9e-3951ea3 5841->5844 5848 3951ee1-3951ee4 5842->5848 5844->5842 5846 3951ea5-3951eaa 5844->5846 5846->5831 5846->5842 5848->5831
                    APIs
                    • FindFirstFileW.KERNELBASE(?), ref: 03951D83
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • FindNextFileW.KERNELBASE(00000000,?), ref: 03951F07
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                    • String ID: %s%s$%s\%s$%s\*
                    • API String ID: 3555643018-2064654797
                    • Opcode ID: ac949eb30a5d00a7fad7129687db746e5050a6527c2b93713efed19d0d5e9b38
                    • Instruction ID: 64e3d460fc9326a888eb4b3b6d8103fcab466167845537777a1ae1f9957ee78d
                    • Opcode Fuzzy Hash: ac949eb30a5d00a7fad7129687db746e5050a6527c2b93713efed19d0d5e9b38
                    • Instruction Fuzzy Hash: F641AF796093459BCB14FF24D894B7EB7E8AF84680F04491DFC95CB291EB31CAC98786

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5896 3951c94-3951ccf call 39546d4 5899 3951cd1-3951cf8 call 3953576 CryptUnprotectData 5896->5899 5900 3951d2f-3951d3b 5896->5900 5903 3951d05-3951d0a 5899->5903 5904 3951cfa-3951d03 5899->5904 5903->5900 5905 3951d0c-3951d29 CryptProtectData 5903->5905 5904->5900 5905->5900
                    APIs
                      • Part of subcall function 039546D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03954812), ref: 039546E6
                      • Part of subcall function 039546D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03954812), ref: 039546F3
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 03951CF3
                    • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 03951D29
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                    • String ID: CRYPT32.dll$Poverty is the parent of crime.
                    • API String ID: 3642467563-1885057629
                    • Opcode ID: 18adb523a0127ba1ff43f35819ec2dfa5e9016564af0f35a46c0caa8706d5451
                    • Instruction ID: 8ecf8bb33ff46efe9e35272a68698ac04f17d3e15191e69015d6e513412078ed
                    • Opcode Fuzzy Hash: 18adb523a0127ba1ff43f35819ec2dfa5e9016564af0f35a46c0caa8706d5451
                    • Instruction Fuzzy Hash: B4115CB6D0020CABCF10DF95C880DEEFBBDEB48250F14456AE915B7240E770AE49CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 39521f5-3952212 InitializeCriticalSectionAndSpinCount 1 3952214 0->1 2 3952219-395222f CreateMutexA 0->2 3 3952680 1->3 4 3952235-3952240 GetLastError 2->4 5 3952678-395267a ExitProcess 2->5 4->5 6 3952246-3952255 call 3953bd2 4->6 9 395264f-395266f DeleteCriticalSection 6->9 10 395225b-3952285 call 3953576 call 39547e6 6->10 9->5 15 3952647-395264a call 3953536 10->15 16 395228b-39522d0 call 39535db call 395484b 10->16 15->9 16->15 22 39522d6-395230a call 3953508 * 3 16->22 29 3952310-3952317 22->29 30 39525df-395262e call 3953d76 call 3953536 * 4 call 3953bfb 22->30 29->30 32 395231d-3952324 29->32 60 3952631-3952637 call 395536d 30->60 32->30 33 395232a-3952366 call 39546d4 32->33 33->30 39 395236c-3952381 call 3951f2d 33->39 45 39523c1-39523db 39->45 46 3952383-39523ba call 39546d4 39->46 55 39523e5-3952410 call 395363b 45->55 56 39523dd-39523df ExitProcess 45->56 46->45 54 39523bc 46->54 54->3 64 3952412-3952414 ExitProcess 55->64 65 395241a-3952445 call 395363b 55->65 63 395263c-3952643 60->63 63->15 66 3952645 63->66 70 3952447-3952449 ExitProcess 65->70 71 395244f-39524bd call 395363b call 3954ba2 CreateThread * 2 WaitForMultipleObjects call 39519df call 3952054 65->71 66->60 80 39524c7-39524ce 71->80 81 3952501-395251d ObtainUserAgentString 80->81 82 39524d0-39524d9 80->82 85 3952535-39525a0 call 3955239 * 6 call 3953508 81->85 86 395251f-3952532 call 39535db 81->86 83 39524ff 82->83 84 39524db-39524f5 82->84 83->80 84->83 104 39525b2-39525da call 395363b call 3955239 * 2 call 3953536 85->104 105 39525a2-39525ac GetModuleFileNameW 85->105 86->85 104->30 105->104
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(039584D4,00000DA3), ref: 0395220A
                    • CreateMutexA.KERNELBASE(00000000,00000000,1e7f31ac-1494-47cc-9633-054c20e7432e), ref: 03952222
                    • GetLastError.KERNEL32 ref: 03952235
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                    • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$1e7f31ac-1494-47cc-9633-054c20e7432e$@$kernel32$shell32$systemd
                    • API String ID: 2005177960-3436640841
                    • Opcode ID: 56d9164251e84da86e7f0cf966a9fa56ce8087881888529cb3c1999426e4b2d0
                    • Instruction ID: ddf98d5c332e07dd25d40eb3589ac51a1d410968d9a77038ef3595e7cdf8bf81
                    • Opcode Fuzzy Hash: 56d9164251e84da86e7f0cf966a9fa56ce8087881888529cb3c1999426e4b2d0
                    • Instruction Fuzzy Hash: FBC1D235A08348AAEB11FFA0EC49BED7BB5AF85701F040459FE45AE2D1DB714AC5CB21

                    Control-flow Graph

                    APIs
                      • Part of subcall function 0395407D: GetFileAttributesW.KERNELBASE(03955051,0395447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03953ECC), ref: 0395407E
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 039544F5
                    • LeaveCriticalSection.KERNEL32(039584D4), ref: 03954541
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 039545C4
                    • LeaveCriticalSection.KERNEL32(039584D4), ref: 039545FD
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 0395463A
                    • LeaveCriticalSection.KERNEL32(039584D4), ref: 0395467D
                    • EnterCriticalSection.KERNEL32(039584D4), ref: 03954696
                    • LeaveCriticalSection.KERNEL32(039584D4), ref: 039546BF
                      • Part of subcall function 039542EC: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03954574), ref: 03954305
                      • Part of subcall function 039542EC: GetProcAddress.KERNEL32(00000000), ref: 0395430E
                      • Part of subcall function 039542EC: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03954574), ref: 0395431F
                      • Part of subcall function 039542EC: GetProcAddress.KERNEL32(00000000), ref: 03954322
                      • Part of subcall function 039542EC: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03954574), ref: 039543A4
                      • Part of subcall function 039542EC: GetCurrentProcess.KERNEL32(03954574,00000000,00000000,00000002,?,?,?,?,03954574), ref: 039543C0
                      • Part of subcall function 039542EC: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03954574), ref: 039543CF
                      • Part of subcall function 039542EC: CloseHandle.KERNEL32(03954574,?,?,?,?,03954574), ref: 039543FF
                      • Part of subcall function 03953536: GetProcessHeap.KERNEL32(00000000,00000000,0395518A), ref: 0395353D
                      • Part of subcall function 03953536: RtlFreeHeap.NTDLL(00000000), ref: 03953544
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                    • String ID: @$\??\%s$\Network\Cookies
                    • API String ID: 330363434-2791195959
                    • Opcode ID: 187cad080726269c1ff22075bf1dea7e108bb0f7364f6971c4c3dfa8d95ecc89
                    • Instruction ID: 0d9241a45515a6a9f15f5cc6ad88bfd45994f50b8cc0e95c3f65bc096ee4dd2e
                    • Opcode Fuzzy Hash: 187cad080726269c1ff22075bf1dea7e108bb0f7364f6971c4c3dfa8d95ecc89
                    • Instruction Fuzzy Hash: F1714A75A45308AFEB44EFA0D849BEDBBB5FB44305F108015F901AE1D1DBB19AC6CB40

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2953 395536d-39553f6 call 39546d4 2956 39553ff-3955457 2953->2956 2957 39553f8-39553fa 2953->2957 2960 395545d-395548b call 3955361 socket 2956->2960 2961 395553b 2956->2961 2958 395553e-3955541 2957->2958 2964 3955531-3955534 2960->2964 2965 3955491-39554a8 call 39552cf call 3953576 2960->2965 2961->2958 2964->2961 2970 39554a9-39554af 2965->2970 2971 3955524-395552a 2970->2971 2972 39554b1-39554c6 connect 2970->2972 2971->2964 2973 3955517-3955522 Sleep 2972->2973 2974 39554c8-39554e8 send 2972->2974 2973->2970 2974->2973 2975 39554ea-3955504 send 2974->2975 2975->2973 2976 3955506-3955515 call 3953536 2975->2976 2976->2971
                    APIs
                      • Part of subcall function 039546D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03954812), ref: 039546E6
                      • Part of subcall function 039546D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03954812), ref: 039546F3
                    • socket.WS2_32(?,00000001,00000000), ref: 03955480
                    • connect.WS2_32(000000FF,?,00000010), ref: 039554BF
                    • send.WS2_32(000000FF,00000000,00000000), ref: 039554E1
                    • send.WS2_32(000000FF,000000FF,00000037,00000000), ref: 039554FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: send$HandleLibraryLoadModuleconnectsocket
                    • String ID: 146.70.169.164$ws2_32.dll
                    • API String ID: 2781119014-4085977579
                    • Opcode ID: 80d0bcaaece3839958009f2467f60f34958ad7b868983d41641659e5770b8649
                    • Instruction ID: 43a33b6f295c8b81453385f5dec7e907ed23e3dce36bc9df8182da9b77c58bae
                    • Opcode Fuzzy Hash: 80d0bcaaece3839958009f2467f60f34958ad7b868983d41641659e5770b8649
                    • Instruction Fuzzy Hash: 8851A631D08289EEEB12CBE8D8097EDBFB89F16314F144599E951AE1C2C3B54786CB61
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 684063653641960b74c24394049b7363e86ef2c66c7f69eb35a513db19e7df61
                    • Instruction ID: 2bdf9c637d502e008b443fae7a9cf87b014e39923acb2a093f91efd81209bceb
                    • Opcode Fuzzy Hash: 684063653641960b74c24394049b7363e86ef2c66c7f69eb35a513db19e7df61
                    • Instruction Fuzzy Hash: E9632470D04A28CACB22DF64D9916EEF775FF56344F1082CAD40A3A201EB35AAD5DF49

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3853 423fe0-424015 3855 4242a1-4242b9 3853->3855 3856 42401b-424022 3853->3856 3859 424554-42456c 3855->3859 3860 4242bf-4242c9 3855->3860 3857 42402d-424033 3856->3857 3861 4240e4-4240eb 3857->3861 3862 424039-424050 3857->3862 3867 424572-424579 3859->3867 3868 4247f8-424810 3859->3868 3863 4242da-4242e3 3860->3863 3864 4240f6-4240fc 3861->3864 3865 42405b-424061 3862->3865 3869 424397-42439e 3863->3869 3870 4242e9-424300 3863->3870 3871 424102-424109 3864->3871 3872 4241c0-4241c7 3864->3872 3873 424063-4240cb call 411dc0 call 411cc0 3865->3873 3874 4240cd-4240df 3865->3874 3875 424584-42458a 3867->3875 3887 424a36-424a3d 3868->3887 3888 424816-42481d 3868->3888 3878 4243a9-4243af 3869->3878 3879 42430b-424311 3870->3879 3880 424114-42411a 3871->3880 3876 4241d2-4241d8 3872->3876 3873->3865 3874->3857 3883 424590-4245a7 3875->3883 3884 42463b-424642 3875->3884 3885 424236-42423f 3876->3885 3886 4241da-4241e1 3876->3886 3889 424473-42447a 3878->3889 3890 4243b5-4243bc 3878->3890 3891 424313-42437e call 411dc0 call 411cc0 3879->3891 3892 424380-424392 3879->3892 3893 424120-4241b6 call 411d90 call 411de0 call 411d10 3880->3893 3894 4241bb 3880->3894 3906 4245b2-4245b8 3883->3906 3900 42464d-424653 3884->3900 3897 424241-424245 3885->3897 3898 424246-424248 3885->3898 3908 4241ec-4241f2 3886->3908 3903 424a43-424ba4 call 414c60 call 4145b0 call 414a60 call 414550 GetModuleHandleA GetProcAddress call 414e20 call 414670 call 414ff0 call 414670 call 4151b0 call 414670 call 415370 call 414690 call 415530 call 414690 call 415610 call 4146b0 call 4156f0 call 4146b0 call 470910 VirtualProtect * 2 call 470910 VirtualProtect 3887->3903 3904 424bae-424bb1 3887->3904 3901 424828-42482e 3888->3901 3899 424485-42448b 3889->3899 3909 4243c7-4243cd 3890->3909 3891->3879 3892->3863 3893->3880 3894->3864 3897->3898 3914 424274-424299 call 474870 3898->3914 3915 42424a-424272 call 474870 3898->3915 3916 4244e9-4244f2 3899->3916 3917 42448d-424494 3899->3917 3920 424717-42471e 3900->3920 3921 424659-424660 3900->3921 3918 424834-42484b 3901->3918 3919 4248df-4248e6 3901->3919 3903->3904 3924 424624-424636 3906->3924 3925 4245ba-424622 call 411dc0 call 411cc0 3906->3925 3926 424234 3908->3926 3927 4241f4-424232 call 411e00 3908->3927 3911 4243d3-424469 call 411d90 call 411de0 call 411d10 3909->3911 3912 42446e 3909->3912 3911->3909 3912->3878 3974 42429c 3914->3974 3915->3974 3941 4244f4-4244f8 3916->3941 3942 4244f9-4244fb 3916->3942 3937 42449f-4244a5 3917->3937 3938 424856-42485c 3918->3938 3945 4248f1-4248f7 3919->3945 3944 424729-42472f 3920->3944 3939 42466b-424671 3921->3939 3924->3875 3925->3906 3926->3876 3927->3908 3952 4244e7 3937->3952 3953 4244a7-4244e5 call 411e00 3937->3953 3954 4248c8-4248da 3938->3954 3955 42485e-4248c6 call 411dc0 call 411cc0 3938->3955 3956 424712 3939->3956 3957 424677-42470d call 411d90 call 411de0 call 411d10 3939->3957 3941->3942 3959 424527-42454c call 474870 3942->3959 3960 4244fd-424525 call 474870 3942->3960 3962 424731-424738 3944->3962 3963 42478d-424796 3944->3963 3965 4249bb-4249c2 3945->3965 3966 4248fd-424904 3945->3966 3952->3899 3953->3937 3954->3901 3955->3938 3956->3900 3957->3939 4018 42454f 3959->4018 3960->4018 3986 424743-424749 3962->3986 3972 424798-42479c 3963->3972 3973 42479d-42479f 3963->3973 3975 4249cd-4249d3 3965->3975 3968 42490f-424915 3966->3968 3989 4249b6 3968->3989 3990 42491b-4249b1 call 411d90 call 411de0 call 411d10 3968->3990 3972->3973 3992 4247a1-4247c9 call 474870 3973->3992 3993 4247cb-4247f0 call 474870 3973->3993 3974->3855 3994 424a31 3975->3994 3995 4249d5-4249dc 3975->3995 4003 42478b 3986->4003 4004 42474b-424789 call 411e00 3986->4004 3989->3945 3990->3968 4033 4247f3 3992->4033 3993->4033 3994->3887 4013 4249e7-4249ed 3995->4013 4003->3944 4004->3986 4025 424a2f 4013->4025 4026 4249ef-424a2d call 411e00 4013->4026 4018->3859 4025->3975 4026->4013 4033->3868
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 1eb0724eb76fdf8645362bb07d8113ae624aa73d735ee7066c3c61a2780a5f03
                    • Instruction ID: 047b5464fc02d356dcda9293b284344ba0a0a140869f0fcd2df1d9e65e3ab3ac
                    • Opcode Fuzzy Hash: 1eb0724eb76fdf8645362bb07d8113ae624aa73d735ee7066c3c61a2780a5f03
                    • Instruction Fuzzy Hash: 5C724A70D00A1CCACB11DFA4E8916EEF775FF95344F50828AE40A7A241DB35AAD5CF49
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 9ea263655bbe0d5d51d9ee364e5f2cd3eda02a7c65358586251b289644b86f6a
                    • Instruction ID: 40221e3905478f2c468b6a37f05b9caea7f65c1794852b70c7a28e974f01a3c6
                    • Opcode Fuzzy Hash: 9ea263655bbe0d5d51d9ee364e5f2cd3eda02a7c65358586251b289644b86f6a
                    • Instruction Fuzzy Hash: 26D34671D04A2CCACB22DF64D9916AEF775FF46344F5082CAD40A3A241EB35AAD1CF49

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5731 395484b-395485a 5732 3954b90 5731->5732 5733 3954860-3954879 VirtualAlloc 5731->5733 5734 3954b96-3954b99 5732->5734 5733->5732 5735 395487f-39548a3 call 39546d4 5733->5735 5736 3954b9c-3954ba1 5734->5736 5739 3954b8c-3954b8e 5735->5739 5740 39548a9-39548be call 395354b 5735->5740 5739->5736 5743 39548c0-39548c7 5740->5743 5744 39548d2-39548d5 5743->5744 5745 39548c9-39548ce 5743->5745 5747 39548d9-3954900 GetCurrentProcess IsWow64Process call 3955239 5744->5747 5745->5743 5746 39548d0 5745->5746 5746->5747 5750 3954906-395490b 5747->5750 5751 3954990-3954993 5747->5751 5752 395490d-395491d 5750->5752 5753 395492c-3954931 5750->5753 5754 3954995-3954998 5751->5754 5755 39549e0-39549e3 5751->5755 5758 395491f-3954927 5752->5758 5761 3954971-3954974 5753->5761 5762 3954933-3954938 5753->5762 5756 39549b8-39549bc 5754->5756 5757 395499a-39549b6 5754->5757 5759 3954a8e-3954a94 5755->5759 5760 39549e9-39549ee 5755->5760 5756->5732 5764 39549c2-39549de 5756->5764 5763 3954a32-3954a3f 5757->5763 5758->5763 5770 3954b2f-3954b32 5759->5770 5771 3954a9a-3954aa0 5759->5771 5765 3954a10-3954a12 5760->5765 5766 39549f0-3954a0e 5760->5766 5768 3954976-3954979 5761->5768 5769 395497f-395498e 5761->5769 5762->5752 5767 395493a-395493c 5762->5767 5763->5734 5764->5763 5772 3954a44-3954a47 5765->5772 5773 3954a14-3954a2d 5765->5773 5766->5763 5767->5752 5774 395493e-3954941 5767->5774 5768->5732 5768->5769 5769->5758 5770->5732 5775 3954b34-3954b55 5770->5775 5776 3954ac0-3954ac6 5771->5776 5777 3954aa2-3954abb 5771->5777 5784 3954a67-3954a6a 5772->5784 5785 3954a49-3954a62 5772->5785 5773->5763 5780 3954957-395495a 5774->5780 5781 3954943-3954955 5774->5781 5782 3954b77 5775->5782 5783 3954b57-3954b5d 5775->5783 5778 3954ae6-3954aec 5776->5778 5779 3954ac8-3954ae1 5776->5779 5777->5734 5786 3954b0c-3954b12 5778->5786 5787 3954aee-3954b07 5778->5787 5779->5734 5780->5732 5789 3954960-395496f 5780->5789 5781->5758 5791 3954b7c-3954b83 5782->5791 5783->5782 5788 3954b5f-3954b65 5783->5788 5784->5732 5790 3954a70-3954a89 5784->5790 5785->5734 5786->5775 5792 3954b14-3954b2d 5786->5792 5787->5734 5788->5782 5793 3954b67-3954b6d 5788->5793 5789->5758 5790->5734 5791->5734 5792->5734 5793->5782 5794 3954b6f-3954b75 5793->5794 5794->5782 5795 3954b85-3954b8a 5794->5795 5795->5791
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,039522C4), ref: 0395486C
                      • Part of subcall function 039546D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03954812), ref: 039546E6
                      • Part of subcall function 039546D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03954812), ref: 039546F3
                    • GetCurrentProcess.KERNEL32(039522C4), ref: 039548E0
                    • IsWow64Process.KERNEL32(00000000), ref: 039548E7
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                    • String ID: l$ntdl
                    • API String ID: 1207166019-924918826
                    • Opcode ID: 1388d17f6c5f13b60ab52eea72f710e224dbd60427db4ebf1f35b3898e5ec91a
                    • Instruction ID: 748c2c28bbb5ee8a7511ffc3bb7002dab9711fbde0c2bf3f0201c6864f7dfe5a
                    • Opcode Fuzzy Hash: 1388d17f6c5f13b60ab52eea72f710e224dbd60427db4ebf1f35b3898e5ec91a
                    • Instruction Fuzzy Hash: 2F81903170C3059AEBA4EE55E85AB7D33ACFB00751F14095AFE099F2D4E7B489C48B46

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5849 46fca5-46fcbd call 477e88 5852 46fcd0-46fd06 call 477e5d call 46ffb3 call 470489 5849->5852 5853 46fcbf-46fccb 5849->5853 5862 46fd23-46fd2c call 47048f 5852->5862 5863 46fd08-46fd11 call 46ff1f 5852->5863 5854 46fdb9-46fdc8 5853->5854 5868 46fd41-46fd56 call 4705aa call 477e0a call 42cf50 5862->5868 5869 46fd2e-46fd37 call 46ff1f 5862->5869 5863->5862 5870 46fd13-46fd21 5863->5870 5882 46fd5b-46fd64 call 4705e0 5868->5882 5869->5868 5876 46fd39-46fd40 call 478191 5869->5876 5870->5862 5876->5868 5885 46fd66-46fd68 5882->5885 5886 46fdd0-46fdde call 4781b7 call 47817b 5882->5886 5887 46fd6f-46fd82 call 46ffd0 5885->5887 5888 46fd6a call 47816c 5885->5888 5887->5854 5888->5887
                    APIs
                    • ___scrt_release_startup_lock.LIBCMT ref: 0046FCF5
                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0046FD09
                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0046FD2F
                    • ___scrt_uninitialize_crt.LIBCMT ref: 0046FD72
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ___scrt_is_nonwritable_in_current_image$___scrt_release_startup_lock___scrt_uninitialize_crt
                    • String ID: VPWh
                    • API String ID: 3089971210-353207083
                    • Opcode ID: 31ff84aee0742400933154b011a07b0383f597822631c5c495b56e6881499744
                    • Instruction ID: 38bd77b141149d9813f59674939cd785d54d96d55bd1ce9915722ff929785561
                    • Opcode Fuzzy Hash: 31ff84aee0742400933154b011a07b0383f597822631c5c495b56e6881499744
                    • Instruction Fuzzy Hash: 8121373214871196DA24BB667C0B6AE2750DF41768F20443FF4C6272C2EF2D1C45829E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5906 423052-423068 5908 42306a-4230ca LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 5906->5908 5909 4230ce-4230d1 5906->5909 5908->5909
                    APIs
                    • LoadLibraryA.KERNELBASE(?), ref: 0042307F
                    • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000), ref: 004230A2
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004230B7
                    • FreeLibrary.KERNEL32(?), ref: 004230C4
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Library$CreateFreeLoadObjectSingleThreadWait
                    • String ID:
                    • API String ID: 2432312608-0
                    • Opcode ID: 0db59f541fe10b6e32c83e269008114fc27120fd6bd2762fe6bcd192feb1f883
                    • Instruction ID: d16faa11edffad7fa3bd9bfb4c338260be9db6eaa00988b7f2349eaa49fa5199
                    • Opcode Fuzzy Hash: 0db59f541fe10b6e32c83e269008114fc27120fd6bd2762fe6bcd192feb1f883
                    • Instruction Fuzzy Hash: AF016D30A403189BDB248F50EC8CBA97734FB15705F240AD8E519562A1CBB56E80CF58

                    Control-flow Graph

                    APIs
                    • EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                    • RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                    • LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                    • String ID:
                    • API String ID: 1367039788-0
                    • Opcode ID: 0acf4077344b9a46b92d4e741184495c367dc0772868059a6daca29591ed423e
                    • Instruction ID: 966bd4f902fa063083369b158298d51c5655a32c51f7856c1e740623f470e503
                    • Opcode Fuzzy Hash: 0acf4077344b9a46b92d4e741184495c367dc0772868059a6daca29591ed423e
                    • Instruction Fuzzy Hash: 41D0C73360932067CB507BF9BC0C99BBFECEF95562B05005AF605CB154CAB4CD8587A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5911 39546d4-39546f0 GetModuleHandleA 5912 3954706-395470e 5911->5912 5913 39546f2-39546fd LoadLibraryA 5911->5913 5915 3954714-395471f 5912->5915 5916 39547dd 5912->5916 5913->5912 5914 39546ff-3954701 5913->5914 5917 39547e0-39547e5 5914->5917 5915->5916 5918 3954725-395472e 5915->5918 5916->5917 5918->5916 5919 3954734-3954739 5918->5919 5919->5916 5920 395473f-3954743 5919->5920 5920->5916 5921 3954749-395476e 5920->5921 5922 3954770-395477b 5921->5922 5923 39547dc 5921->5923 5924 395477d-3954787 5922->5924 5923->5916 5925 39547cc-39547da 5924->5925 5926 3954789-39547a3 call 3953625 call 3953b60 5924->5926 5925->5922 5925->5923 5931 39547a5-39547ad 5926->5931 5932 39547b1-39547c9 5926->5932 5931->5924 5933 39547af 5931->5933 5932->5925 5933->5925
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03954812), ref: 039546E6
                    • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03954812), ref: 039546F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: HandleLibraryLoadModule
                    • String ID: ntdl
                    • API String ID: 4133054770-3973061744
                    • Opcode ID: 2810d73eff298fb488da34da9dba1283c9772a61656f625ae91c95948ca26f46
                    • Instruction ID: de4aa55e164b5ab11e5da39d261e117f3813dd1232a3e884788fd4ea18bd18d5
                    • Opcode Fuzzy Hash: 2810d73eff298fb488da34da9dba1283c9772a61656f625ae91c95948ca26f46
                    • Instruction Fuzzy Hash: F1318E79E006159BCB64CFAEC890ABDF7B9BF4A714F080299E81197741C7349AD1CBA0
                    APIs
                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 0046C9E8
                    • task.LIBCPMTD ref: 0046C9F6
                    Strings
                    • }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+, xrefs: 0046C92A
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Concurrency::task_continuation_context::task_continuation_contexttask
                    • String ID: }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+
                    • API String ID: 605201214-2946796713
                    • Opcode ID: 7d9e9e9338ed00e4fd67e3062192f70a181165e0098c12c8acad94c223c42131
                    • Instruction ID: dc443bfe0ccb707889c22c3277083e7b855b5cee09c2e5d77d893bf0afd6e62d
                    • Opcode Fuzzy Hash: 7d9e9e9338ed00e4fd67e3062192f70a181165e0098c12c8acad94c223c42131
                    • Instruction Fuzzy Hash: C93103B1D00119DBCB04EF99C992BFEBBB1FF48304F20455AE455B7280DB782A04CBA5
                    APIs
                    • __freea.LIBCMT ref: 0047EF97
                      • Part of subcall function 0047AC15: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,0046FB1F,00000000,?,0042322C,00000000,?,004113A5,00000000), ref: 0047AC47
                    • __freea.LIBCMT ref: 0047EFAA
                    • __freea.LIBCMT ref: 0047EFB7
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: __freea$AllocateHeap
                    • String ID:
                    • API String ID: 2243444508-0
                    • Opcode ID: 4b36b0d6e95c5849369802164f15b40e8cdc547e4b2073c02b534c0682e1fc82
                    • Instruction ID: 73714fccb66cbf3e3027f31d7a2b3d90da44cd6be2a1ba14e5d41abf1308116f
                    • Opcode Fuzzy Hash: 4b36b0d6e95c5849369802164f15b40e8cdc547e4b2073c02b534c0682e1fc82
                    • Instruction Fuzzy Hash: 8D51C372600206BFEB219F669C41EFB76A9EF48314B1586AFFD0CD7241E738CC509669
                    APIs
                      • Part of subcall function 00482A95: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 00482AC0
                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00482DA5,?,00000000,?,00000000,?), ref: 00482FC2
                    • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00482DA5,?,00000000,?,00000000,?), ref: 00482FFE
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID:
                    • API String ID: 546120528-0
                    • Opcode ID: 09401fcd5e5c2f29d8d52dc71fd82ffb5e78121572ea51804cc5db15963b03d5
                    • Instruction ID: f127b3c490a90f5c560f2841b43d90e5633dacb7e9aab92732a5ebe3a08f644b
                    • Opcode Fuzzy Hash: 09401fcd5e5c2f29d8d52dc71fd82ffb5e78121572ea51804cc5db15963b03d5
                    • Instruction Fuzzy Hash: 73514670A002458EDB21EF75C8456AFBBF4FF42B04F14886FD1868B241D6BD9A06CB89
                    APIs
                    • LCMapStringEx.KERNELBASE(?,0047EED2,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 0047E207
                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,0047EED2,?,?,-00000008,?,00000000), ref: 0047E225
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: String
                    • String ID:
                    • API String ID: 2568140703-0
                    • Opcode ID: 98bf10136d6ee922f71a2ff391abcef6eff41c4fa8375553f1b1f00d8468fb91
                    • Instruction ID: 2227ba36e12c92e55cc34d4ba1971d488f48e116bb89e16970e5be7132f5e184
                    • Opcode Fuzzy Hash: 98bf10136d6ee922f71a2ff391abcef6eff41c4fa8375553f1b1f00d8468fb91
                    • Instruction Fuzzy Hash: E5F06D3240011ABBCF125F91DC05DDE3F2AFF4C754F058955FA1825121C636D831AB95
                    APIs
                    • RtlFreeHeap.NTDLL(00000000,00000000,?,00483CAD,?,00000000,?,?,00483F4E,?,00000007,?,?,00484442,?,?), ref: 0047ABF1
                    • GetLastError.KERNEL32(?,?,00483CAD,?,00000000,?,?,00483F4E,?,00000007,?,?,00484442,?,?), ref: 0047ABFC
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 485612231-0
                    • Opcode ID: c2ed5ae7ee0c4e4c5562bb0f2fe67ae65e6c5ab3315552b783d7d34dcc67518c
                    • Instruction ID: 54ef2f954d8d969be1e348edf13e29584856a65a35bb66c88178d53dc7ed0be3
                    • Opcode Fuzzy Hash: c2ed5ae7ee0c4e4c5562bb0f2fe67ae65e6c5ab3315552b783d7d34dcc67518c
                    • Instruction Fuzzy Hash: 8CE08631200A14AFCF262BA1FD0D7DD3A689B80399F14803AFA0CDB171C6B88950C7DD
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000000,0395518A), ref: 0395353D
                    • RtlFreeHeap.NTDLL(00000000), ref: 03953544
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcess
                    • String ID:
                    • API String ID: 3859560861-0
                    • Opcode ID: 33c5cb783e0d5051a8ed90a7e71b256693a767a9bad2adb0bb9c96e2741c6c50
                    • Instruction ID: 65435de679f541826e9c54aef9bcb98c37c1cdab38331e55de40919be67102e2
                    • Opcode Fuzzy Hash: 33c5cb783e0d5051a8ed90a7e71b256693a767a9bad2adb0bb9c96e2741c6c50
                    • Instruction Fuzzy Hash: 34B092765092006AEE88ABF0990DB3A3758AB00643F041088B60699044867882808720
                    APIs
                    • GetCPInfo.KERNEL32(FFFFF9B2,?,00000005,00482DA5,?), ref: 00482B9B
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-0
                    • Opcode ID: 24c8332cd94a0e486cb1bdd1e3146d880d9ded1ff634ae7c54c534794f77bf61
                    • Instruction ID: 56474b732f0171cc98b06d504d350ac9c8729db51401204746f66ea1fc733a22
                    • Opcode Fuzzy Hash: 24c8332cd94a0e486cb1bdd1e3146d880d9ded1ff634ae7c54c534794f77bf61
                    • Instruction Fuzzy Hash: FB517CB0904158AFDB119F28CE84BFEBB6CFB15304F1405EAE489D7142C3B9AD85DB64
                    APIs
                    • stdext::threads::lock_error::lock_error.LIBCPMTD ref: 0047037B
                      • Part of subcall function 0047106C: RaiseException.KERNEL32(E06D7363,00000001,00000003,0047038E,?,?,?,?,0047038E,?,00498484), ref: 004710CC
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ExceptionRaisestdext::threads::lock_error::lock_error
                    • String ID:
                    • API String ID: 3447279179-0
                    • Opcode ID: f5098d09da15edd314a80fa4b95bcd3348f26dfdcfc9775ac7d079e07d7e03a4
                    • Instruction ID: 0a2535e98a8f91c06cc0c7e69879604a2ac3ab54cc14c487d6c1b877caec6427
                    • Opcode Fuzzy Hash: f5098d09da15edd314a80fa4b95bcd3348f26dfdcfc9775ac7d079e07d7e03a4
                    • Instruction Fuzzy Hash: 6FF09C3440420DB6CB04B5AAE856DDD371C5901714B50813BB958554D2FB78E549859E
                    APIs
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00411477
                      • Part of subcall function 00423D80: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00423D89
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                    • String ID:
                    • API String ID: 2103942186-0
                    • Opcode ID: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                    • Instruction ID: 67649a2f73133d4698277e61fbdabc530979e11092087bba1e4a56971bf76d49
                    • Opcode Fuzzy Hash: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                    • Instruction Fuzzy Hash: C9F03C74E0110CABCB04EFA8D4816AEB7B5AF48704F1081AAE90597355E638AF91CB89
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,0046FB1F,00000000,?,0042322C,00000000,?,004113A5,00000000), ref: 0047AC47
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 6536630e01051b7542967680aae82bca3958b4ddfd47582c6ea2e945bbff7dc3
                    • Instruction ID: 38089aee15f5b23179b88bbb16e475e8caa7ebc5728dbcf7062332e20df36463
                    • Opcode Fuzzy Hash: 6536630e01051b7542967680aae82bca3958b4ddfd47582c6ea2e945bbff7dc3
                    • Instruction Fuzzy Hash: B5E0A721104A14BFD63326259D007DF37489B813A4F18C12BBD0CA63D0CA588C10829F
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: allocator
                    • String ID:
                    • API String ID: 3447690668-0
                    • Opcode ID: d916a406edea9c63dd48fe0e0c05415071a9e3445f4ecfd9877c119fe771bdfe
                    • Instruction ID: 153ff8a6af65a840f14f47a902153a40f58e3087cb9f62bff1840e76560de014
                    • Opcode Fuzzy Hash: d916a406edea9c63dd48fe0e0c05415071a9e3445f4ecfd9877c119fe771bdfe
                    • Instruction Fuzzy Hash: 81E04F72A441489FCB04CF58E8517A97775FF45319F04449FFC1A87642CB3A9511CB45
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: allocator
                    • String ID:
                    • API String ID: 3447690668-0
                    • Opcode ID: 92c3ee7a1f08c5345627100f02ae61a5092a826b90a0d614e4ce3020ee71e6fb
                    • Instruction ID: 85f1b754e7f9b3f05a46b2e09082f7050ed3cde8465533ecefca5d4ae4d82ef2
                    • Opcode Fuzzy Hash: 92c3ee7a1f08c5345627100f02ae61a5092a826b90a0d614e4ce3020ee71e6fb
                    • Instruction Fuzzy Hash: 42E0E671644548AFCB14DF48DD51F5977A9F748B14F00465DB81987B80CB396810CB94
                    APIs
                    • VirtualProtect.KERNELBASE(?,00000007,?,?), ref: 00424B9E
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: d49e13d102d0462f8ef5e3aad75ff9d6c427fbcbab5704fedf7d800a64e778d6
                    • Instruction ID: 3e30ee475fff7ca9a0654b6261cfe42678356ece08787eec985b072875f4ff18
                    • Opcode Fuzzy Hash: d49e13d102d0462f8ef5e3aad75ff9d6c427fbcbab5704fedf7d800a64e778d6
                    • Instruction Fuzzy Hash: CBD022B2A0010887CF208F68BC083B23B38F300302B1401AFE80843103DB3604228F88
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: allocator
                    • String ID:
                    • API String ID: 3447690668-0
                    • Opcode ID: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                    • Instruction ID: 224802328813a972c46b968622bb8a948095773a3e94e06679ef3a592c75646a
                    • Opcode Fuzzy Hash: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                    • Instruction Fuzzy Hash: 82C09B3021410C5F8704DF89F491D55779DDFC87147404159BC1D4B351CA30FD40C958
                    APIs
                    • GetFileAttributesW.KERNELBASE(03955051,0395447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03953ECC), ref: 0395407E
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: 615d235629243ab6daf6a172034775f8fb89b6eb5c6a2722820004028f0fe564
                    • Instruction ID: bfae20a370ac27defced349cb626dbc1e802e4f04ba38fe9b0e33a59a88fff02
                    • Opcode Fuzzy Hash: 615d235629243ab6daf6a172034775f8fb89b6eb5c6a2722820004028f0fe564
                    • Instruction Fuzzy Hash: 5CA0223A0303008BCA2C23302B2A00E30800E0A2F03220B8CB033CC0C0EA38C3C00200
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000040), ref: 00428B81
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 7844836b7851550b6e16df00f33d93033cb235de536c6c8cb69abf706618f2ef
                    • Instruction ID: 6319107a3acca9f972967f116bca991737323658a3d1c414cf9ed788fd9a28bf
                    • Opcode Fuzzy Hash: 7844836b7851550b6e16df00f33d93033cb235de536c6c8cb69abf706618f2ef
                    • Instruction Fuzzy Hash: 8C2128B1D06928CBDB62CF24DD817EDB7B5AF52344F1492CAD40D66202DB346BC58F09
                    APIs
                      • Part of subcall function 0395407D: GetFileAttributesW.KERNELBASE(03955051,0395447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03953ECC), ref: 0395407E
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03953F5D
                    • FindNextFileW.KERNEL32(03951710,?), ref: 03953FFE
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                    • String ID: %s%s$%s\%s$%s\*
                    • API String ID: 674214967-2064654797
                    • Opcode ID: 95b60926543a8d98a3b0e6996a2a3850f789e1bd387f2236ed4fac16d899a4fd
                    • Instruction ID: c7ea96e5a88601de5e2454bd5f2a20b463a10c8c2d4d0010643e4c7059581374
                    • Opcode Fuzzy Hash: 95b60926543a8d98a3b0e6996a2a3850f789e1bd387f2236ed4fac16d899a4fd
                    • Instruction Fuzzy Hash: 6131CB7AA0131967DB61FE75CC85BBDB7799F81290F080198FC059B290EB358FC68B51
                    APIs
                    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 004854F1
                    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0048551A
                    • GetACP.KERNEL32 ref: 0048552F
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP
                    • API String ID: 2299586839-711371036
                    • Opcode ID: 195e444476fa75061cbd63025edf1ae10e571862c5a29d78c8e68e3a29d06134
                    • Instruction ID: c328b2c685609cb179193bae224ee14464a1a3777e2b3e988418e598dc777c9a
                    • Opcode Fuzzy Hash: 195e444476fa75061cbd63025edf1ae10e571862c5a29d78c8e68e3a29d06134
                    • Instruction Fuzzy Hash: 9821C432600900B6DB30BF54D905BAF73A7AB50F61B668C66E90AC7204F73ADE81C358
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • GetUserDefaultLCID.KERNEL32 ref: 0048573C
                    • IsValidCodePage.KERNEL32(00000000), ref: 0048577A
                    • IsValidLocale.KERNEL32(?,00000001), ref: 0048578D
                    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004857D5
                    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 004857F0
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                    • String ID:
                    • API String ID: 415426439-0
                    • Opcode ID: a67893966eae1d2de3f7b9f9e4586aa92c9bc2b6f5776831f5b1f4dd92859eee
                    • Instruction ID: 836edc9ae6058adca7e5db69423123554c1af0038e430d6b8fa39db203eb3e82
                    • Opcode Fuzzy Hash: a67893966eae1d2de3f7b9f9e4586aa92c9bc2b6f5776831f5b1f4dd92859eee
                    • Instruction Fuzzy Hash: A7516171900A05ABEB10FFA5CC41ABF77B8BF45700F54882BE915E7291EB78D9408B69
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0395410D
                    • FindNextFileW.KERNEL32(000000FF,?), ref: 03954159
                      • Part of subcall function 03953536: GetProcessHeap.KERNEL32(00000000,00000000,0395518A), ref: 0395353D
                      • Part of subcall function 03953536: RtlFreeHeap.NTDLL(00000000), ref: 03953544
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFindHeap$FirstFreeNextProcess
                    • String ID: %s\%s$%s\*
                    • API String ID: 1689202581-2848263008
                    • Opcode ID: 3fcdf23f08f7bfcf0ba462d14c464e2152e7ff45fa315f79ebe77d116405b2db
                    • Instruction ID: 0f428b5d6794f63286cccd8a0af6046c9fdc9fbf712496c4b8fb5cafee2f0972
                    • Opcode Fuzzy Hash: 3fcdf23f08f7bfcf0ba462d14c464e2152e7ff45fa315f79ebe77d116405b2db
                    • Instruction Fuzzy Hash: AB31A8397013149BCB60FF66DCC476F7BA9AF94290F144469FD05DB245EB348AD18B90
                    APIs
                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 0048265E
                    • FindNextFileW.KERNEL32(00000000,?), ref: 00482752
                    • FindClose.KERNEL32(00000000), ref: 00482791
                    • FindClose.KERNEL32(00000000), ref: 004827C4
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Find$CloseFile$FirstNext
                    • String ID:
                    • API String ID: 1164774033-0
                    • Opcode ID: 2c54420701f253c650aec3afff0ef49ba752987d14aed52ec93a33ac5b16e148
                    • Instruction ID: bc65421f7188c35337f25c9fe94ab2f2910445cce9db10abeeeea465b9ca5bd3
                    • Opcode Fuzzy Hash: 2c54420701f253c650aec3afff0ef49ba752987d14aed52ec93a33ac5b16e148
                    • Instruction Fuzzy Hash: F571F471805168AFDF21BF298D9DAFEB7B5AB05304F1449DFE008A7211EB794E819F18
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 004704A1
                    • IsDebuggerPresent.KERNEL32 ref: 0047056D
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00470586
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00470590
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 360f0aaeb1a49f30eb541fcee474fac5ea31356f45aabab0c1d6ea54a418b5dd
                    • Instruction ID: da1defd9bd1fd00da9e2b543be099e7f51171f78a3cb8021c7ead60113d83771
                    • Opcode Fuzzy Hash: 360f0aaeb1a49f30eb541fcee474fac5ea31356f45aabab0c1d6ea54a418b5dd
                    • Instruction Fuzzy Hash: 11310AB5D02218DBDF20DFA5DD497CDBBB8AF08304F1041AAE50DAB250EB759A84CF49
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00485130
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0048517A
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00485240
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: InfoLocale$ErrorLast
                    • String ID:
                    • API String ID: 661929714-0
                    • Opcode ID: 501dde6f5f311c68a4a83992a83a1a2412710e6ef02eb345e59373891694343e
                    • Instruction ID: 4cf740a79ac86468318bd6ba1228ecdc44559b1b7b1da6185c55eb67d4e6be40
                    • Opcode Fuzzy Hash: 501dde6f5f311c68a4a83992a83a1a2412710e6ef02eb345e59373891694343e
                    • Instruction Fuzzy Hash: 7D61A071950A079FDB24BF25CC82BAE77A9EF04304F1049BBED05C6285EB78D991CB58
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0047447B
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00474485
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00474492
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 298bf8fbb7b951143e494168759d62838c62bf4a6d548cbf4ab931aec827d803
                    • Instruction ID: ee43fad1844bc65eb8d567aec9ce1d0197a0399d042e3c5a888b00f8ecc9d81f
                    • Opcode Fuzzy Hash: 298bf8fbb7b951143e494168759d62838c62bf4a6d548cbf4ab931aec827d803
                    • Instruction Fuzzy Hash: 2231C574901218ABCB21DF65D8897DDBBB8BF58310F5085EAE40CA7290E7749F858F49
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00470152
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: 55c189eb67332eddff3c23a359bcf27195e1db5c67b4d873eb2270e70901ffe3
                    • Instruction ID: 788066f97c35117113cdf2e2d0a9f1d4ffed6da1c1d44a679d87a60d310e010b
                    • Opcode Fuzzy Hash: 55c189eb67332eddff3c23a359bcf27195e1db5c67b4d873eb2270e70901ffe3
                    • Instruction Fuzzy Hash: 765156B1902215CFDB15CF64E9857AABBF0FB58300F24847BC909EB351D37899108B98
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00485383
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 881d507d7d230df40268d34fa4a6b6e53138a6fb11ab8af226e8681762aba140
                    • Instruction ID: 5db7866eb23a1e1d0e909146b77c82c7a9d4e08972858abf7a741a0609ce20fe
                    • Opcode Fuzzy Hash: 881d507d7d230df40268d34fa4a6b6e53138a6fb11ab8af226e8681762aba140
                    • Instruction Fuzzy Hash: 9921AF32A11606ABDB28BA25DC42ABF73A8EF44354F10447FFD06D6241EBBCAD41C759
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • EnumSystemLocalesW.KERNEL32(004850DC,00000001), ref: 00485028
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 7eb12468b5ad29772f6e7e97c65d2a786c5d921810de917d9facadeac041e1ba
                    • Instruction ID: 4755928423b14fede6232ed14259bc6267a0c193cc6c082d504c5ab182968070
                    • Opcode Fuzzy Hash: 7eb12468b5ad29772f6e7e97c65d2a786c5d921810de917d9facadeac041e1ba
                    • Instruction Fuzzy Hash: 2D1129362007059FDB18AF39C8916BEBB91FF80358B18482EEA4647740D3756942C744
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004852F8,00000000,00000000,?), ref: 0048558A
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 12ccf39dcc5ce6a09a63a0477b390ab7f58e4cfd31593db358316f99f53cdcb5
                    • Instruction ID: 6556b1c962de0e0a3ee5324fd6a70c3f9878da7aeddc3997e098c980e48f8c01
                    • Opcode Fuzzy Hash: 12ccf39dcc5ce6a09a63a0477b390ab7f58e4cfd31593db358316f99f53cdcb5
                    • Instruction Fuzzy Hash: B8018B326006127BDB28762588457BF77B5DB40754F154C2AED06E3284EA78FE41C799
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • EnumSystemLocalesW.KERNEL32(0048532F,00000001), ref: 0048509B
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 827ddd9e949a0f549813c5e6ab348d2adbb350981ecc4c1ee9a9cb8a45a7ef1d
                    • Instruction ID: 7423b7b462407149cf11d6a7073e0c293914d03dfefd4c8913e82f45c715da23
                    • Opcode Fuzzy Hash: 827ddd9e949a0f549813c5e6ab348d2adbb350981ecc4c1ee9a9cb8a45a7ef1d
                    • Instruction Fuzzy Hash: 49F0C836300B045FDB247F35988167F7B91EB81358B19482EF94587740D6759C428758
                    APIs
                      • Part of subcall function 004749CA: EnterCriticalSection.KERNEL32(-0049B8A8,?,004776D7,00000000,00498C40,0000000C,0047769F,?,?,0047DB90,?,?,0047AA8E,00000001,00000364,00000000), ref: 004749D9
                    • EnumSystemLocalesW.KERNEL32(Function_0006DBBA,00000001,00498E30,0000000C,0047DF92,?), ref: 0047DBFF
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: 99db2d1c5f4cd342a6e4da94c36e4b49891aeee9701c79954034de641ead224d
                    • Instruction ID: 52fa778927f171d1cb15f158bc2fbbe93189f9180c797b0123d72d80dce10dc6
                    • Opcode Fuzzy Hash: 99db2d1c5f4cd342a6e4da94c36e4b49891aeee9701c79954034de641ead224d
                    • Instruction Fuzzy Hash: FAF03C72A10204DFDB00DF99E902B9D77F0EB05724F10812FE508DB2A1CBB95900CB89
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • EnumSystemLocalesW.KERNEL32(00484EC4,00000001), ref: 00484FA2
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 793722041230634931d2a141c87fca427cfdd8cff9a0ac727e0abdf1f4fa9c71
                    • Instruction ID: 306660600b13c8f13fcfccda075c9f7f4e6dab0aba19d7bc8040b5a6f5b36907
                    • Opcode Fuzzy Hash: 793722041230634931d2a141c87fca427cfdd8cff9a0ac727e0abdf1f4fa9c71
                    • Instruction Fuzzy Hash: 06F0A0367002465BCB04AB39D8456AFBBA4EBC2764B0A445EEB098B691C6799883C794
                    APIs
                      • Part of subcall function 0047A8F0: GetLastError.KERNEL32(?,?,004771B7,?,?,?,?,00000003,00474382,?,004742F1,?,00000000,00474500), ref: 0047A8F4
                      • Part of subcall function 0047A8F0: SetLastError.KERNEL32(00000000,00000000,00474500,?,?,?,?,?,00000000,?,?,0047459E,00000000,00000000,00000000,00000000), ref: 0047A996
                    • EnumSystemLocalesW.KERNEL32(00484EC4,00000001), ref: 00484FA2
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 871f08daedc46166d2da3ebb35ffc5a7e4a1cf8ac4ef1119ee25b467ac2ca2bc
                    • Instruction ID: 18d14b3181466d8190292f8e29f7d1f9c94749743e96c06731e6b84fc9ae0fee
                    • Opcode Fuzzy Hash: 871f08daedc46166d2da3ebb35ffc5a7e4a1cf8ac4ef1119ee25b467ac2ca2bc
                    • Instruction Fuzzy Hash: 7EF0A0367002465BCB04AB39D84566EBBA4EBC2764B0A445EEB098B691C6799882C794
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00479527,?,20001004,00000000,00000002,?,?,00478B19), ref: 0047E0CA
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: 16d6774d1ddde4341cb6725055bd3c2e060c00429a272e3260717244e743d9d6
                    • Instruction ID: 705fe36d1542a3223d8d739fb7419768e264c0c0709682adfd9700d16ee3597c
                    • Opcode Fuzzy Hash: 16d6774d1ddde4341cb6725055bd3c2e060c00429a272e3260717244e743d9d6
                    • Instruction Fuzzy Hash: 4AE01231500528BBCB122F52DC04BEE3A2ABF48750F088565FC095616187759D21AB99
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0006062E,0046FC56), ref: 00470627
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 87fa6c8aee0b489d31b7121b7451d4153ece7bfe87199301d49fc11b19adc084
                    • Instruction ID: 44f9a063a879bd8fc0046739993e6ba3e2f7fe0041c93310b9f0384b55ddc5a7
                    • Opcode Fuzzy Hash: 87fa6c8aee0b489d31b7121b7451d4153ece7bfe87199301d49fc11b19adc084
                    • Instruction Fuzzy Hash:
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: 68f87f8d334c5e905afab591e7469407b9912c534e62e609321906039cae3375
                    • Instruction ID: d644f07c2dc0befb5fdd6712135e43718710a7b8fdcb06ea8eb78abdc8dc92a4
                    • Opcode Fuzzy Hash: 68f87f8d334c5e905afab591e7469407b9912c534e62e609321906039cae3375
                    • Instruction Fuzzy Hash: D0A01230101101CB53004F346F0C20C37E4A544A80B04407D5401C1020D72444009B04
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03954574), ref: 03954305
                    • GetProcAddress.KERNEL32(00000000), ref: 0395430E
                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03954574), ref: 0395431F
                    • GetProcAddress.KERNEL32(00000000), ref: 03954322
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03954574), ref: 039543A4
                    • GetCurrentProcess.KERNEL32(03954574,00000000,00000000,00000002,?,?,?,?,03954574), ref: 039543C0
                    • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03954574), ref: 039543CF
                    • CloseHandle.KERNEL32(03954574,?,?,?,?,03954574), ref: 039543FF
                    • GetCurrentProcess.KERNEL32(03954574,00000000,00000000,00000001,?,?,?,?,03954574), ref: 0395440D
                    • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03954574), ref: 0395441C
                    • CloseHandle.KERNEL32(?,?,?,?,?,03954574), ref: 0395442F
                    • CloseHandle.KERNEL32(000000FF), ref: 03954452
                    • CloseHandle.KERNEL32(?), ref: 0395445A
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                    • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                    • API String ID: 3110323036-2044536123
                    • Opcode ID: 2b3d5d5128817a858a9871de7c3a5b22bc6f71056573a8d8e038c3d28ef47ec4
                    • Instruction ID: 9454fa3ff7a3231261eab2ac0c115fc3cfc02c571b9d8f1459df0c99070cdbde
                    • Opcode Fuzzy Hash: 2b3d5d5128817a858a9871de7c3a5b22bc6f71056573a8d8e038c3d28ef47ec4
                    • Instruction Fuzzy Hash: B0415E72A00219ABDB10EFF69C44AAEBBBDEF84651F144165F914E7190DB70DAC1CBA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                    • String ID: bad locale name
                    • API String ID: 3904239083-1405518554
                    • Opcode ID: 026880d7f96d3ce1bb1fbf41e5ab7694da4cfef7a73ccd43ad9386cfd3e10b78
                    • Instruction ID: 75e20d8c63b17647abae357ab1e29e4eba93b4abe4c3e6e6d4173dc4d712457e
                    • Opcode Fuzzy Hash: 026880d7f96d3ce1bb1fbf41e5ab7694da4cfef7a73ccd43ad9386cfd3e10b78
                    • Instruction Fuzzy Hash: 5A2181B0904149EBCF04EF98C951BFEBB71AF44308F14455DE01667382CBB81A50D7AA
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: __aulldvrm
                    • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                    • API String ID: 1302938615-1267642376
                    • Opcode ID: 5bb8c21de022740f5871df14db7b1a143e6a4e668ea9ac1ea884507fea03e9e9
                    • Instruction ID: 4d5eba79ef91d7b8cbc39ebb6f13b24fd48ec536760d057789cf251a79d01820
                    • Opcode Fuzzy Hash: 5bb8c21de022740f5871df14db7b1a143e6a4e668ea9ac1ea884507fea03e9e9
                    • Instruction Fuzzy Hash: 799148716043028FDB25CF28C49062ABBE9EF86284F184D6EF8DA87651D770E9C1CB51
                    APIs
                    • type_info::operator==.LIBVCRUNTIME ref: 00473400
                    • ___TypeMatch.LIBVCRUNTIME ref: 0047350E
                    • _UnwindNestedFrames.LIBCMT ref: 00473660
                    • CallUnexpected.LIBVCRUNTIME ref: 0047367B
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 2751267872-393685449
                    • Opcode ID: 661dddeef09355813e76546428a4ae4017600f3f0a25bcd448ffa89fa24b9e0f
                    • Instruction ID: 594272ee1172a77ef641ecf908ffdd10e3997e93ad97c934bdbba14869f91888
                    • Opcode Fuzzy Hash: 661dddeef09355813e76546428a4ae4017600f3f0a25bcd448ffa89fa24b9e0f
                    • Instruction Fuzzy Hash: 26B18D71800219EFCF29DFA5C9819EEB7B5BF04316B14845BE8096B302C739DA51EF99
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3907804496
                    • Opcode ID: 059c90a9e84794fa49459e3410e279f5d4aa440fb9797e25589bef726ec7105d
                    • Instruction ID: 5844bab7e9b6bf6f15cf8038e59f8ac3ec6747c6f676016afabb3affe5a88fd7
                    • Opcode Fuzzy Hash: 059c90a9e84794fa49459e3410e279f5d4aa440fb9797e25589bef726ec7105d
                    • Instruction Fuzzy Hash: B7B12970E04204AFDB11EF59C881BAE7BB9AF85304F18455BE9059B3A1C7789D43CB59
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00472DE7
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00472DEF
                    • _ValidateLocalCookies.LIBCMT ref: 00472E78
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00472EA3
                    • _ValidateLocalCookies.LIBCMT ref: 00472EF8
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: csm
                    • API String ID: 1170836740-1018135373
                    • Opcode ID: f2591262341e6fa7f079956474b4a816a9c4a581ed3df17dd74d091f88364083
                    • Instruction ID: e258489bdbfa705df61cbea83f2717504843d8af0dd53988e014f0d09dae312b
                    • Opcode Fuzzy Hash: f2591262341e6fa7f079956474b4a816a9c4a581ed3df17dd74d091f88364083
                    • Instruction Fuzzy Hash: 07419130A002099BCF10DF69C884ADEBBB5AF05318F14C16BE8186B392D7799E15CB99
                    APIs
                    • GetUserDefaultUILanguage.KERNEL32 ref: 03951F90
                    • GetKeyboardLayoutList.USER32(00000032,?), ref: 03951FF2
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: DefaultKeyboardLanguageLayoutListUser
                    • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                    • API String ID: 167087913-619012376
                    • Opcode ID: 74126a76061f1547a809cc550d7df12871171f8437605a7c5a33882f03488d5c
                    • Instruction ID: 0af6b3d6d726f4c252c15698447be48c45241bb5a0a7a98e2287959433972537
                    • Opcode Fuzzy Hash: 74126a76061f1547a809cc550d7df12871171f8437605a7c5a33882f03488d5c
                    • Instruction Fuzzy Hash: 6C319F54E08298AAEB01DFE4A4017FDBB70EF14306F405496FD88FA282D7794B85C76A
                    APIs
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,9607EDD9,?,0047DEA3,00000000,004113A5,00000000,00000000), ref: 0047DE55
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3664257935-537541572
                    • Opcode ID: 5d0e6721aab2d0f45f5189af249af6e5e8a74cbf16f35a6680310948fe4ec43f
                    • Instruction ID: 8de4bf09fe62b31c1185bdbc29f171de0d79ab71a4f5754b6ddfd5286f75df3f
                    • Opcode Fuzzy Hash: 5d0e6721aab2d0f45f5189af249af6e5e8a74cbf16f35a6680310948fe4ec43f
                    • Instruction Fuzzy Hash: 5221C971E10A11ABC7225B61AC44BAF3778DF517A0F244526E94EAB390D734ED01C6ED
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0046E51D
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0046E527
                    • int.LIBCPMTD ref: 0046E53E
                      • Part of subcall function 004146D0: std::_Lockit::_Lockit.LIBCPMT ref: 004146E6
                      • Part of subcall function 004146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00414710
                    • codecvt.LIBCPMT ref: 0046E561
                    • std::_Facet_Register.LIBCPMT ref: 0046E578
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0046E598
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 0046E5A5
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                    • String ID:
                    • API String ID: 2133458128-0
                    • Opcode ID: 103825855056518a134c3a7e72f86ecf2dcd1c5459e6c2f927cb62301c60e53e
                    • Instruction ID: 52480ff473313ff9cde4287f5e5147d95920808cabaed4784d9a6a5cb4077ea0
                    • Opcode Fuzzy Hash: 103825855056518a134c3a7e72f86ecf2dcd1c5459e6c2f927cb62301c60e53e
                    • Instruction Fuzzy Hash: 7B11D5B5900214ABCB10AFA5E8457AE77B5FF84729F10441FF40597281EFBCAE0187D9
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0046D7AF
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0046D7B9
                    • int.LIBCPMTD ref: 0046D7D0
                      • Part of subcall function 004146D0: std::_Lockit::_Lockit.LIBCPMT ref: 004146E6
                      • Part of subcall function 004146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00414710
                    • codecvt.LIBCPMT ref: 0046D7F3
                    • std::_Facet_Register.LIBCPMT ref: 0046D80A
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0046D82A
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 0046D837
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                    • String ID:
                    • API String ID: 2133458128-0
                    • Opcode ID: 73287bc912e6986e6db37a2e5b658c9959d7512d4996db14ead2bd82a64c2f8e
                    • Instruction ID: 180817f8d179c51c0ec414f086016064b0c177e92d9b3b97c49c92dfae9d2628
                    • Opcode Fuzzy Hash: 73287bc912e6986e6db37a2e5b658c9959d7512d4996db14ead2bd82a64c2f8e
                    • Instruction Fuzzy Hash: 2E01C075E001199BCB00EBA1E9496BEB772EF84728F54401FE4116B281EFBC9E01C7CA
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0046F927
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0046F992
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0046F9AF
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0046F9EE
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0046FA4D
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0046FA70
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ByteCharMultiStringWide
                    • String ID:
                    • API String ID: 2829165498-0
                    • Opcode ID: b69d576baffa9a01bafaa0b80842e1071700cb5e4c52a816b908db21ad68210f
                    • Instruction ID: 1c43236d9e51f06a91bd7aa852c3c04355a400c211de5e6647efae04ed5fb9dc
                    • Opcode Fuzzy Hash: b69d576baffa9a01bafaa0b80842e1071700cb5e4c52a816b908db21ad68210f
                    • Instruction Fuzzy Hash: 0E51B07250020AFBDF209FA4EC45FAF7BA9EB44740F14453AF959E6250E7788C18CB5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: x
                    • API String ID: 0-2363233923
                    • Opcode ID: dcc93f5783802aa8e0e0c0cdd65dad41de959ffbbb41cf6315bc881eb6a1d39f
                    • Instruction ID: 7e5bd16dce1fc7c304a009cd080db5c405208dbe7202759bcfdfe20e05d089ac
                    • Opcode Fuzzy Hash: dcc93f5783802aa8e0e0c0cdd65dad41de959ffbbb41cf6315bc881eb6a1d39f
                    • Instruction Fuzzy Hash: BE02AE79E04249EFCB45CFA8C984AADB7F4FF09345F048856E866EB250D730AA91CF51
                    APIs
                    • GetLastError.KERNEL32(?,?,00472FA1,004716DC,00470672), ref: 00472FB8
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00472FC6
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00472FDF
                    • SetLastError.KERNEL32(00000000,00472FA1,004716DC,00470672), ref: 00473031
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 98e07a4f9d36eccd3a70ecbd8ea946c3f0a8ecd53a7c9a7d0bcd7f165ee2c217
                    • Instruction ID: 9b77aee9b13213faedc333fb027204a5c9b4fe5b95803148ffccc3fd0cf7700a
                    • Opcode Fuzzy Hash: 98e07a4f9d36eccd3a70ecbd8ea946c3f0a8ecd53a7c9a7d0bcd7f165ee2c217
                    • Instruction Fuzzy Hash: 860168321093615E9A242E727D857FF2754EBA1775320833FF108911E0EF5A4C24728F
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,9607EDD9,?,?,00000000,00488AEC,000000FF,?,004780A8,?,?,0047807C,00000000), ref: 00478101
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00478113
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00488AEC,000000FF,?,004780A8,?,?,0047807C,00000000), ref: 00478135
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: ac743635c333c1058db8214a9ce0a556108986499f1610bfbd61018af399384a
                    • Instruction ID: ca4174a5a40c5a223b261f0904c2692fc31e4929344c09e4f5c52809a75d1e05
                    • Opcode Fuzzy Hash: ac743635c333c1058db8214a9ce0a556108986499f1610bfbd61018af399384a
                    • Instruction Fuzzy Hash: AB016271A54625EFDB119F54CC09BBFBBB9FB09B10F04493EE811A2290DB789D00CB99
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411E40
                    • int.LIBCPMTD ref: 00411E59
                      • Part of subcall function 004146D0: std::_Lockit::_Lockit.LIBCPMT ref: 004146E6
                      • Part of subcall function 004146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00414710
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00411E99
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00411F01
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                    • String ID:
                    • API String ID: 3053331623-0
                    • Opcode ID: 16930e237bbf49c57da423363322525a2ab0f601377113db919e87101bb1297f
                    • Instruction ID: 8769363958b04f38220e8c0047b2731f56b630ec3add5082241e71272d66e3c7
                    • Opcode Fuzzy Hash: 16930e237bbf49c57da423363322525a2ab0f601377113db919e87101bb1297f
                    • Instruction Fuzzy Hash: 0A312EB1D00209DBCB04DF95D992BEEBBB0BF58314F20421EE91567391DB386A44CBA5
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411F40
                    • int.LIBCPMTD ref: 00411F59
                      • Part of subcall function 004146D0: std::_Lockit::_Lockit.LIBCPMT ref: 004146E6
                      • Part of subcall function 004146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00414710
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00411F99
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00412001
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                    • String ID:
                    • API String ID: 3053331623-0
                    • Opcode ID: 8d7c42be87220d1a97298f9aa8c813633bac0b0fd7025289ccf9accec9be4e3d
                    • Instruction ID: 288552f106c738426f51c0aa659fa6798fc41ed13d15b0b7193628ebed62f3ce
                    • Opcode Fuzzy Hash: 8d7c42be87220d1a97298f9aa8c813633bac0b0fd7025289ccf9accec9be4e3d
                    • Instruction Fuzzy Hash: 3E314BB1D00209DBCB04EF94D981BEEBBB0BF58314F20422EE51167391DB386A41CBA5
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0046CE44
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0046CE4F
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0046CEBD
                      • Part of subcall function 0046CFA0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0046CFB8
                    • std::locale::_Setgloballocale.LIBCPMT ref: 0046CE6A
                    • _Yarn.LIBCPMT ref: 0046CE80
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                    • String ID:
                    • API String ID: 1088826258-0
                    • Opcode ID: 9197ca1652837b91148d7b731152f193f909e0c70dc273ce560a08482ea50cbc
                    • Instruction ID: d8f719703042572b6bc7d40b3f772a9ec5ba92bbbdc72c685ca9ea4cc255028a
                    • Opcode Fuzzy Hash: 9197ca1652837b91148d7b731152f193f909e0c70dc273ce560a08482ea50cbc
                    • Instruction Fuzzy Hash: AD01B1756005109BC709AF61E89657D7762FF84754B14402FE44217381DF7C6E02CBCE
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00474023,00000000,?,0049B824,?,?,?,004741C6,00000004,InitializeCriticalSectionEx,0048B270,InitializeCriticalSectionEx), ref: 0047407F
                    • GetLastError.KERNEL32(?,00474023,00000000,?,0049B824,?,?,?,004741C6,00000004,InitializeCriticalSectionEx,0048B270,InitializeCriticalSectionEx,00000000,?,00473F7D), ref: 00474089
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 004740B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID: api-ms-
                    • API String ID: 3177248105-2084034818
                    • Opcode ID: 94d7acc77117e6dcd8540ee0d8cf349312901af18e362b0b2c39733792a4e014
                    • Instruction ID: 5c20582a2eb6532d117d6cb222dc5df849b3ca0938c3a6aebda26316b18b1ae4
                    • Opcode Fuzzy Hash: 94d7acc77117e6dcd8540ee0d8cf349312901af18e362b0b2c39733792a4e014
                    • Instruction Fuzzy Hash: FDE01230680204BBDF202B61EC06BBD3A949B41B55F148435FE0CE41A1D76698909ADD
                    APIs
                    • GetConsoleOutputCP.KERNEL32(9607EDD9,00000000,00000000,00000000), ref: 0047F4FA
                      • Part of subcall function 00481EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0047EF8D,?,00000000,-00000008), ref: 00481F1E
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0047F74C
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0047F792
                    • GetLastError.KERNEL32 ref: 0047F835
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                    • String ID:
                    • API String ID: 2112829910-0
                    • Opcode ID: 76e67ad7979e8a235b8d86c708b861e14bd0e261f8e4e8513d86cd2ac25c27f8
                    • Instruction ID: a2bdc56c605d942804cc56f0bdc425376e39f759ae2c1c357a2c6658aeeb204e
                    • Opcode Fuzzy Hash: 76e67ad7979e8a235b8d86c708b861e14bd0e261f8e4e8513d86cd2ac25c27f8
                    • Instruction Fuzzy Hash: B7D19C75D002489FCF15CFA8D880AEDBBB5FF49304F28852AE81AEB351D734A946CB55
                    APIs
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: 9a0c385123d8e0c249307e4b63fd73342b16d1222b8ade4690316b03b294b22c
                    • Instruction ID: ec12e4a9a6f81bc88b92253531d2b741a4cac213db08c183dd61ba520e6e466f
                    • Opcode Fuzzy Hash: 9a0c385123d8e0c249307e4b63fd73342b16d1222b8ade4690316b03b294b22c
                    • Instruction Fuzzy Hash: B85114716002469FDB288F15D841BEB77A4EF00706F54C46FE84A87391D739EE45E798
                    APIs
                      • Part of subcall function 00481EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0047EF8D,?,00000000,-00000008), ref: 00481F1E
                    • GetLastError.KERNEL32 ref: 004822DE
                    • __dosmaperr.LIBCMT ref: 004822E5
                    • GetLastError.KERNEL32(?,?,?,?), ref: 0048231F
                    • __dosmaperr.LIBCMT ref: 00482326
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                    • String ID:
                    • API String ID: 1913693674-0
                    • Opcode ID: b342287bf9e2210596cc0f313994dcfdfeb04ecc89eb1a410d0f535e9190ed1d
                    • Instruction ID: 43208dd0e59288a8b128554d63dde6c96aa9c1b8cffb0cdf9893e690ebbfaacb
                    • Opcode Fuzzy Hash: b342287bf9e2210596cc0f313994dcfdfeb04ecc89eb1a410d0f535e9190ed1d
                    • Instruction Fuzzy Hash: 5A21CF31600605AFDB20BF669D8086FB7A9EF043683108D1EFC1997250D7BCED0187A9
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cb26da7c15ada9a045f06d1c8eb42e2e6722c69c09a0db9f5b1e82da7c65e41b
                    • Instruction ID: 7fb9729ca6e4b2f3a9b9de3498ce274e0a13fb39bc50889710d6305787b194df
                    • Opcode Fuzzy Hash: cb26da7c15ada9a045f06d1c8eb42e2e6722c69c09a0db9f5b1e82da7c65e41b
                    • Instruction Fuzzy Hash: 8A219571608605BFDB20AF769C409AB7B69EF4036C790CA1EF81CD7661D778ED0187A8
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 00483226
                      • Part of subcall function 00481EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0047EF8D,?,00000000,-00000008), ref: 00481F1E
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048325E
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048327E
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                    • String ID:
                    • API String ID: 158306478-0
                    • Opcode ID: d8280f83420597458defda4889b6d35099f4996f7c39650d7aa1f37bed0a1214
                    • Instruction ID: 29afb03e05700aebeeb3f6cd19c80ed43324a92f4526ebd14c54a2c8a9ab1934
                    • Opcode Fuzzy Hash: d8280f83420597458defda4889b6d35099f4996f7c39650d7aa1f37bed0a1214
                    • Instruction Fuzzy Hash: F21104B15055157FA7113BB69CCECBF29ACDE88BA93100CAAF90291100EB2C9E01837E
                    APIs
                    • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00486B6B,00000000,00000001,0000000C,00000000,?,0047F889,00000000,00000000,00000000), ref: 00487C52
                    • GetLastError.KERNEL32(?,00486B6B,00000000,00000001,0000000C,00000000,?,0047F889,00000000,00000000,00000000,00000000,00000000,?,0047FE2C,?), ref: 00487C5E
                      • Part of subcall function 00487C24: CloseHandle.KERNEL32(FFFFFFFE,00487C6E,?,00486B6B,00000000,00000001,0000000C,00000000,?,0047F889,00000000,00000000,00000000,00000000,00000000), ref: 00487C34
                    • ___initconout.LIBCMT ref: 00487C6E
                      • Part of subcall function 00487BE6: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00487C15,00486B58,00000000,?,0047F889,00000000,00000000,00000000,00000000), ref: 00487BF9
                    • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,00486B6B,00000000,00000001,0000000C,00000000,?,0047F889,00000000,00000000,00000000,00000000), ref: 00487C83
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 8ce9f678de38f62070dd1550fbb3888052d37d1588dddc170d0b58a58cc48020
                    • Instruction ID: 6279abb07ae0b86e924936f89278fc29b53a68f7ff62d286b783d29831d190fb
                    • Opcode Fuzzy Hash: 8ce9f678de38f62070dd1550fbb3888052d37d1588dddc170d0b58a58cc48020
                    • Instruction Fuzzy Hash: 3BF01C36504519BBDF222FD5DC0899E3F36EB493A4F194865FA0996220C636DC20EBD9
                    APIs
                      • Part of subcall function 03953508: EnterCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 03953512
                      • Part of subcall function 03953508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,039551B7), ref: 0395351B
                      • Part of subcall function 03953508: RtlAllocateHeap.NTDLL(00000000,?,?,039551B7), ref: 03953522
                      • Part of subcall function 03953508: LeaveCriticalSection.KERNEL32(039584D4,?,?,039551B7), ref: 0395352B
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 03952E3D
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3040838981.0000000003950000.00000040.00001000.00020000.00000000.sdmp, Offset: 03950000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_3950000_500D.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                    • String ID: x
                    • API String ID: 1990697408-2363233923
                    • Opcode ID: 4429037775c130750e19bc7accdae5069382771ea48f4bad6c28748f10561ba3
                    • Instruction ID: 36a47cc24211c8f39a65a28ee7b6f254a063000e38f5afc28180e37859258a46
                    • Opcode Fuzzy Hash: 4429037775c130750e19bc7accdae5069382771ea48f4bad6c28748f10561ba3
                    • Instruction Fuzzy Hash: 4902AD75A04249EFCF01CFA8D984AAEBBF4BB09340F148895F895EB350D734AA81CF51
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 0047BC8D
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: df384f03bc1edf6b35f38c6d9a8bbe95df73dc2499ef04532399124a940b5621
                    • Instruction ID: 7d22e1dbbe2e34aa8cf42bbacf10e4c80ab67f79273c810ed664191c99d03890
                    • Opcode Fuzzy Hash: df384f03bc1edf6b35f38c6d9a8bbe95df73dc2499ef04532399124a940b5621
                    • Instruction Fuzzy Hash: 905117619045019ECB237718D9813EF2B94DB40740F20CD6FE48E963A9EF3D8C959B8E
                    APIs
                    • EncodePointer.KERNEL32(00000000,?), ref: 004736AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000009.00000002.3026239568.0000000000411000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00410000, based on PE: true
                    • Associated: 00000009.00000002.3025939008.0000000000410000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027026601.0000000000489000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027476952.000000000049A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027666307.000000000049B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 00000009.00000002.3027873549.000000000049C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_9_2_410000_500D.jbxd
                    Similarity
                    • API ID: EncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 2118026453-2084237596
                    • Opcode ID: 49cf1443a12ed3ef87c73284bd0840e11ae5e026055b889433eba77e7786bee7
                    • Instruction ID: 236ffa0d57e94cfa0f2ad436a648b82389ebdeb9f806e47c605c2d79d10b3f9a
                    • Opcode Fuzzy Hash: 49cf1443a12ed3ef87c73284bd0840e11ae5e026055b889433eba77e7786bee7
                    • Instruction Fuzzy Hash: D7414BB1900209AFCF15DF98CD81AEEBBB5BF48305F14C19AF90867211D3399A50EF59