Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EiPVv5yELP.exe

Overview

General Information

Sample name:EiPVv5yELP.exe
renamed because original name is a hash value
Original sample name:7904c33d58c3e399bf5bc6e9c1d67bcb.exe
Analysis ID:1466593
MD5:7904c33d58c3e399bf5bc6e9c1d67bcb
SHA1:90beefb222c7aeb95d521c0c323c4aea823101aa
SHA256:d6d251f8dc5e403b7b00d5de2831e411e91dccf2a1ebdec794a9ca6210f90487
Tags:exe
Infos:

Detection

LummaC, Poverty Stealer, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected LummaC Stealer
Yara detected Poverty Stealer
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • EiPVv5yELP.exe (PID: 5484 cmdline: "C:\Users\user\Desktop\EiPVv5yELP.exe" MD5: 7904C33D58C3E399BF5BC6E9C1D67BCB)
    • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 2499.exe (PID: 2616 cmdline: C:\Users\user\AppData\Local\Temp\2499.exe MD5: BD2EAC64CBDED877608468D86786594A)
      • 45DE.exe (PID: 1136 cmdline: C:\Users\user\AppData\Local\Temp\45DE.exe MD5: 60172CA946DE57C3529E9F05CC502870)
        • setup.exe (PID: 6032 cmdline: "C:\Users\user\AppData\Local\Temp\setup.exe" MD5: FF2293FBFF53F4BD2BFF91780FABFD60)
          • GamePall.exe (PID: 5656 cmdline: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 5040 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 4800 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 1616 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 4920 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 1484 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5672 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 4060 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 1132 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6252 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6124 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 4204 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 420 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5668 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 3756 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 5448 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 1944 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 3804 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 7148 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 4200 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 2060 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 5952 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
      • 62FC.exe (PID: 1780 cmdline: C:\Users\user\AppData\Local\Temp\62FC.exe MD5: DA4B6F39FC024D2383D4BFE7F67F1EE1)
      • GamePall.exe (PID: 616 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
  • whhsvcw (PID: 3500 cmdline: C:\Users\user\AppData\Roaming\whhsvcw MD5: 7904C33D58C3E399BF5BC6E9C1D67BCB)
  • whhsvcw (PID: 2636 cmdline: C:\Users\user\AppData\Roaming\whhsvcw MD5: 7904C33D58C3E399BF5BC6E9C1D67BCB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "potterryisiw.shop"], "Build id": "bOKHNM--"}
{"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
{"C2 url": "146.70.169.164:2227"}
SourceRuleDescriptionAuthorStrings
00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x37a0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x30e8:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
      00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmpWindows_Trojan_Smokeloader_4e31426eunknownunknown
      • 0x234:$a: 5B 81 EB 34 10 00 00 6A 30 58 64 8B 00 8B 40 0C 8B 40 1C 8B 40 08 89 85 C0
      Click to see the 15 entries
      SourceRuleDescriptionAuthorStrings
      11.2.62FC.exe.979a60.2.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
        11.2.62FC.exe.3240000.3.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
          11.2.62FC.exe.3240000.3.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            11.2.62FC.exe.972340.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              11.2.62FC.exe.979a60.2.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                Click to see the 1 entries

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\setup.exe, ProcessId: 6032, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePall
                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\whhsvcw, CommandLine: C:\Users\user\AppData\Roaming\whhsvcw, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\whhsvcw, NewProcessName: C:\Users\user\AppData\Roaming\whhsvcw, OriginalFileName: C:\Users\user\AppData\Roaming\whhsvcw, ParentCommandLine: , ParentImage: , ParentProcessId: 5672, ProcessCommandLine: C:\Users\user\AppData\Roaming\whhsvcw, ProcessId: 3500, ProcessName: whhsvcw
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: EiPVv5yELP.exeAvira: detected
                Source: https://foodypannyjsud.shop/api.Avira URL Cloud: Label: malware
                Source: https://foodypannyjsud.shop/sAvira URL Cloud: Label: malware
                Source: http://gebeus.ru/tmp/index.phpAvira URL Cloud: Label: malware
                Source: https://foodypannyjsud.shop/aAvira URL Cloud: Label: malware
                Source: https://foodypannyjsud.shop/QAvira URL Cloud: Label: malware
                Source: http://cx5519.com/tmp/index.phpAvira URL Cloud: Label: malware
                Source: contintnetksows.shopAvira URL Cloud: Label: malware
                Source: http://evilos.cc/tmp/index.phpAvira URL Cloud: Label: malware
                Source: ellaboratepwsz.xyzAvira URL Cloud: Label: malware
                Source: swellfrrgwwos.xyzAvira URL Cloud: Label: malware
                Source: https://foodypannyjsud.shop/)Avira URL Cloud: Label: malware
                Source: https://foodypannyjsud.shop/apigAvira URL Cloud: Label: malware
                Source: foodypannyjsud.shopAvira URL Cloud: Label: malware
                Source: pedestriankodwu.xyzAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].datAvira: detection malicious, Label: HEUR/AGEN.1359405
                Source: C:\Users\user\AppData\Local\Temp\setup.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAvira: detection malicious, Label: HEUR/AGEN.1313486
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeAvira: detection malicious, Label: HEUR/AGEN.1352426
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                Source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
                Source: 11.2.62FC.exe.979a60.2.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "146.70.169.164:2227"}
                Source: 2499.exe.2616.8.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "potterryisiw.shop"], "Build id": "bOKHNM--"}
                Source: C:\Users\user\AppData\Local\Temp\2499.exeReversingLabs: Detection: 50%
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeReversingLabs: Detection: 20%
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeReversingLabs: Detection: 16%
                Source: C:\Users\user\AppData\Roaming\whhsvcwReversingLabs: Detection: 60%
                Source: EiPVv5yELP.exeVirustotal: Detection: 41%Perma Link
                Source: EiPVv5yELP.exeReversingLabs: Detection: 60%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Temp\2499.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\GamePall\Del.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeJoe Sandbox ML: detected
                Source: EiPVv5yELP.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03241C94 CryptUnprotectData,CryptProtectData,11_2_03241C94

                Compliance

                barindex
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeUnpacked PE file: 11.2.62FC.exe.3240000.3.unpack
                Source: EiPVv5yELP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256f source: nsv9958.tmp.14.dr
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: WINLOA~1.PDBwinload_prod.pdbP2Ks& source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: h:\work\newContent\secondBranch\DeleteProgram\DeleteProgram\obj\Release\KlMain.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: ntkrnlmp.pdbx source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000F.00000000.3812506612.0000000000772000.00000002.00000001.01000000.00000010.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000011.00000002.3962952101.0000000005A52000.00000002.00000001.01000000.00000013.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp
                Source: Binary string: ntkrnlmp.pdbR6Mo( source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D3DCompiler_43.pdb` source: d3dcompiler_43.dll.14.dr
                Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000E.00000002.3964292603.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\** source: 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb$# source: nsv9958.tmp.14.dr
                Source: Binary string: D3DCompiler_43.pdb source: d3dcompiler_43.dll.14.dr
                Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: WINLOA~1.PDBwinload_prod.pdbM4Nm) source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000011.00000002.3962952101.0000000005A52000.00000002.00000001.01000000.00000013.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831a source: 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp
                Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 62FC.exe, 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmp, 62FC.exe, 0000000B.00000000.2713431295.0000000000289000.00000002.00000001.01000000.0000000C.sdmp
                Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000E.00000002.3964292603.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exewall.dlldll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exealldll source: setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 62FC.exe, 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmp, 62FC.exe, 0000000B.00000000.2713431295.0000000000289000.00000002.00000001.01000000.0000000C.sdmp
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1294
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_00405B4A
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004066FF FindFirstFileA,FindClose,10_2_004066FF
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004027AA FindFirstFileA,10_2_004027AA
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_002824BD FindFirstFileExW,11_2_002824BD
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03241000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,11_2_03241000
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03244E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,11_2_03244E27
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03241D3C FindFirstFileW,FindNextFileW,11_2_03241D3C
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_032440BA FindFirstFileW,FindNextFileW,11_2_032440BA
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03243EFC FindFirstFileW,FindNextFileW,11_2_03243EFC
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior

                Networking

                barindex
                Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.126 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 185.68.16.7 443Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 186.101.193.110 80Jump to behavior
                Source: Malware configuration extractorURLs: pedestriankodwu.xyz
                Source: Malware configuration extractorURLs: towerxxuytwi.xyz
                Source: Malware configuration extractorURLs: ellaboratepwsz.xyz
                Source: Malware configuration extractorURLs: penetratedpoopp.xyz
                Source: Malware configuration extractorURLs: swellfrrgwwos.xyz
                Source: Malware configuration extractorURLs: contintnetksows.shop
                Source: Malware configuration extractorURLs: foodypannyjsud.shop
                Source: Malware configuration extractorURLs: potterryisiw.shop
                Source: Malware configuration extractorURLs: potterryisiw.shop
                Source: Malware configuration extractorURLs: http://evilos.cc/tmp/index.php
                Source: Malware configuration extractorURLs: http://gebeus.ru/tmp/index.php
                Source: Malware configuration extractorURLs: http://office-techs.biz/tmp/index.php
                Source: Malware configuration extractorURLs: http://cx5519.com/tmp/index.php
                Source: Malware configuration extractorURLs: 146.70.169.164:2227
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 141.8.192.126 141.8.192.126
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: TelconetSAEC TelconetSAEC
                Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00215B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,InternetCloseHandle,FreeLibrary,task,11_2_00215B80
                Source: GamePall.exe, 00000025.00000002.4299577434.0000000002FB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activity
                Source: GamePall.exe, 0000001C.00000002.4413242825.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 00000020.00000002.4472949813.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 00000021.00000002.4425678976.0000000002FA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activitye
                Source: GamePall.exe, 00000025.00000002.4299577434.0000000002FB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/installs
                Source: GamePall.exe, 00000025.00000002.4299577434.0000000002FB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bageyou.xyz
                Source: GamePall.exe, 0000000F.00000002.4201869459.0000000002CB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bageyou.xyz/c/g
                Source: GamePall.exe, 0000000F.00000002.4201869459.0000000002CB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bageyou.xyz/c/g4
                Source: nsv9958.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: explorer.exe, 00000002.00000000.2261967756.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/275944
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/378067
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/437891.
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/456214
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/497301
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/510270
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/514696
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/642141
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/672186).
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/717501
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/775961
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/819404
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/839189
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/932466
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crbug.com/957772
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: explorer.exe, 00000002.00000000.2261967756.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: explorer.exe, 00000002.00000000.2261967756.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
                Source: nsv9958.tmp.14.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: nsv9958.tmp.14.drString found in binary or memory: http://james.newtonking.com/projects/json
                Source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
                Source: 45DE.exe, 45DE.exe, 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 45DE.exe, 0000000A.00000000.2651884486.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000E.00000000.3511852437.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000003.3812625540.0000000000639000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
                Source: 45DE.exe, 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 45DE.exe, 0000000A.00000000.2651884486.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000E.00000000.3511852437.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000003.3812625540.0000000000639000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: explorer.exe, 00000002.00000000.2261967756.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0C
                Source: nsv9958.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0K
                Source: nsv9958.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0N
                Source: nsv9958.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0O
                Source: explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: explorer.exe, 00000002.00000000.2259528590.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2261086779.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2261098906.0000000007B60000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                Source: GamePall.exe, 0000000F.00000002.4201869459.0000000002FAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/).
                Source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/
                Source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: nsv9958.tmp.14.drString found in binary or memory: http://www.codeplex.com/DotNetZip
                Source: GamePall.exe, 00000013.00000002.4913818250.0000000006280000.00000002.00000001.00040000.0000001D.sdmpString found in binary or memory: http://www.unicode.org/copyright.html
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: 2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat
                Source: 45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat3KOy
                Source: 45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datOK
                Source: 45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datSH/x&
                Source: 45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datal
                Source: 45DE.exe, 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: nsv9958.tmp.14.drString found in binary or memory: https://accounts.google.com/
                Source: explorer.exe, 00000002.00000000.2262440491.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
                Source: explorer.exe, 00000002.00000000.2264733443.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                Source: explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                Source: explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/I
                Source: explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                Source: explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                Source: 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aui-cdn.atlassian.com/
                Source: 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
                Source: 62FC.exe, 0000000B.00000002.3523455444.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
                Source: 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.cookielaw.org/
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: nsv9958.tmp.14.drString found in binary or memory: https://chrome.google.com/webstore
                Source: nsv9958.tmp.14.drString found in binary or memory: https://chrome.google.com/webstore/
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chrome.google.com/webstore/category/extensions
                Source: GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
                Source: GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, tr.pak.14.drString found in binary or memory: https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
                Source: tr.pak.14.drString found in binary or memory: https://chrome.google.com/webstore?hl=trCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ukCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=urCtrl$2
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=viCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CNCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TWCtrl$1
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
                Source: nsv9958.tmp.14.drString found in binary or memory: https://codereview.chromium.org/25305002).
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
                Source: 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: 62FC.exe, 0000000B.00000003.3270688961.0000000000970000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dz8aopenkvv6s.cloudfront.net
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com-
                Source: 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2589398281.0000000001A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/
                Source: 2499.exe, 00000008.00000003.2650072383.0000000001A3C000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650281642.0000000001A3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/)
                Source: 2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/B9
                Source: 2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/Q
                Source: 2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2589398281.0000000001A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/a
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698592212.0000000001A3F000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2663336486.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697215630.0000000001A3E000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2589398281.0000000001A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api
                Source: 2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api.
                Source: 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apig
                Source: 2499.exe, 00000008.00000003.2598973511.0000000001A3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apind-p
                Source: 2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2589398281.0000000001A61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/pi
                Source: 2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/s
                Source: 2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/zs
                Source: 2499.exe, 00000008.00000003.2650072383.0000000001A3C000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650281642.0000000001A3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop:443/api
                Source: nsv9958.tmp.14.drString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json/issues/652
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://myactivity.google.com/
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.come
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.com
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://passwords.google.comGoogle
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://passwords.google.comT
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://photos.google.com/settings?referrer=CHROME_NTP
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://policies.google.com/
                Source: explorer.exe, 00000002.00000000.2264733443.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEMd
                Source: 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
                Source: 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
                Source: GamePall.exe, 0000000F.00000002.4201869459.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rouonixon.com/4/6150781/?ymid=831901360386478080
                Source: GamePall.exe, 0000000F.00000002.4201869459.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rouonixon.com/4/6150781/?ymid=831901360386478080&var=6150780&price=
                Source: nsv9958.tmp.14.drString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, tr.pak.14.drString found in binary or memory: https://support.google.com/chrome/a/answer/9122284
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://support.google.com/chrome/answer/6098869
                Source: nsv9958.tmp.14.drString found in binary or memory: https://support.google.com/chrome/answer/6258784
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drString found in binary or memory: https://support.google.com/chromebook?p=app_intent
                Source: 2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: 2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp, GamePall.exe, 00000011.00000002.3960299796.00000000055C6000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
                Source: 62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                Source: explorer.exe, 00000002.00000000.2262440491.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/e
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comM
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.google.com/
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html&
                Source: GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlT&r
                Source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, tr.pak.14.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlYar&d
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.google.com/cloudprint
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.google.com/cloudprint/enable_chrome_connector
                Source: 2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: 2499.exe, 00000008.00000003.2624370982.000000000401F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
                Source: 2499.exe, 00000008.00000003.2624370982.000000000401F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                Source: 2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                Source: 2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                Source: 2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.newtonsoft.com/json
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.newtonsoft.com/jsonschema
                Source: nsv9958.tmp.14.drString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
                Source: 2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004055E7 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_004055E7
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03244BA2 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,11_2_03244BA2
                Source: GamePall.exeProcess created: 44

                System Summary

                barindex
                Source: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                Source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                Source: 00000006.00000002.2576427770.00000000029A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
                Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401538
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,0_2_00402FE9
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014DE
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401496
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401543
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401565
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401579
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040157C
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401538
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,6_2_00402FE9
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_004014DE
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401496
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401543
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401565
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_00401579
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,6_2_0040157C
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,10_2_100010D0
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_004034CC
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_00406A8810_2_00406A88
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027149011_2_00271490
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027D51511_2_0027D515
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0028477511_2_00284775
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027BE0911_2_0027BE09
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: String function: 00270310 appears 51 times
                Source: EiPVv5yELP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                Source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                Source: 00000006.00000002.2576427770.00000000029A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
                Source: EiPVv5yELP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: whhsvcw.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Ionic.Zip.dll.14.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformBlock'
                Source: Ionic.Zip.dll.14.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock'
                Source: Ionic.Zip.dll.14.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                Source: GamePall.exe.14.dr, Program.csBase64 encoded string: 'pizR9uKkcZIkMW+F1cRjYV0LMt6eYXmLuiNCndESDPkTO3eY1Mjv7Hs2Qvo+t26G', 'ZTDMzZVpdA1FSa2RiY6ZCl2QGyLDtQ3OBRa/N40wO2xxcvcDsATtLRGwKtaEB36dqPJnDF8qXNs92JbMBlsOyg==', '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', 'T7BWwqrn4yISEECEAnARpwE8R+3lDHSc+RlcJT90an1SNsS27lGBQjOx4RmDHlrj7oJnnzx1IWXOkbTfLzBeCfU6UJhOIoQKhcWidAxAKIxvqZnoB6AujIU0F7dEj65vahyTdEvkIxzFaV2+akbl53KcDi5RPBOP16iXVi0WJdHV5AbSCI9WCEcSX/fUpmukBh4bjVF/T/P/B6TFVtNZintCOSO2Ha+2va2CJMOnJ020zYskwuvcH9d1rGD3Zf9RBC2obzrhRNK2LXTEIYnifs6L2UdqFhw5aANXILziQtzKvsTQKvc15hvHCCoeXJCyyK7/WgA/oRu7bdrTs2DwCQ==', 'ZY0WCEgzqiLEU8ZUVJwGTpbkuL9KoMwYVloBqJXjur8rfBZEXTysQNKRQ1H7/vn7o0wyHAux60SVy06r4v6So5WWxddei09LXvL6ZwK/tyY=', 's7iS2XfzyI+IBoARaZQlTINg1kEy7qT7EopaSHQzpqktZBtc7UiOYrPdv/6f4cNI', 'o2ZleBui4P9C2ZjnB98Vuesy1C+WucHiXjQJ8RANoX6TheGfnLYAWDsXRfSeNCDHWdkBP2RBrkWPBy/nuM2NFLMETMUsPFeG3JHWafvGKzaNEjYO3Up9m61SnaY5tINvLCYJ/TKITszJ9H1YSm2chnmQGLUzbz4pwvWvvKfH8m7z585W73/QZrtw3l/30vcZaVocgwemYusDJYsOTgeWc0okiDahD7qtJcBYZ0aOzxZZmHDMBYigkRVf8GTJ/xucA/i7EHBFpaWoLVZVcuGFMA==', 'T7BWwqrn4yISEECEAnARp+JyVgG3cZc2/9+3VbyOjc4PuRSCU7ZfXuXpIIH8uj2roUU+W7nSmXHqTuxLhe6DBfNVh8PFZrhNX/YhIexDxrk=', 'G4TxOgdwfNBdU+6bscw2hqt3kZYZMfoEuKZtmCxRLrF8xJCK1+L0ocd8eSQjty7d', 'PcG64iM3U1vDIVDm7HuwTSvKhuz45f/WPqYoWZvzLHcapbEfkynZkUjmDgg30eof', 'XGcq7Js3+2f2oGHGFzxJPiYsrodwK+bTw/0lKjiUd0tSWMHEjdVqzAclD1/nPksq3sGhVTN8oFeHMRE7wAt3mCLVCEXKF9JLnNeWw9vvCbs=', 'T7BWwqrn4yISEECEAnARp8UQ6kvfa8mDiwe39obQZ+Rxfj5bbo//kf+4mlTsZUEg0QM/4QBKb6sUDMsk9OTdYg==', 'T7BWwqrn4yISEECEAnARp/U1NCwfjpQ4K5UKuMbDqXSrjfU6Tf/pOCpHlHXtYnU5', 'Gg/rFkGmnFrfPAny9sQ3qerPGxlC7+cuu92x2tgXrCRkqABwTbbIR8+hJN0krbBD9OJX8s2JqeR+xICuD2u17N7KjlWCZwpg4+c7mG1xAahALfXXbu/EvJy+KsAzQlzR9bu8P4wbyuM6r6/7kdf+VQ==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLT3pudJg4gGhcEax3IHwBI0R5vZR7J9mjUQ8R9MdKz/Fw==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLTcCwJrbTmNGWmZutw1Di2FSZ+3JxFtC00BiemuQuq2+A=='
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@251/115@0/8
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_004034CC
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_00404897 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,10_2_00404897
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_028EE7CE CreateToolhelp32Snapshot,Module32First,0_2_028EE7CE
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_00402173 CoCreateInstance,MultiByteToWideChar,10_2_00402173
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\whhsvcwJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_mainLog.txt
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: NULL
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeMutant created: \Sessions\1\BaseNamedObjects\1e7f31ac-1494-47cc-9633-054c20e7432e
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_rendLog.txt
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\2499.tmpJump to behavior
                Source: EiPVv5yELP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeFile read: C:\Windows\System32\drivers\etc\hosts
                Source: 2499.exe, 00000008.00000003.2599683424.0000000003FF5000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2613799340.0000000001AD5000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2613170201.0000000001AD4000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2613047961.0000000004003000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: EiPVv5yELP.exeVirustotal: Detection: 41%
                Source: EiPVv5yELP.exeReversingLabs: Detection: 60%
                Source: unknownProcess created: C:\Users\user\Desktop\EiPVv5yELP.exe "C:\Users\user\Desktop\EiPVv5yELP.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\whhsvcw C:\Users\user\AppData\Roaming\whhsvcw
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2499.exe C:\Users\user\AppData\Local\Temp\2499.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\45DE.exe C:\Users\user\AppData\Local\Temp\45DE.exe
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\62FC.exe C:\Users\user\AppData\Local\Temp\62FC.exe
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"
                Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\whhsvcw C:\Users\user\AppData\Roaming\whhsvcw
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\2499.exe C:\Users\user\AppData\Local\Temp\2499.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\45DE.exe C:\Users\user\AppData\Local\Temp\45DE.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\62FC.exe C:\Users\user\AppData\Local\Temp\62FC.exeJump to behavior
                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSection loaded: msvcr100.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
                Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSection loaded: msimg32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSection loaded: msvcr100.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: oleacc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: apphelp.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: acgenral.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: samcli.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: msacm32.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dwmapi.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: mpr.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: oleacc.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: ntmarta.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: shfolder.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: firewallapi.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwbase.dll
                Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwpolicyiomgr.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: apphelp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mmdevapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: devobj.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: audioses.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: powrprof.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: umpdc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.ui.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windowmanagementapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: textinputframework.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: inputhost.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coreuicomponents.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coreuicomponents.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasapi32.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasman.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rtutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mswsock.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc6.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dnsapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winnsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasadhlp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: fwpuclnt.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dpapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: nlaapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: gpapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wkscli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wtsapi32.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winsta.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: omadmapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dmcmnutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iri.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscms.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coloradapterclient.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netapi32.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dsreg.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256f source: nsv9958.tmp.14.dr
                Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: WINLOA~1.PDBwinload_prod.pdbP2Ks& source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: h:\work\newContent\secondBranch\DeleteProgram\DeleteProgram\obj\Release\KlMain.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: ntkrnlmp.pdbx source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000F.00000000.3812506612.0000000000772000.00000002.00000001.01000000.00000010.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000011.00000002.3962952101.0000000005A52000.00000002.00000001.01000000.00000013.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp
                Source: Binary string: ntkrnlmp.pdbR6Mo( source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D3DCompiler_43.pdb` source: d3dcompiler_43.dll.14.dr
                Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000E.00000002.3964292603.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb source: nsv9958.tmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\** source: 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb$# source: nsv9958.tmp.14.dr
                Source: Binary string: D3DCompiler_43.pdb source: d3dcompiler_43.dll.14.dr
                Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: WINLOA~1.PDBwinload_prod.pdbM4Nm) source: 62FC.exe, 0000000B.00000002.3658241175.000000000A400000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000011.00000002.3962952101.0000000005A52000.00000002.00000001.01000000.00000013.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831a source: 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp
                Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 62FC.exe, 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmp, 62FC.exe, 0000000B.00000000.2713431295.0000000000289000.00000002.00000001.01000000.0000000C.sdmp
                Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000E.00000002.3964292603.00000000005DA000.00000004.00000020.00020000.00000000.sdmp, nsv9958.tmp.14.dr
                Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exewall.dlldll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exealldll source: setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 62FC.exe, 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmp, 62FC.exe, 0000000B.00000000.2713431295.0000000000289000.00000002.00000001.01000000.0000000C.sdmp

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeUnpacked PE file: 0.2.EiPVv5yELP.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Roaming\whhsvcwUnpacked PE file: 6.2.whhsvcw.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeUnpacked PE file: 11.2.62FC.exe.3240000.3.unpack
                Source: Newtonsoft.Json.dll.14.drStatic PE information: 0xF68F744F [Mon Jan 31 06:35:59 2101 UTC]
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,10_2_100010D0
                Source: initial sampleStatic PE information: section where entry point is pointing to: .vmpLp
                Source: 2499.exe.2.drStatic PE information: section name: .vmpLp
                Source: 2499.exe.2.drStatic PE information: section name: .vmpLp
                Source: 2499.exe.2.drStatic PE information: section name: .vmpLp
                Source: libEGL.dll.14.drStatic PE information: section name: .00cfg
                Source: libEGL.dll.14.drStatic PE information: section name: .voltbl
                Source: libGLESv2.dll.14.drStatic PE information: section name: .00cfg
                Source: libGLESv2.dll.14.drStatic PE information: section name: .voltbl
                Source: chrome_elf.dll.14.drStatic PE information: section name: .00cfg
                Source: chrome_elf.dll.14.drStatic PE information: section name: .crthunk
                Source: chrome_elf.dll.14.drStatic PE information: section name: CPADinfo
                Source: chrome_elf.dll.14.drStatic PE information: section name: malloc_h
                Source: libEGL.dll0.14.drStatic PE information: section name: .00cfg
                Source: libGLESv2.dll0.14.drStatic PE information: section name: .00cfg
                Source: libcef.dll.14.drStatic PE information: section name: .00cfg
                Source: libcef.dll.14.drStatic PE information: section name: .rodata
                Source: libcef.dll.14.drStatic PE information: section name: CPADinfo
                Source: libcef.dll.14.drStatic PE information: section name: malloc_h
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401CD1 push ecx; ret 0_2_00401CD2
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00401C91 push 00000076h; iretd 0_2_00401C93
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_00402E96 push B92A2F4Ch; retf 0_2_00402E9B
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_02811CF8 push 00000076h; iretd 0_2_02811CFA
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_02812EFD push B92A2F4Ch; retf 0_2_02812F02
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_02811D38 push ecx; ret 0_2_02811D39
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_028F629E push FFFFFFFBh; iretd 0_2_028F62B4
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_028F4220 push edx; ret 0_2_028F4221
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401CD1 push ecx; ret 6_2_00401CD2
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00401C91 push 00000076h; iretd 6_2_00401C93
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_00402E96 push B92A2F4Ch; retf 6_2_00402E9B
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_029A1CF8 push 00000076h; iretd 6_2_029A1CFA
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_029A2EFD push B92A2F4Ch; retf 6_2_029A2F02
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_029A1D38 push ecx; ret 6_2_029A1D39
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_02A37BE6 push FFFFFFFBh; iretd 6_2_02A37BFC
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_02A35B68 push edx; ret 6_2_02A35B69
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027004B push ecx; ret 11_2_0027005E
                Source: EiPVv5yELP.exeStatic PE information: section name: .text entropy: 7.509218380839062
                Source: whhsvcw.2.drStatic PE information: section name: .text entropy: 7.509218380839062
                Source: Ionic.Zip.dll.14.drStatic PE information: section name: .text entropy: 6.821349263259562
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeFile created: C:\Users\user\AppData\Local\Temp\setup.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\62FC.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeFile created: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeFile created: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\nsProcess.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].datJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeFile created: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\blowfish.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\2499.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\45DE.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsuAB0.tmp\liteFirewall.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\whhsvcwJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\whhsvcwJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall
                Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\eipvv5yelp.exeJump to behavior
                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\whhsvcw:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_11-145434
                Source: C:\Users\user\AppData\Local\Temp\2499.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeAPI/Special instruction interceptor: Address: 7FFDB442E814
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeAPI/Special instruction interceptor: Address: 7FFDB442D584
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 1278181
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 1249E6B
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 10A76F5
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 1184E89
                Source: C:\Users\user\AppData\Roaming\whhsvcwAPI/Special instruction interceptor: Address: 7FFDB442E814
                Source: C:\Users\user\AppData\Roaming\whhsvcwAPI/Special instruction interceptor: Address: 7FFDB442D584
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 11C4080
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 1176310
                Source: C:\Users\user\AppData\Local\Temp\2499.exeAPI/Special instruction interceptor: Address: 12B5B80
                Source: whhsvcwBinary or memory string: ASWHOOK
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: F00000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BA0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1320000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 14F0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1310000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D30000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4E30000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2CF0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F20000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2CF0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 10A0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BE0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B10000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1080000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BB0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A10000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1430000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F50000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4F50000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 25E0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2870000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4870000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1600000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2EF0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4EF0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 24C0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2730000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 24C0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: FD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 29D0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4AD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: BE0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 27A0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2500000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 830000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2480000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 23C0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1700000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3280000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 5280000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1210000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D50000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2AB0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 12D0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F80000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2DD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D90000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2BD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 940000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2530000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4530000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 9A0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 23F0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: A80000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2DD0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2DF0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1320000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F00000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D00000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 423Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 848Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 3302Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1543Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 886Jump to behavior
                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 861Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\nsProcess.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\blowfish.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsuAB0.tmp\liteFirewall.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                Source: C:\Windows\explorer.exe TID: 5392Thread sleep time: -84800s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 1476Thread sleep time: -330200s >= -30000sJump to behavior
                Source: C:\Windows\explorer.exe TID: 1476Thread sleep time: -154300s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exe TID: 5800Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exe TID: 5964Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe TID: 2828Thread sleep time: -600000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe TID: 4988Thread sleep count: 34 > 30
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,10_2_00405B4A
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004066FF FindFirstFileA,FindClose,10_2_004066FF
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004027AA FindFirstFileA,10_2_004027AA
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_002824BD FindFirstFileExW,11_2_002824BD
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03241000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,11_2_03241000
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03244E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,11_2_03244E27
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03241D3C FindFirstFileW,FindNextFileW,11_2_03241D3C
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_032440BA FindFirstFileW,FindNextFileW,11_2_032440BA
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03243EFC FindFirstFileW,FindNextFileW,11_2_03243EFC
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_03242054 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,11_2_03242054
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                Source: explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                Source: explorer.exe, 00000002.00000000.2262440491.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: explorer.exe, 00000002.00000000.2259150882.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: explorer.exe, 00000002.00000000.2261967756.000000000978C000.00000004.00000001.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697215630.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698592212.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2664547120.0000000001A53000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698376107.00000000019FE000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970046685.0000000000528000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000002.3972181561.0000000000528000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                Source: explorer.exe, 00000002.00000000.2262440491.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: explorer.exe, 00000002.00000000.2259150882.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@
                Source: explorer.exe, 00000002.00000000.2264733443.000000000C354000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}@]
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004036000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: explorer.exe, 00000002.00000000.2262440491.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                Source: explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: explorer.exe, 00000002.00000000.2261967756.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: explorer.exe, 00000002.00000000.2259150882.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: explorer.exe, 00000002.00000000.2262440491.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: 2499.exe, 00000008.00000003.2697215630.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698592212.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2664547120.0000000001A53000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000002.3971941688.0000000000507000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.0000000000507000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: explorer.exe, 00000002.00000000.2259150882.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                Source: 2499.exe, 00000008.00000003.2613264123.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeAPI call chain: ExitProcess graph end nodegraph_10-3465
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSystem information queried: CodeIntegrityInformationJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00274383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00274383
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,10_2_100010D0
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_02810D90 mov eax, dword ptr fs:[00000030h]0_2_02810D90
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_0281092B mov eax, dword ptr fs:[00000030h]0_2_0281092B
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeCode function: 0_2_028EE0AB push dword ptr fs:[00000030h]0_2_028EE0AB
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_029A0D90 mov eax, dword ptr fs:[00000030h]6_2_029A0D90
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_029A092B mov eax, dword ptr fs:[00000030h]6_2_029A092B
                Source: C:\Users\user\AppData\Roaming\whhsvcwCode function: 6_2_02A2F9F3 push dword ptr fs:[00000030h]6_2_02A2F9F3
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00285891 GetProcessHeap,11_2_00285891
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00274383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00274383
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00270495 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00270495
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_00270622 SetUnhandledExceptionFilter,11_2_00270622
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_002706F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_002706F0
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\explorer.exeFile created: 62FC.exe.2.drJump to dropped file
                Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.126 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 185.68.16.7 443Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.97.3 80Jump to behavior
                Source: C:\Windows\explorer.exeNetwork Connect: 186.101.193.110 80Jump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeThread created: C:\Windows\explorer.exe EIP: 87E19D0Jump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwThread created: unknown EIP: 31A19D0Jump to behavior
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: pedestriankodwu.xyz
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: towerxxuytwi.xyz
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: ellaboratepwsz.xyz
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: penetratedpoopp.xyz
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: swellfrrgwwos.xyz
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: contintnetksows.shop
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: foodypannyjsud.shop
                Source: 2499.exe, 00000008.00000002.2697520681.0000000000D5D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: potterryisiw.shop
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\Desktop\EiPVv5yELP.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                Source: C:\Users\user\AppData\Roaming\whhsvcwSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (android 13; mobile; rv:127.0) gecko/127.0 firefox/127.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                Source: explorer.exe, 00000002.00000000.2259426131.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
                Source: explorer.exe, 00000002.00000000.2259426131.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.2260336746.00000000048E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000002.00000000.2259426131.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: explorer.exe, 00000002.00000000.2259150882.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
                Source: explorer.exe, 00000002.00000000.2259426131.00000000013A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: explorer.exe, 00000002.00000000.2262440491.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027013C cpuid 11_2_0027013C
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: EnumSystemLocalesW,11_2_00285051
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetLocaleInfoW,11_2_0027E096
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_002850DC
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetLocaleInfoW,11_2_0028532F
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_00285458
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetLocaleInfoW,11_2_0028555E
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_00285634
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: EnumSystemLocalesW,11_2_0027DBC7
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,11_2_00284CBF
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: EnumSystemLocalesW,11_2_00284F6B
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: EnumSystemLocalesW,11_2_00284FB6
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\spool\drivers\color\sRGB Color Space Profile.icm VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeCode function: 11_2_0027038F GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_0027038F
                Source: C:\Users\user\AppData\Local\Temp\45DE.exeCode function: 10_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,10_2_004034CC
                Source: C:\Users\user\AppData\Local\Temp\2499.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: 2499.exe, 00000008.00000003.2664692434.0000000001AD9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2664460561.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677917601.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697040966.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698805266.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2672931566.0000000001AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Windows Defender\MsMpeng.exe
                Source: 2499.exe, 00000008.00000003.2664692434.0000000001AD9000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2664460561.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2677917601.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697040966.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000002.2698805266.0000000001AD8000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2672931566.0000000001AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dows Defender\MsMpeng.exe
                Source: C:\Users\user\AppData\Local\Temp\2499.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: 2499.exe PID: 2616, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.62FC.exe.979a60.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.3240000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.3240000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.972340.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.979a60.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.972340.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 62FC.exe PID: 1780, type: MEMORYSTR
                Source: Yara matchFile source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Electrum-LTC\wallets
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\ElectronCash\wallets
                Source: 2499.exe, 00000008.00000003.2697215630.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                Source: 2499.exe, 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: 2499.exe, 00000008.00000003.2650072383.0000000001A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: 2499.exe, 00000008.00000003.2650072383.0000000001A20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\62FC.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BNAGMGSPLOJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\QCFWYSKMHAJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\JDDHMPCDUJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOHJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\QNCYCDFIJJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\NWCXBPIUYIJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\PIVFAGEAAVJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\2499.exeDirectory queried: C:\Users\user\Documents\GAOBCVIQIJJump to behavior
                Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1294
                Source: Yara matchFile source: 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000003.2650072383.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 2499.exe PID: 2616, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: 2499.exe PID: 2616, type: MEMORYSTR
                Source: Yara matchFile source: 11.2.62FC.exe.979a60.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.3240000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.3240000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.972340.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.979a60.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.62FC.exe.972340.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 62FC.exe PID: 1780, type: MEMORYSTR
                Source: Yara matchFile source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts11
                Native API
                1
                Windows Service
                1
                Access Token Manipulation
                111
                Deobfuscate/Decode Files or Information
                LSASS Memory23
                File and Directory Discovery
                Remote Desktop Protocol31
                Data from Local System
                2
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                1
                Registry Run Keys / Startup Folder
                1
                Windows Service
                31
                Obfuscated Files or Information
                Security Account Manager137
                System Information Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                1
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                Command and Scripting Interpreter
                Login Hook312
                Process Injection
                22
                Software Packing
                NTDS651
                Security Software Discovery
                Distributed Component Object Model1
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts1
                PowerShell
                Network Logon Script1
                Registry Run Keys / Startup Folder
                1
                Timestomp
                LSA Secrets241
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials3
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                File Deletion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                Masquerading
                Proc Filesystem1
                Remote System Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt241
                Virtualization/Sandbox Evasion
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Access Token Manipulation
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                Process Injection
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                Hidden Files and Directories
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1466593 Sample: EiPVv5yELP.exe Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 101 Found malware configuration 2->101 103 Malicious sample detected (through community Yara rule) 2->103 105 Antivirus detection for URL or domain 2->105 107 11 other signatures 2->107 12 EiPVv5yELP.exe 2->12         started        15 whhsvcw 2->15         started        17 whhsvcw 2->17         started        process3 signatures4 141 Detected unpacking (changes PE section rights) 12->141 143 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->143 145 Maps a DLL or memory area into another process 12->145 147 Switches to a custom stack to bypass stack traces 12->147 19 explorer.exe 56 13 12->19 injected 149 Multi AV Scanner detection for dropped file 15->149 151 Checks if the current machine is a virtual machine (disk enumeration) 15->151 153 Creates a thread in another existing process (thread injection) 15->153 process5 dnsIp6 87 185.68.16.7 UKRAINE-ASUA Ukraine 19->87 89 186.101.193.110 TelconetSAEC Ecuador 19->89 91 2 other IPs or domains 19->91 71 C:\Users\user\AppData\Roaming\whhsvcw, PE32 19->71 dropped 73 C:\Users\user\AppData\Local\Temp\62FC.exe, PE32 19->73 dropped 75 C:\Users\user\AppData\Local\Temp\45DE.exe, PE32 19->75 dropped 77 2 other malicious files 19->77 dropped 111 System process connects to network (likely due to code injection or exploit) 19->111 113 Benign windows process drops PE files 19->113 115 Deletes itself after installation 19->115 117 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->117 24 45DE.exe 3 35 19->24         started        28 2499.exe 19->28         started        31 62FC.exe 12 19->31         started        33 GamePall.exe 19->33         started        file7 signatures8 process9 dnsIp10 79 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 24->79 dropped 81 C:\Users\user\AppData\Local\...\blowfish.dll, PE32 24->81 dropped 83 C:\Users\user\AppData\Local\...\huge[1].dat, PE32 24->83 dropped 85 2 other files (none is malicious) 24->85 dropped 123 Antivirus detection for dropped file 24->123 125 Multi AV Scanner detection for dropped file 24->125 35 setup.exe 112 24->35         started        95 188.114.97.3 CLOUDFLARENETUS European Union 28->95 127 Query firmware table information (likely to detect VMs) 28->127 129 Machine Learning detection for dropped file 28->129 131 Found many strings related to Crypto-Wallets (likely being stolen) 28->131 139 3 other signatures 28->139 97 146.70.169.164 TENET-1ZA United Kingdom 31->97 99 185.166.143.48 AMAZON-02US Germany 31->99 133 Detected unpacking (creates a PE file in dynamic memory) 31->133 135 Found evasive API chain (may stop execution after checking mutex) 31->135 137 Tries to harvest and steal browser information (history, passwords, etc) 31->137 file11 signatures12 process13 file14 63 C:\Users\user\AppData\...\vulkan-1.dll, PE32 35->63 dropped 65 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 35->65 dropped 67 C:\Users\user\AppData\...\libGLESv2.dll, PE32 35->67 dropped 69 16 other files (13 malicious) 35->69 dropped 109 Antivirus detection for dropped file 35->109 39 GamePall.exe 35->39         started        signatures15 process16 dnsIp17 93 172.67.221.174 CLOUDFLARENETUS United States 39->93 119 Antivirus detection for dropped file 39->119 121 Machine Learning detection for dropped file 39->121 43 GamePall.exe 39->43         started        45 GamePall.exe 39->45         started        47 GamePall.exe 39->47         started        49 7 other processes 39->49 signatures18 process19 process20 51 GamePall.exe 43->51         started        53 GamePall.exe 43->53         started        55 GamePall.exe 43->55         started        57 6 other processes 43->57 process21 59 GamePall.exe 51->59         started        61 GamePall.exe 51->61         started       

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                EiPVv5yELP.exe41%VirustotalBrowse
                EiPVv5yELP.exe61%ReversingLabsWin32.Trojan.Operaloader
                EiPVv5yELP.exe100%AviraHEUR/AGEN.1318160
                EiPVv5yELP.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat100%AviraHEUR/AGEN.1359405
                C:\Users\user\AppData\Local\Temp\setup.exe100%AviraHEUR/AGEN.1359405
                C:\Users\user\AppData\Local\Temp\2499.exe100%AviraHEUR/AGEN.1313486
                C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%AviraHEUR/AGEN.1352426
                C:\Users\user\AppData\Local\Temp\45DE.exe100%AviraHEUR/AGEN.1359405
                C:\Users\user\AppData\Local\Temp\2499.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\GamePall\Del.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\62FC.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\huge[1].dat3%ReversingLabsWin32.Trojan.Generic
                C:\Users\user\AppData\Local\Temp\2499.exe50%ReversingLabsWin32.Trojan.Smokeloader
                C:\Users\user\AppData\Local\Temp\45DE.exe21%ReversingLabs
                C:\Users\user\AppData\Local\Temp\62FC.exe16%ReversingLabs
                C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\blowfish.dll5%ReversingLabs
                C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\nsProcess.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\nsuAB0.tmp\liteFirewall.dll0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\setup.exe3%ReversingLabsWin32.Trojan.Generic
                C:\Users\user\AppData\Roaming\GamePall\Del.exe7%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\GamePall.exe3%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll3%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\libEGL.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\libcef.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\log4net.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll0%ReversingLabs
                C:\Users\user\AppData\Roaming\whhsvcw61%ReversingLabsWin32.Trojan.Operaloader
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
                https://www.ecosia.org/newtab/0%URL Reputationsafe
                https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
                https://android.notify.windows.com/iOS0%URL Reputationsafe
                https://foodypannyjsud.shop/api.100%Avira URL Cloudmalware
                https://foodypannyjsud.shop/s100%Avira URL Cloudmalware
                https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%Avira URL Cloudsafe
                https://support.google.com/chrome/answer/60988690%Avira URL Cloudsafe
                https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF0%Avira URL Cloudsafe
                https://www.google.com/chrome/privacy/eula_text.html0%Avira URL Cloudsafe
                https://api.msn.com:443/v1/news/Feed/Windows?0%Avira URL Cloudsafe
                https://word.office.comM0%Avira URL Cloudsafe
                http://gebeus.ru/tmp/index.php100%Avira URL Cloudmalware
                http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%Avira URL Cloudsafe
                https://foodypannyjsud.shop/a100%Avira URL Cloudmalware
                https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
                https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri0%Avira URL Cloudsafe
                http://crbug.com/5102700%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=urCtrl$20%Avira URL Cloudsafe
                http://xiexie.wf/22_551/huge.datOK0%Avira URL Cloudsafe
                http://crbug.com/3780670%Avira URL Cloudsafe
                https://photos.google.com/settings?referrer=CHROME_NTP0%Avira URL Cloudsafe
                https://foodypannyjsud.shop/Q100%Avira URL Cloudmalware
                https://chrome.google.com/webstore?hl=trCtrl$10%Avira URL Cloudsafe
                https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl0%Avira URL Cloudsafe
                https://www.google.com/cloudprint0%Avira URL Cloudsafe
                http://cx5519.com/tmp/index.php100%Avira URL Cloudmalware
                https://passwords.google.com0%Avira URL Cloudsafe
                contintnetksows.shop100%Avira URL Cloudmalware
                https://aui-cdn.atlassian.com/0%Avira URL Cloudsafe
                http://crbug.com/4973010%Avira URL Cloudsafe
                https://github.com/JamesNK/Newtonsoft.Json/issues/6520%Avira URL Cloudsafe
                http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd0%Avira URL Cloudsafe
                https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%220%Avira URL Cloudsafe
                https://wns.windows.com/e0%Avira URL Cloudsafe
                http://bageyou.xyz0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                http://crbug.com/6421410%Avira URL Cloudsafe
                https://bitbucket.org/0%Avira URL Cloudsafe
                http://evilos.cc/tmp/index.php100%Avira URL Cloudmalware
                https://support.google.com/chromebook?p=app_intent0%Avira URL Cloudsafe
                http://crbug.com/7175010%Avira URL Cloudsafe
                http://crbug.com/9577720%Avira URL Cloudsafe
                http://crbug.com/8391890%Avira URL Cloudsafe
                https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%Avira URL Cloudsafe
                https://chrome.google.com/webstore0%Avira URL Cloudsafe
                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                https://rouonixon.com/4/6150781/?ymid=8319013603864780800%Avira URL Cloudsafe
                http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc0%Avira URL Cloudsafe
                https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%Avira URL Cloudsafe
                https://www.google.com/chrome/privacy/eula_text.html&0%Avira URL Cloudsafe
                https://www.google.com/chrome/privacy/eula_text.htmlT&r0%Avira URL Cloudsafe
                https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-0%Avira URL Cloudsafe
                ellaboratepwsz.xyz100%Avira URL Cloudmalware
                swellfrrgwwos.xyz100%Avira URL Cloudmalware
                http://xiexie.wf/22_551/huge.dat0%Avira URL Cloudsafe
                http://xiexie.wf/22_551/huge.datSH/x&0%Avira URL Cloudsafe
                http://crbug.com/8194040%Avira URL Cloudsafe
                https://foodypannyjsud.shop/)100%Avira URL Cloudmalware
                http://crbug.com/5146960%Avira URL Cloudsafe
                https://foodypannyjsud.shop/apig100%Avira URL Cloudmalware
                https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee0%Avira URL Cloudsafe
                https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=ukCtrl$10%Avira URL Cloudsafe
                http://api.install-stat.debug.world/clients/installs0%Avira URL Cloudsafe
                https://outlook.come0%Avira URL Cloudsafe
                foodypannyjsud.shop100%Avira URL Cloudmalware
                https://cdn.cookielaw.org/0%Avira URL Cloudsafe
                https://www.newtonsoft.com/jsonschema0%Avira URL Cloudsafe
                pedestriankodwu.xyz100%Avira URL Cloudmalware
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%Avira URL Cloudsafe
                https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%Avira URL Cloudsafe
                https://support.google.com/chrome/a/answer/91222840%Avira URL Cloudsafe
                https://chrome.google.com/webstore/0%Avira URL Cloudsafe
                https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                https://www.google.com/0%Avira URL Cloudsafe
                https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta0%Avira URL Cloudsafe
                https://rouonixon.com/4/6150781/?ymid=831901360386478080&var=6150780&price=0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity0%Avira URL Cloudsafe
                https://api.msn.com/v1/news/Feed/Windows?0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=zh-CNCtrl$10%Avira URL Cloudsafe
                https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC10%Avira URL Cloudsafe
                https://api.msn.com/I0%Avira URL Cloudsafe
                https://support.google.com/chrome/answer/62587840%Avira URL Cloudsafe
                http://www.unicode.org/copyright.html0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity0%Avira URL Cloudsafe
                http://api.install-stat.debug.world/clients/activitye0%Avira URL Cloudsafe
                http://crbug.com/7759610%Avira URL Cloudsafe
                https://support.google.com/chrome/?p=plugin_flash0%Avira URL Cloudsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://gebeus.ru/tmp/index.phptrue
                • Avira URL Cloud: malware
                unknown
                http://cx5519.com/tmp/index.phptrue
                • Avira URL Cloud: malware
                unknown
                contintnetksows.shoptrue
                • Avira URL Cloud: malware
                unknown
                http://evilos.cc/tmp/index.phptrue
                • Avira URL Cloud: malware
                unknown
                ellaboratepwsz.xyztrue
                • Avira URL Cloud: malware
                unknown
                swellfrrgwwos.xyztrue
                • Avira URL Cloud: malware
                unknown
                foodypannyjsud.shoptrue
                • Avira URL Cloud: malware
                unknown
                pedestriankodwu.xyztrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/api.2499.exe, 00000008.00000002.2698759970.0000000001ABA000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2697192717.0000000001AB9000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://duckduckgo.com/chrome_newtab2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/ac/?q=2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/s2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/chrome/answer/6098869setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngFexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/chrome/privacy/eula_text.htmlsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2261967756.000000000973C000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://word.office.comMexplorer.exe, 00000002.00000000.2264733443.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://logging.apache.org/log4net/release/faq.html#trouble-EventLogGamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/a2499.exe, 00000008.00000003.2598973511.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2589398281.0000000001A61000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/510270nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=urCtrl$2setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://xiexie.wf/22_551/huge.datOK45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/378067nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://photos.google.com/settings?referrer=CHROME_NTPsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/Q2499.exe, 00000008.00000003.2650005012.0000000001AB2000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://chrome.google.com/webstore?hl=trCtrl$1tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrlsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/cloudprintnsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://passwords.google.comsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://aui-cdn.atlassian.com/62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/497301nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://github.com/JamesNK/Newtonsoft.Json/issues/652nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd45DE.exe, 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://wns.windows.com/eexplorer.exe, 00000002.00000000.2262440491.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameGamePall.exe, 0000000F.00000002.4201869459.0000000002FAB000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://bageyou.xyzGamePall.exe, 00000025.00000002.4299577434.0000000002FB7000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/642141nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://bitbucket.org/62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/chromebook?p=app_intentsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/717501nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/957772nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/839189nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstorensv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?uGamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.rootca1.amazontrust.com/rootca1.crl02499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://rouonixon.com/4/6150781/?ymid=831901360386478080GamePall.exe, 0000000F.00000002.4201869459.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsp.rootca1.amazontrust.com0:2499.exe, 00000008.00000003.2623382731.0000000004023000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3513633343.000000000A46F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&ocexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorError45DE.exe, 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 45DE.exe, 0000000A.00000000.2651884486.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000E.00000000.3511852437.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000003.3812625540.0000000000639000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.google.com/chrome/privacy/eula_text.html&setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/chrome/privacy/eula_text.htmlT&rsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.ecosia.org/newtab/2499.exe, 00000008.00000003.2599580866.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599742456.0000000004037000.00000004.00000800.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2599514461.0000000004039000.00000004.00000800.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3475607132.0000000009C6D000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://xiexie.wf/22_551/huge.dat45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://xiexie.wf/22_551/huge.datSH/x&45DE.exe, 0000000A.00000002.3971865750.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3969776646.00000000004F8000.00000004.00000020.00020000.00000000.sdmp, 45DE.exe, 0000000A.00000003.3970280892.00000000004F9000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/819404nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/)2499.exe, 00000008.00000003.2650072383.0000000001A3C000.00000004.00000020.00020000.00000000.sdmp, 2499.exe, 00000008.00000003.2650281642.0000000001A3E000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br2499.exe, 00000008.00000003.2624460757.0000000004119000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crbug.com/514696nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://foodypannyjsud.shop/apig2499.exe, 00000008.00000003.2677985248.0000000001AB6000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee62FC.exe, 0000000B.00000002.3523455444.00000000008B0000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.00000000008FD000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrlsetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, GamePall.exe, 00000013.00000002.4771456418.0000000005B70000.00000002.00000001.00040000.0000001C.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_Error45DE.exe, 45DE.exe, 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 45DE.exe, 0000000A.00000000.2651884486.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000E.00000000.3511852437.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000002.3963386902.000000000040A000.00000004.00000001.01000000.0000000E.sdmp, setup.exe, 0000000E.00000003.3812625540.0000000000639000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=ukCtrl$1setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2264733443.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://api.install-stat.debug.world/clients/installsGamePall.exe, 00000025.00000002.4299577434.0000000002FB7000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://outlook.comeexplorer.exe, 00000002.00000000.2264733443.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.cookielaw.org/62FC.exe, 0000000B.00000003.3270688961.000000000092A000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, 62FC.exe, 0000000B.00000003.3270751204.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.newtonsoft.com/jsonschemansv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000002.00000000.2262440491.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/chrome/a/answer/9122284setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmp, tr.pak.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore/nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000002.00000000.2260463436.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta2499.exe, 00000008.00000003.2624826357.0000000001ACA000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://rouonixon.com/4/6150781/?ymid=831901360386478080&var=6150780&price=GamePall.exe, 0000000F.00000002.4201869459.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivitysetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=zh-CNCtrl$1setup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1GamePall.exe, 00000011.00000002.3958936963.0000000005582000.00000002.00000001.01000000.00000012.sdmp, GamePall.exe, 00000011.00000002.3960299796.00000000055C6000.00000002.00000001.01000000.00000012.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com/Iexplorer.exe, 00000002.00000000.2261967756.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/chrome/answer/6258784nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                http://www.unicode.org/copyright.htmlGamePall.exe, 00000013.00000002.4913818250.0000000006280000.00000002.00000001.00040000.0000001D.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivitysetup.exe, 0000000E.00000002.3967417431.0000000002732000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://api.install-stat.debug.world/clients/activityeGamePall.exe, 0000001C.00000002.4413242825.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 00000020.00000002.4472949813.0000000002D78000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 00000021.00000002.4425678976.0000000002FA8000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crbug.com/775961nsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/chrome/?p=plugin_flashnsv9958.tmp.14.drfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                188.114.97.3
                unknownEuropean Union
                13335CLOUDFLARENETUStrue
                186.101.193.110
                unknownEcuador
                27947TelconetSAECtrue
                185.166.143.48
                unknownGermany
                16509AMAZON-02USfalse
                141.8.192.126
                unknownRussian Federation
                35278SPRINTHOSTRUtrue
                172.67.221.174
                unknownUnited States
                13335CLOUDFLARENETUSfalse
                185.68.16.7
                unknownUkraine
                200000UKRAINE-ASUAtrue
                146.70.169.164
                unknownUnited Kingdom
                2018TENET-1ZAtrue
                IP
                127.0.0.127
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1466593
                Start date and time:2024-07-03 07:46:04 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 16m 3s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:39
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Sample name:EiPVv5yELP.exe
                renamed because original name is a hash value
                Original Sample Name:7904c33d58c3e399bf5bc6e9c1d67bcb.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@251/115@0/8
                EGA Information:
                • Successful, ratio: 80%
                HCA Information:
                • Successful, ratio: 55%
                • Number of executed functions: 115
                • Number of non-executed functions: 83
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                • Execution Graph export aborted for target 2499.exe, PID 2616 because there are no executed function
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtOpenFile calls found.
                • Report size getting too big, too many NtOpenKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Skipping network analysis since amount of network traffic is too extensive
                TimeTypeDescription
                01:47:14API Interceptor146829x Sleep call for process: explorer.exe modified
                01:47:41API Interceptor9x Sleep call for process: 2499.exe modified
                01:49:48API Interceptor1x Sleep call for process: GamePall.exe modified
                07:47:25Task SchedulerRun new task: Firefox Default Browser Agent 6A4B09D4FCE546F9 path: C:\Users\user\AppData\Roaming\whhsvcw
                07:49:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                07:49:55AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                188.114.97.3http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12Get hashmaliciousUnknownBrowse
                • sp.26skins.com/favicon.ico
                Inquiry No PJO-4010574.exeGet hashmaliciousFormBookBrowse
                • www.oc7o0.top/2zff/?iHmHOtK=4L8xoD0W4Zo4sy88OPxzXkM4Et1OXrliZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk7znic/DfJyEGJbg1Pv28u2ofuxZkWteJjYs=&L480=nFsp
                30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                • filetransfer.io/data-package/TbaYPT0S/download
                nJ8mJTmMf0.exeGet hashmaliciousFormBookBrowse
                • www.coinwab.com/efdt/
                hkLFB22XxS.exeGet hashmaliciousFormBookBrowse
                • www.cavetta.org.mt/yhnb/
                QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                • filetransfer.io/data-package/mJcm5Gfa/download
                http://url.usb.m.mimecastprotect.com/s/SPnzCDwVznT7kyA0HkOsZj?domain=linkscan.ioGet hashmaliciousHTMLPhisherBrowse
                • emmalee.sa.com/favicon.ico
                file.exeGet hashmaliciousFormBookBrowse
                • www.cavetta.org.mt/yhnb/
                6Z4Q4bREii.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • 000366cm.nyashka.top/phpflowergenerator.php
                DHL Arrival Notice.exeGet hashmaliciousFormBookBrowse
                • www.coinwab.com/efdt/
                186.101.193.110a6lzHWp4pa.exeGet hashmaliciousLummaC, CryptOne, LummaC Stealer, SmokeLoader, VidarBrowse
                • bipto.org/tmp/index.php
                185.166.143.4837e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  141.8.192.126http://a0748987.xsph.ruGet hashmaliciousUnknownBrowse
                  • a0748987.xsph.ru/favicon.ico
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 172.67.221.174
                  http://differentia.ruGet hashmaliciousUnknownBrowse
                  • 1.1.1.1
                  Doc_CI_PL_HBL_COO_Insu_.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  Safeguard and Grow Your Assets.htmlGet hashmaliciousUnknownBrowse
                  • 172.64.152.241
                  roger.exeGet hashmaliciousAgentTeslaBrowse
                  • 172.67.74.152
                  https://townsvilleucc.com.auGet hashmaliciousUnknownBrowse
                  • 188.114.97.3
                  https://emea.dcv.ms/xAUEwUn0yq&c=E,1,toHboUmwDMlhwr-wc7dBvpYkcIiHsLy6ICiYedy6zqFMHJPZP4VPyK8zV2e78vqw1ZiSYyf8djJ0Qg64xCBVUCvFvYwJhqpWb_urHJ65A88aoiyybtSIFaPo&typo=1Get hashmaliciousUnknownBrowse
                  • 104.21.55.70
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.21.45.251
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 172.67.221.174
                  https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
                  • 104.17.25.14
                  TelconetSAECUl8gIL4P3u.elfGet hashmaliciousMirai, MoobotBrowse
                  • 186.3.191.144
                  MMNSxD2fJ3.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
                  • 186.101.193.110
                  QsyCac05Yl.elfGet hashmaliciousMirai, MoobotBrowse
                  • 181.39.145.17
                  file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                  • 186.4.194.68
                  b59e52b83b0a0cde0085b3ba306316a86a845a974cbeaf45da905476b6db53bb_dump.exeGet hashmaliciousSmokeLoaderBrowse
                  • 186.4.194.68
                  i82HF8QQwf.elfGet hashmaliciousMiraiBrowse
                  • 157.101.27.18
                  O8gVyF6MY1.exeGet hashmaliciousUnknownBrowse
                  • 186.3.164.72
                  oniCmGMx16.exeGet hashmaliciousUnknownBrowse
                  • 186.3.164.72
                  8MFpF2RpG1.elfGet hashmaliciousMiraiBrowse
                  • 157.101.52.13
                  SecuriteInfo.com.Linux.Siggen.9999.27902.26281.elfGet hashmaliciousMiraiBrowse
                  • 181.199.82.168
                  SPRINTHOSTRUfile.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 141.8.192.126
                  https://kawak.com.coGet hashmaliciousUnknownBrowse
                  • 185.251.91.91
                  S#U0435tup.exeGet hashmaliciousCopperShrimpBrowse
                  • 185.185.70.98
                  S#U0435tup.exeGet hashmaliciousCopperShrimpBrowse
                  • 185.185.70.98
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                  • 141.8.192.6
                  https://www.asarco.com/Get hashmaliciousUnknownBrowse
                  • 185.251.91.91
                  AMAZON-02USwatchdog.elfGet hashmaliciousMiraiBrowse
                  • 54.97.145.12
                  spc.elfGet hashmaliciousMiraiBrowse
                  • 54.103.155.145
                  watchdog.elfGet hashmaliciousMiraiBrowse
                  • 52.89.222.207
                  file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.192.141.1
                  https://emea.dcv.ms/xAUEwUn0yq&c=E,1,toHboUmwDMlhwr-wc7dBvpYkcIiHsLy6ICiYedy6zqFMHJPZP4VPyK8zV2e78vqw1ZiSYyf8djJ0Qg64xCBVUCvFvYwJhqpWb_urHJ65A88aoiyybtSIFaPo&typo=1Get hashmaliciousUnknownBrowse
                  • 52.222.236.94
                  SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 104.192.141.1
                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                  • 185.166.143.48
                  https://rules-pear-kft5d2.mystrikingly.com/Get hashmaliciousUnknownBrowse
                  • 13.224.189.122
                  https://metamesklogni.webflow.io/Get hashmaliciousUnknownBrowse
                  • 108.156.2.28
                  http://pub-2e7429ed1f544f43a4684eeceb978dbb.r2.dev/home.htmlGet hashmaliciousUnknownBrowse
                  • 18.239.94.85
                  No context
                  No context
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):107232830
                  Entropy (8bit):7.999946456161068
                  Encrypted:true
                  SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                  MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                  SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                  SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                  SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):6642176
                  Entropy (8bit):7.866419732571782
                  Encrypted:false
                  SSDEEP:98304:LqhZ67opwYckx35SF2XKgxVvHuCPU8GSbO3JAXV1LrA+ZlL9CxpzTp2:LgErupSgKORuCT43JeV1LE+/s3p
                  MD5:BD2EAC64CBDED877608468D86786594A
                  SHA1:778AD44AFD5629F0A5B3B7DF9D6F02522AE94D91
                  SHA-256:CAE992788853230AF91501546F6EAD07CFD767CB8429C98A273093A90BBCB5AD
                  SHA-512:3C8F43045F27ADDCB5FB23807C2CE1D3F247CC30DD1596134A141B0BBC7FA4D30D138791214D939DC4F34FD925B9EC450EA340E5871E2F4F64844226ED394312
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 50%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....U~f..............................M...........@...................................e...@..................................O......P......................@.......................................................@3..............................text...+........................... ..`.rdata...*..........................@..@.data.... ..........................@....vmpL.p.....0...................... ..`.vmpL.p@....@3.....................@....vmpL.p..]..P3...]................. ..`.reloc.......@........].............@..@.rsrc.......P...f....].............@..@........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):293869
                  Entropy (8bit):5.61569579822855
                  Encrypted:false
                  SSDEEP:3072:lFi6z/VXzAf3ocMNqB3r1Josf+OMhERMlm+twHBumSYyDgIoIPM7l0UGHM7:lxFSIjs+OM2eLFmSFgIZk7+HM7
                  MD5:60172CA946DE57C3529E9F05CC502870
                  SHA1:DE8F59D6973A5811BB10A9A4410801FA63BC8B56
                  SHA-256:42CEB2252FEC41FD0ACC6874B41C91E0BA07C367045D6A9A7850D59781C2584C
                  SHA-512:15D37AF3CAB96FC9026A1898E09C775FE0D277098A3FE20C2E591272DE996A243850D43F3B48B4C037C5FED359E57795A7CF1652547D7AD8B16B186AB9508792
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 21%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........`..X............................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...X....`......................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:modified
                  Size (bytes):578048
                  Entropy (8bit):6.297510031778876
                  Encrypted:false
                  SSDEEP:12288:No4ykJuqlLJop9G3/AmAGWn7sfPJYQIMt8KHsTH:NoBsLaDKAmAbUJ+M2K2
                  MD5:DA4B6F39FC024D2383D4BFE7F67F1EE1
                  SHA1:7CC975D9FF785E269163897907D0B9B3CEE29956
                  SHA-256:544697A024ABAEA1B24EAA3D89869B2C8A4C1ACF96D4E152F5632D338D054C9E
                  SHA-512:D73CC4D911D9E61711B97CB9212D5BC93CB1B1314A39945934EB92239A31728FCCA7FEFBEC0143BAD915B0A7A6B93DF11D0AB7F559737AA7EC920BD24243FFFE
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 16%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I..I..I...1..I...1...I...1..I..l...I..l...I..l....I...1..I..I...I..]...I..]...I..Rich.I..................PE..L...w;.f...............'.....\....................@.......................................@.....................................(................................2..Xh..p....................i.......g..@...............@............................text....~.......................... ..`.rdata..4...........................@..@.data...............................@....reloc...2.......4..................@..B........................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):60466
                  Entropy (8bit):5.603640719549413
                  Encrypted:false
                  SSDEEP:1536:akqg31kqY3Q4Oc//////Q0LatojW/lX1Xb41:3qg323Sc//////Q3tojW/XXy
                  MD5:DE806154A80E3916669C466B6D001BD6
                  SHA1:B85BD0EC436125772A9C5403162628B7AAB35F49
                  SHA-256:10D9B7F2238EFFEB71990F979B9DFE4F3BE3D212B05232EF34C39F9578CC11E3
                  SHA-512:63CC5D6865C89AE2C41EEE3C76FD865D9461E96DBC570270982EB6DB5A15FB234098286CEE3FF9DB2255FEDA5207A222AB67743475AD60CCFD89A86B881BCB94
                  Malicious:false
                  Reputation:unknown
                  Preview:",......,..................."...|%......H+......",..............................................................................................................................................................................................................................................................j.......,.../...5.......3.......................................................................................................................N.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):22016
                  Entropy (8bit):5.668346578219837
                  Encrypted:false
                  SSDEEP:384:VpOSdCjDyyvBwRlX+ODbswYM2s74NS0v0Ac9khYLMkIX0+Gzyekx:rdCjW/lX1PfYM2X1
                  MD5:92EC4DD8C0DDD8C4305AE1684AB65FB0
                  SHA1:D850013D582A62E502942F0DD282CC0C29C4310E
                  SHA-256:5520208A33E6409C129B4EA1270771F741D95AFE5B048C2A1E6A2CC2AD829934
                  SHA-512:581351AEF694F2489E1A0977EBCA55C4D7268CA167127CEFB217ED0D2098136C7EB433058469449F75BE82B8E5D484C9E7B6CF0B32535063709272D7810EC651
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9<.EXR.EXR.EXR.b.).LXR.EXS..XR.b. .FXR.b.(.DXR.b...DXR.b.*.DXR.RichEXR.................PE..L....I6V...........!.....8...P......Q?.......P...................................................................... G..l....?..d.......(...............................................................................P............................text....7.......8.................. ..`.data...<<...P.......<..............@....rsrc...(............D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):22528
                  Entropy (8bit):6.674611218414922
                  Encrypted:false
                  SSDEEP:384:yTxz0Cv0hqd+1TjQmd9YWrSUEc//////OD5hF92IJpJgLa0MpoYfAz6S:jCvsqdS3QGBREc//////Q53NgLa1ub
                  MD5:5AFD4A9B7E69E7C6E312B2CE4040394A
                  SHA1:FBD07ADB3F02F866DC3A327A86B0F319D4A94502
                  SHA-256:053B4487D22AACF8274BAB448AE1D665FE7926102197B47BFBA6C7ED5493B3AE
                  SHA-512:F78EFE9D1FA7D2FFC731D5F878F81E4DCBFAF0C561FDFBF4C133BA2CE1366C95C4672D67CAE6A8BD8FCC7D04861A9DA389D98361055AC46FC9793828D9776511
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 5%
                  Reputation:unknown
                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................6..........dD.......P....@.....................................................................Y.......................................p...................................................................................CODE....|4.......6.................. ..`DATA....8....P.......:..............@...BSS..........p.......L...................idata...............L..............@....edata..Y............P..............@..P.reloc..p............R..............@..P.rsrc................V..............@..P.....................X..............@..P................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4608
                  Entropy (8bit):4.666004851298707
                  Encrypted:false
                  SSDEEP:48:iYXzAm8HGJLvwM8GJFd6I7W4JtT2bxNNAa4GsNf+CJ8aYqmtlKdgAtgma1QvtCSJ:lz2mJkpGR6GY74GQ1YqmstgGCtR
                  MD5:FAA7F034B38E729A983965C04CC70FC1
                  SHA1:DF8BDA55B498976EA47D25D8A77539B049DAB55E
                  SHA-256:579A034FF5AB9B732A318B1636C2902840F604E8E664F5B93C07A99253B3C9CF
                  SHA-512:7868F9B437FCF829AD993FF57995F58836AD578458994361C72AE1BF1DFB74022F9F9E948B48AFD3361ED3426C4F85B4BB0D595E38EE278FEE5C4425C4491DBF
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........s.I...I...I...n|f.L...I...Q...@..K...@..H...@..H...RichI...........PE..L...`..N...........!......................... ...............................`.......................................#....... ..<....@.......................P..|.................................................... ..`............................text............................... ..`.rdata....... ......................@..@.data... ....0......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):82944
                  Entropy (8bit):6.389604568119155
                  Encrypted:false
                  SSDEEP:1536:Dli3i1jKfTV0LzYpAzMk2nACScLw5jPAT:j9KLQ+ScLw5jPAT
                  MD5:165E1EF5C79475E8C33D19A870E672D4
                  SHA1:965F02BFD103F094AC6B3EEF3ABE7FDCB8D9E2A5
                  SHA-256:9DB9C58E44DFF2D985DC078FDBB7498DCC66C4CC4EB12F68DE6A98A5D665ABBD
                  SHA-512:CD10EAF0928E5DF048BF0488D9DBFE9442E2E106396A0967462BEF440BF0B528CDF3AB06024FB6FDAF9F247E2B7F3CA0CEA78AFC0CE6943650EF9D6C91FEE52A
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W=.e9n.e9n.e9n...n.e9n...n.e9n..Bn.e9n.e8n.e9n.7.n.e9n...n.e9n...n.e9n...n.e9nRich.e9n........PE..L...,.N...........!.........^.......%...............................................3..................................`...$'..d....`.......................p...................................... ...@...............h............................text...1........................... ..`.rdata..P/.......0..................@..@.data........0......................@....rsrc........`.......*..............@..@.reloc.......p.......,..............@..B........................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):358363995
                  Entropy (8bit):6.972150585647623
                  Encrypted:false
                  SSDEEP:3145728:KTzytRGD/CYRNIPKYTFBhfmOS9KBaVzTx9OSsKV97nM:KnUs4tvaVzTD99M
                  MD5:5F9D89B40243E83C0B48206CE4EB77D1
                  SHA1:477A019AB11E5793168B3E41D83B80A8AC8F1D43
                  SHA-256:2BF31800E731EF63E7E5BDEECD87B50B349EC8F5C9D752AACB807AC0E82E95B9
                  SHA-512:5B812C2D341FE8A9296EF68E416E0EFA8185FB3ECCEC0917AB206CD7639E1810E6444538B61583E2260F1A46D4209E1995CFBF940A1D9836C4155ADF0504940B
                  Malicious:false
                  Reputation:unknown
                  Preview:........,.......................H...........................................................................................................................................................................................................................................................e...i...............j.......................3.......................................................................................................................t....V..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\45DE.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):107232830
                  Entropy (8bit):7.999946456161068
                  Encrypted:true
                  SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                  MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                  SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                  SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                  SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.01057775872642915
                  Encrypted:false
                  SSDEEP:3:MsFl:/F
                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                  Malicious:false
                  Reputation:unknown
                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012096502606932763
                  Encrypted:false
                  SSDEEP:3:MsEllllkXl:/M/6
                  MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                  SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                  SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                  SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.011852361981932763
                  Encrypted:false
                  SSDEEP:3:MsHlDll:/H
                  MD5:0962291D6D367570BEE5454721C17E11
                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:modified
                  Size (bytes):8192
                  Entropy (8bit):0.012340643231932763
                  Encrypted:false
                  SSDEEP:3:MsGl3ll:/y
                  MD5:41876349CB12D6DB992F1309F22DF3F0
                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                  Category:dropped
                  Size (bytes):262512
                  Entropy (8bit):9.553120663130604E-4
                  Encrypted:false
                  SSDEEP:3:LsNlHbC:Ls37
                  MD5:A7B39E50CEE39C3A5E52FCAD8BC4BAA4
                  SHA1:95D36B1843FCE0FB9F137394CBEC234638B1495D
                  SHA-256:9D139D73640CF2B7CC4FF2C26EF14F0C18B88F7C40F8DFE2969CB29D03F1998A
                  SHA-512:C79D4728E9B662BF7A2C3AB4B2C19CABA2AF3CCFAB175B89685ABBD88381612A22643ED9D5253A77627B78A66FB8E591392EB17A7C022CD3A9963477DC1C9995
                  Malicious:false
                  Reputation:unknown
                  Preview:.............................................z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):4.622398838808078
                  Encrypted:false
                  SSDEEP:96:QPjzIyfbInD3W0IwrBmEH7UewW4ORIhmY5XO40uK8DDzNt:pQIS0IwrJbU7W4kIX5e4kgF
                  MD5:97D4D47D539CB8171BE2AEFD64C6EBB1
                  SHA1:44ABF82DD553CCE0C1F41B9B78D853075DDD1F16
                  SHA-256:8D996D5F68BF2248F223C4F3549303BC6A8EC58CC97FCB63B7BB7D8068850273
                  SHA-512:7D402847B093E208410C695095DE815A3F5D5DA81630FD51C88C009C48C269D0EA5016D626351BB9D38862163FAD930645072C50ACCCD743DC0E19531A592FDE
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 7%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....&.].........."...0.............64... ...@....@.. ....................................@..................................3..O....@.......................`.......2............................................... ............... ..H............text...<.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................4......H........#...............1...............................................0..-.......(....r...p(.....(.......(....,...(....*(....*....0..T........~....(.....~....(.....(....s....%.o....%.o....%.o....%.o....%~....o....(....&..&..*........PP.......0..6.......(....(......( ...r...p~....r...p(!.....("...,...(#...*...0..........r...p.~$.....o%.....,..~....o&......,..o'....ra..p.~$.....o%.....,..~....o(......,..o'....r...p.~$.....o%.....,..~....o(......,..o'......&..*....4.......#..
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.01057775872642915
                  Encrypted:false
                  SSDEEP:3:MsFl:/F
                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                  Malicious:false
                  Reputation:unknown
                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012096502606932763
                  Encrypted:false
                  SSDEEP:3:MsEllllkXl:/M/6
                  MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                  SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                  SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                  SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.011852361981932763
                  Encrypted:false
                  SSDEEP:3:MsHlDll:/H
                  MD5:0962291D6D367570BEE5454721C17E11
                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8192
                  Entropy (8bit):0.012340643231932763
                  Encrypted:false
                  SSDEEP:3:MsGl3ll:/y
                  MD5:41876349CB12D6DB992F1309F22DF3F0
                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                  Malicious:false
                  Reputation:unknown
                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                  Category:dropped
                  Size (bytes):262512
                  Entropy (8bit):9.553120663130604E-4
                  Encrypted:false
                  SSDEEP:3:LsNlmCf+t:Ls3mCG
                  MD5:C5CC4E055B1D8C01ECD319A3C8307DB0
                  SHA1:F6B100F83C351369CEC80310DAED6DCA8B853000
                  SHA-256:DE7D19C31DB62AF9DD523341EB8916457E10A54757AA08484C95561D0F98F393
                  SHA-512:10B2CBDAF016744DE1D4EF01331FDF4A2C4494E357A3F0C950302C289FF155E1068BD471836037D6912FF982BBDEC28E05D5D0A2960B1E083BF85605976D6369
                  Malicious:false
                  Reputation:unknown
                  Preview:.........................................^...z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):296448
                  Entropy (8bit):5.660420770467009
                  Encrypted:false
                  SSDEEP:3072:xTpjI4TptgvmHMaellnhblkK0m2QEk0xjo4OVzdvayfvYn6A:ppbVtsg1e5b2Px2zdyyq
                  MD5:7A3502C1119795D35569535DE243B6FE
                  SHA1:DA0D16BC66614C7D273C47F321C5EE0652FB5575
                  SHA-256:B18FEFB56ED7B89E45CEC8A5494FBEC81E36A5CB5538CCBB8DE41CCE960FAA30
                  SHA-512:258B111AC256CD8145CBE212D59DFF5840D67E70EFFD7CDDC157B2A3461B398BBC3446004980131FAA6A8762C19305F56E7B793F045331B56B8BD17D85B884C4
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....rf..............0.............>.... ........@.. ....................................@....................................O.......t............................................................................ ............... ..H............text...d.... ...................... ..`.rsrc...t...........................@..@.reloc..............................@..B................ .......H....... ...$...........D...p............................................(....s....*Z..(....,...(....(....*.(....*..(....*..(....*.......*.~....*....0..W.......(....".....(......,..o....-..*.o.....+...( .....o....&..(!...-...........o"....."...BZ*.......%..A.......0..Q.......(....(........,..o....-..*.o.....+...( .....o....&.._...(!...-...........o".....*.........!. A.......0..V.......(....(......,..o....-.*~#.....o.....+...( ...."...B[..o....&..(!...-...........o"....*......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):462336
                  Entropy (8bit):6.803831500359682
                  Encrypted:false
                  SSDEEP:6144:leSYvQAd10GtSV41OJDsTDDVUMle6ZjxLV/rHo0Oaaz2R9IY:oJBdBS4msNUCe65frHMnz2R9
                  MD5:6DED8FCBF5F1D9E422B327CA51625E24
                  SHA1:8A1140CEBC39F6994EEF7E8DE4627FB7B72A2DD9
                  SHA-256:3B3E541682E48F3FD2872F85A06278DA2F3E7877EE956DA89B90D732A1EAA0BD
                  SHA-512:BDA3A65133B7B1E2765C7D07C7DA5103292B3C4C2F0673640428B3E7E8637B11539F06C330AB5D0BA6E2274BD2DCD2C50312BE6579E75C4008FF5AE7DAE34CE4
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=N...........!................N#... ...@....@.. ..............................T.....@.................................."..O....@..P....................`......."............................................... ............... ..H............text...T.... ...................... ..`.rsrc...P....@......................@..@.reloc.......`......................@..B................0#......H.......0U..l...........P%.../..P ......................................6..`N.?O...%.C.k_..d...I......5a.......9x......R...gg8...JM...`.[. .o..eE1$_.M.h.q.oz..1..........@....s.c/J..wk.D.....t..&...(....*...0..2........r...p(....}.......}"....(........(.........(....*..r...p(....}.......}"....(........(....*..0..j.........o....-..s#...+..}......(......(......}.....(....s....}......}......}......(......%-.&r...p}......j(#...*rr!..p.{.....{.....B...(....*..0..A........{..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):574376
                  Entropy (8bit):5.8881470355864725
                  Encrypted:false
                  SSDEEP:12288:ZzfhypmNGgHA37YyUD1AboTf3xnpJbC8VGSBJjRuz7:ZoI1AbQf3xnpJbC8VLBJjRuz7
                  MD5:8F81C9520104B730C25D90A9DD511148
                  SHA1:7CF46CB81C3B51965C1F78762840EB5797594778
                  SHA-256:F1F01B3474B92D6E1C3D6ADFAE74EE0EA0EBA6E9935565FE2317686D80A2E886
                  SHA-512:B4A66389BF06A6611DF47E81B818CC2FCD0A854324A2564A4438866953F148950F59CD4C07C9D40CC3A9043B5CE12B150C8A56CCCDF98D5E3F0225EDF8C516F3
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Ot............" ..0.............6.... ........... ....................................@....................................O.......................................T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........f...P............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X.+....b...aX...X...2.....cY.....cY....cY...{...._..{........+,..{E....3...{D......(....,...{D...*..{F.......-..*...0...........-.r...ps....z.o......-.~....*.~....X...+....b..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):561424
                  Entropy (8bit):4.606896607960262
                  Encrypted:false
                  SSDEEP:6144:XqqUmk/Rik2rH6dl0/IaHNpOVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QyMYFLse:DUK
                  MD5:928ED37DB61C1E98A2831C8C01F6157C
                  SHA1:98103C2133EBDA28BE78BFE3E2D81D41924A23EE
                  SHA-256:39F6A4DB1BE658D6BAFF643FA05AAE7809139D9665475BFCA10D37DCA3384F21
                  SHA-512:F59387BFA914C7DB234161E31AD6075031ACA17AAEF4B8D4F4B95C78C7A6A8D0E64211566CA2FD4549B9DA45231F57A4191FBCD3809404653F86EE2ABD4937A4
                  Malicious:false
                  Reputation:unknown
                  Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>Newtonsoft.Json</name>.. </assembly>.. <members>.. <member name="T:Newtonsoft.Json.Bson.BsonObjectId">.. <summary>.. Represents a BSON Oid (object id)... </summary>.. </member>.. <member name="P:Newtonsoft.Json.Bson.BsonObjectId.Value">.. <summary>.. Gets or sets the value of the Oid... </summary>.. <value>The value of the Oid.</value>.. </member>.. <member name="M:Newtonsoft.Json.Bson.BsonObjectId.#ctor(System.Byte[])">.. <summary>.. Initializes a new instance of the <see cref="T:Newtonsoft.Json.Bson.BsonObjectId"/> class... </summary>.. <param name="value">The Oid value.</param>.. </member>.. <member name="T:Newtonsoft.Json.Bson.BsonReader">.. <summary>.. Represents a reader that provides fast, non-cached, forward-only access to s
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):215862
                  Entropy (8bit):5.849338245796311
                  Encrypted:false
                  SSDEEP:3072:rFi6z/VXzAf3oc8+vat7fvYnDAdOVz5kNx:rxFSI+y1qk6zuNx
                  MD5:9D21A25AA1B5985A2C8CBCE7F7007295
                  SHA1:86EBF56352B4DBB831FAE0CCA180B4ADD951240D
                  SHA-256:E41F984C39183BA4FD1578134D71E203F4A7A8C23F278924562876326FC40EE2
                  SHA-512:EE4A1AC97968F2DDA3C54A49AC33D3FCE28C4DAE72032D9FDD1F8D8BA41B07A1D78D15E11586DA54AD5E0F2BD4A48C79A0CBAC84DE3D957B2AC6C1B5F41A33BB
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):875520
                  Entropy (8bit):5.621956468920589
                  Encrypted:false
                  SSDEEP:12288:jsRfnBqqvFXWesd2HiZ9fyn+5FHrvUR1Qnzx7LuQ:jsRITeWAQ5vtu
                  MD5:B03C7F6072A0CB1A1D6A92EE7B82705A
                  SHA1:6675839C5E266075E7E1812AD8E856A2468274DD
                  SHA-256:F561713347544E9D06D30F02A3DFCEC5FE593B38894593AEEDF5700666B35027
                  SHA-512:19D6792EB9BA8584B94D0D59E07CE9D1C9C4DA5516490F4ABCE5AE0D7D55B357BDA45B2093B3E9EB9D6858061E9D3F530A6655C4779A50C911501AE23925C566
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..R...........p... ........... ....................................@..................................p..O.......x............................o..T............................................ ............... ..H............text....P... ...R.................. ..`.rsrc...x............T..............@..@.reloc...............Z..............@..B.................p......H....... .................................................................(....*..(....*..(....*^.(.......=...%...}....*:.(......}....*:.(......}....*^.(.......>...%...}....*:.(......}....*.(.........*....0..,.......(....o.......3..*....... ....3.(....-..*.*.*.0..L.......~..... . ..(......(....-..(....r...p( ...,.......&...~....(!...,..(".....*.*........+1...........4.......~....*.~....*..(....*.~....,.*.(#...-.(....-..(....+.r...ps$...z(..........*b.r...p(%...~.....(....&*.r
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1946739
                  Entropy (8bit):7.989700491058983
                  Encrypted:false
                  SSDEEP:49152:fpXzD2VLpS71ycdao6LreGCL/0jJZWOiBiXkbEia9T:xjyFgZ0Lr2/0jJU5BiIEN
                  MD5:96AD47D78A70B33158961585D9154ECC
                  SHA1:149BF6F6905A76B0CC9E9ACA580357BD6C3497A2
                  SHA-256:C861117D1F1DBF02867B46FA87CB8C65C3213D196029EE81A02B617D131236E2
                  SHA-512:6A971F742B5754EEF39C6C2C64DB13DFDCB74D8CB23833404E9EF5AD89E142278E5DF789F508DB561C5E957013AE0C60D002CDFA93BCD87CA4967D610DF1579B
                  Malicious:false
                  Reputation:unknown
                  Preview:........V...f.....g.7........................!.....%....o8...).>...).F...).H...).X...).a...)*i...).k...).q...)Lt...).v...)Tw...).x...).}...).....)I....)i....)....).....).....)L....)....)....)t....).....).....).....)s....).... )....!)....")....#)....$)}...%)+...&)h#..').'..().-..)).>..*).A..+).C..,).Q..-)CU...).]..<).d..=).l..>)i...?)G...@)H...A)r...B)....C)z...T)....U)....V)+...W)....X)....Y)....Z)....[)#...\)}...]).!..^)R1.._).2..`).;..a).=..b)mE..c)QG..d).H..e)qL..f).U..g).]..h).b..i))d..j).e..k).g..l)Pi..m).p..n).z..s).z...).....)b....).....)'....).....)....)....).....).....)....).....)s....)F....)j....)....).....)....)....)....)h....)H....)....).....).....)k....).....)L....)q....)2....).....).....).....).....).....)N....)|....).....).....).....).!...).)...).6...).C...)RE...).L...).N...).O...).U...)bV...).W...).^...)o_...)(g...)Si...).v...).....)0....)/....).....),....).....*.....*F....*]....*3....*v....*....*v....*.....*.....*.....*$... *....!*8..."*....#*....$*....%*..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):214119
                  Entropy (8bit):7.955451054538398
                  Encrypted:false
                  SSDEEP:6144:m5S+8U5mtp0ra7rFrJzw95T9OHCZg0Gb0OveGe04mExhLY:mWU5OGUFoqoORehrQ
                  MD5:391F512173ECEC14EB5CE31299858DE1
                  SHA1:3A5A41A190C1FB682F9D9C84F500FF50308617FC
                  SHA-256:E0F5C754C969CCA0AC4594A6F3F2C23D080A09EEA992AF29E19F4291FD1E0B06
                  SHA-512:44D7B9BCB3544C3F5550150EF3522BF6A0B36900695E6A13E44F5616E16A058548189D4FEA4A22248B1CB2B273B0EAA7D559EB2D8F013BED520E4097BD45D800
                  Malicious:false
                  Reputation:unknown
                  Preview:........................#.b...&.....:.g....7.....7.....7.....7|(...7.-...7t5...7.6...7.9...7s:...7hB...7.E...7.G...7.K...7qN...7.Q...7yR...7.S...7.W...7.\...7.b...7.i...7.k...76m...7Vq...7.r...7.v...7.y...7.{...7.~...7Z....75....7;....7W....7.....7c....7u....7b....7.....7.....7.....7Q....7*....7\....8."...8,)..<FqG..=F7I..>F.L..?F$O..@F.P..AFaQ..BFnT..CF.W..DF.Y..EFJ\..FF.^..MF(b..NF.c..QF.e..RF.f..YFZg..ZF.p..[F.x..\F.{..]F.{...L.|...L.....L....Ni....N.....NJ....N2....N+....N^....No....N9....NK....N....N1....N$....N....Nh....N.....N.....U.....U.....U.....U.....U.....U[....U.&...Uh(...U?/...U.4...U.:...U.@...U.B...U,G...U.K...U)N...U.R...UF\...U.`...U.b...U.j...U]s...UEt...U.u...U.w...U.z...Uh{...U.}...U#....U.....U^....U.....U|....U.....U.....U.....U.....U.....U.....U.....U.....U.....U]....U?....U.....U9....U....U.....Um....U<....U!....U.....U.....U....Uq....U3....U!....U.....U....U.....Uu....UJ....U.....U.....U.....U.....U`....U'....U.....U.....Ul....U%....U7....U.....U.....UW.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):290001
                  Entropy (8bit):7.9670215100557735
                  Encrypted:false
                  SSDEEP:6144:tS+8U5mtp0ra7rFriDQYaF+9bQHgs4jTlmOHCZVWGMRe8InVXYopym74:CU5OGUFrfs4gs4jTQ6ebVIo374
                  MD5:BF59A047984EAFC79E40B0011ED4116D
                  SHA1:DF747125F31F3FF7E3DFE5849F701C3483B32C5E
                  SHA-256:CD9BE67AA0527F16E309189FA2369E1A2596D0601A7D55C405F8A619F4D095E9
                  SHA-512:85A545758E8C89EF47BF11B553C57D23ED7DA6AE89A8BCCB262F509AABE61A1121C3F87EC9200791F2670225BAEECC3C92AED6AFDA86C08CA0FD611DA2E595D2
                  Malicious:false
                  Reputation:unknown
                  Preview:........................#.....&.....:......7.....7.....7.....7.+...7.1...7.8...7.9...7)<...7.=...7xE...7.H...7.J...7'N...7.Q...7.T...7.U...7.W...7.Z...7._...7.e...7.l...7.n...7Fp...7ft...7.v...7)y...7.|...7.~...7.....7j....7E....7K....7g....7.....7s....7.....7r....7.....7.....7.....7a....7:....7l"...8.%...8<,..<F.J..=F.N..>FtV..?F9\..@Fw_..AFr`..BF0g..CFll..DF|o..EF.v..FF){..MF....NF...QFf...RF....YF`...ZF...[F....\F....]F....L*....L.....L.....N.....N.....N.....N.....N.....N.....N.#...N.&...N.'...N.)...N.*...N.+...Nv,...N.-...N;r...N.|...Um....U.....UM....UV....U.....U....UC....U.....U....UM....U.....U.....Um....U.....U.....U.....U.....UQ....U.....U7....U.....U.....Uk....U.....U.....U.....U.....U.....U.....U.....U.....U.....U{....U.....U.....U.....U~&...U.)...U.Q...U.Q...U.V...U.[...U.\...U._...U.`...U?a...U.a...Uic...U.d...U\f...U.g...U.i...U1l...U.p...U.u...U.}...U.....U.....U^....U.....U.....Ux....U....U.....Uy....U6....U.....U....UR....Uq....U.....U.....U_....U.....U.....U..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1305142
                  Entropy (8bit):7.99463351416358
                  Encrypted:true
                  SSDEEP:24576:8AkckSbnVLjWG13xdT0b+SLzRYt2k+lbG9EjJNH/osm22O+EcRfPLP:88zVXWG1hdAKSxY4k5EFNHgvPPLP
                  MD5:20DDA02AF522924E45223D7262D0E1ED
                  SHA1:378E88033A7083AAC24E6CD2144F7BC706F00837
                  SHA-256:8448C2BA10A3D7DC8CA3FB24F580BF99D91F746107B1A06E74932749CC1CAB01
                  SHA-512:E71320B2AA0CB52938206EC00187D78274646C4C7D3579B33A0163262C063B7813FE7ACD0D2E5807082ADE772069AA577FED7F594964790C2F7C061CE38467B6
                  Malicious:false
                  Reputation:unknown
                  Preview:........i...f+....i+....l+....m+{...n+q...o+7(..p+.1..q+X3..r+~5..s+aI..t+.]..u+.f..v+Ui..w+'k..x+.l..y+.q..z+.s..{+O{..|+...}+=...~+.....+....+-....+.....+.....+.....+.....+.....+.....+.....+.....+.....+%....+.....+&(...+.Q...+.Y...+Xe...+Bj...+cv...+.}...+....+H....+....+Q....+l....+I....+.....+ ....+T....+!....+m....+.....+.....+U....+.....+.....+.....+l....+~....+.....+=....+w....+.....+-"...+.(...+.0...+.2...+.4...+.G...+uS...+.....+9....+y....+.....+.....+N....+....+0....+.....+.....+.....+_....+.....+.....+.....+.....+.....+.....+.....+.....+S....7`....7R...(7/...)7.....L.m...LO....L.....Mk....M.....M.....M>....M.....M.....Mq....M.....M.....M\....M.....M.....M.....M.....M.....M.....M.....M.....M.....MO....M.....M.....M.!...M.(...Mf5...M.;...M&E...M.P...M.T...M<]...M.`...M.j.. M.k..!M2v.."M.w..#M.z..$M....%M...&M...'M#...(M@...)M....*M(...+MY...,Mu...-M$....M..../MV...0M;...1Mx...2M....3M....4Mi...5M....6M....7MP...8M"...DM....EM.....Mi....M.~...M.~...Mb....M_....M....M.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:current ar archive
                  Category:dropped
                  Size (bytes):87182312
                  Entropy (8bit):5.477474753748716
                  Encrypted:false
                  SSDEEP:196608:v0b1XAJ5V8XYcrfCNJsTtU0ZhdYHbgMnn6d25JOcLRiLnIrBcnK0EAeg1GF:78JaNJyZhdE6383rWEAR8
                  MD5:FFD456A85E341D430AFA0C07C1068538
                  SHA1:59394310B45F7B2B2882D55ADD9310C692C7144F
                  SHA-256:F188B96639B5157E64222BB8483D76CD21A99141FC2614EF275E20639C739264
                  SHA-512:EB4CB388383CB37B1D89531D560169985A80DF9335F005AFBBFDE56F9031821A933D735138B1086CF81D006E480FF14711A8A95B3DB8A0FD4037AA6EFD926B50
                  Malicious:false
                  Reputation:unknown
                  Preview:!<arch>./ 1696073295 0 1940897 `...Y..:.t.:.>.:...:...:...:...:...;/..;/..;/..;/..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..@...@...@...@...@...A...A...A...A...A...A...A...A...A...A...A...A...Co..Co..Co..Co..Co..Co..Co..Co..Co..Co..E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...G..G..G..G..G..G..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):656926
                  Entropy (8bit):7.964275415195004
                  Encrypted:false
                  SSDEEP:
                  MD5:3404DD2B0E63D9418F755430336C7164
                  SHA1:0D7D8540FDC056BB741D9BAF2DC7A931C517C471
                  SHA-256:0D3FCA7584613EB1A38BAF971A7DD94F70803FC130135885EC675E83D16A4889
                  SHA-512:685D63633DB8A57D84225C2B92C92016E1CE98BA2BF8D3DDACE2EB120B3BCF84C718787D59DB6EC61F34CF91CB651500B4E4FF0AC37AEB89561CDCC586946C80
                  Malicious:false
                  Reputation:unknown
                  Preview:..........+...........................&..........;.....;N....;.....;"....;.....;.....;N....;.....;.....;s....;....;.....;.....;....;4....;.....;.....;0....;.....;c....;7....;.....;.....;.....;.....;?....;:....;G....;.....;n....;x....;.....;.....;.....;#....;.....;.....;B....;.....;.....;.....;N....;.....;.....;+....;.....;% ...;c!...;.!...;."...;E+...;t4...;qH...;I\...;.]...;.^...;>a...;.c...;.g...;.o...;pw...;.|...;h....;.....;.....;....;.....;....;o....;.....;.....;.....;*....;y....;.....;.....;3....;9....;h....;.....;.....;.....;F....;."...;.+...;.0...;.8...;?:...;'X...;.q...;.....;....;.....;t....;.....;.....;.....;./...;.X...; m...;....;.....;.....;.....;+....;.....<O....<.....<.....<=....<2$...<y+...<.3...<.<...<aA...<.L...<.W...<.[...<._...<.d...<Dv...<t....<!....<....<....<.....<.....<.....<V....<.....<.#...<.8...<|F...<hP...<bW.. <i^..!<ts.."<(...#<{...)<`...*<c...+<d...,<"...;<x...<<k...=<....><-...?<....@<....A<'...B<g...C<....D<U...E<....F<....G<....J<....K<....L<v%
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1017158
                  Entropy (8bit):7.951759131641406
                  Encrypted:false
                  SSDEEP:
                  MD5:3FBF52922588A52245DC927BCC36DBB3
                  SHA1:EF3C463C707A919876BF17C3E1CD05C0D2C28CA9
                  SHA-256:C6FE346106C5E4950161ED72EB0A81FE3537A94E4A59461AAF54E750D1904F76
                  SHA-512:682EB6D61B564C878FDB971A6439FCDA9F1E108BD021A32E8990B68B1338986A4866A0965DEA62567501C8826D43CEBF2B7C8BE8323DE415A75E8D89A9D592E7
                  Malicious:false
                  Reputation:unknown
                  Preview:..........+.....................b................;.....;&....;.....;.....;.....;.....;b....;....;8....;.....;.....;o....;....;<....;.....;.....;l....;....;/....;.....;[....;Q....;.....;j....;.....;.....;L'...;.E...;lZ...;.o...;.q...;.r...;.s...;.{...;.{...;.~...;"....;.....;U....;.....;.....;.....;....;d....;.....;.....;i....;.....;f....;....;0....;.....;.....;.(...;+*...;.+...;A....;54...;.9...;,O...;.`...;.n...;.~...;.....;.....;M....;....;;....;q....;Z....;.....;.....;.-...;\=...;.P...;.d...;@|...;.....;Y....;#....;_....;/....;.....;.#...;.;...;.J...;gc...;cf...;W....;....;W....;.....;.....;.....;7....;.-...;.I...;Y\...;W....;....;.....;S....;.....;t....;.....;.....<W....<.&...<9<...<iG...<jQ...<.X...</a...<gi...<.n...<Pz...<.....<f....<.....<I....<.....<.....<.....<4C...<4d...<....<....<.....<.....<.....<D8...<.e...<_....<....<.... <I...!<...."<.E..#<.E..)<.G..*<%j..+<N...,<....;<....<<v...=<....><....?<....@<y...A<....B<....C<....D<....E<"F..F<.J..G<.O..J<.X..K<.e..L<.r
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):1174528
                  Entropy (8bit):6.475826085865088
                  Encrypted:false
                  SSDEEP:
                  MD5:207AC4BE98A6A5A72BE027E0A9904462
                  SHA1:D58D2C70EA0656D81C627D424F8F4EFCCEF57C86
                  SHA-256:2BA904DA93ACC4766639E7018AC93CC32AA685DB475F3A59B464C6BC8B981457
                  SHA-512:BFB6C58774829DB3D5FADC92CB51477FF4EAC8FB934DB6583A312BB1157468F6DD3A4A3AFAF25A687B74890DC8A69857A12D0B38B18D83E82836E92E02046FF3
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....v...p......P.....................................................@A........................vT......AX..<.......x...........................<<.......................;......(...............<[.......O.......................text....u.......v.................. ..`.rdata..\............z..............@..@.data...H...........................@....00cfg...............F..............@..@.crthunk.............H..............@..@.tls.................J..............@...CPADinfo(............L..............@...malloc_h.............N.............. ..`.rsrc...x............P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):2106216
                  Entropy (8bit):6.4563314852745375
                  Encrypted:false
                  SSDEEP:
                  MD5:1C9B45E87528B8BB8CFA884EA0099A85
                  SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
                  SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
                  SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 3%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4127200
                  Entropy (8bit):6.577665867424953
                  Encrypted:false
                  SSDEEP:
                  MD5:3B4647BCB9FEB591C2C05D1A606ED988
                  SHA1:B42C59F96FB069FD49009DFD94550A7764E6C97C
                  SHA-256:35773C397036B368C1E75D4E0D62C36D98139EBE74E42C1FF7BE71C6B5A19FD7
                  SHA-512:00CD443B36F53985212AC43B44F56C18BF70E25119BBF9C59D05E2358FF45254B957F1EC63FC70FB57B1726FD8F76CCFAD8103C67454B817A4F183F9122E3F50
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!7P.OdP.OdP.Od..NeR.OdP.Nd..OdY..dU.Od.Jem.Od.KeQ.Od...dQ.Od..Leo.Od..Je..Od..OeQ.Od..Ge..Od..Kec.Od...dQ.Od..MeQ.OdRichP.Od................PE..L..................!.....2<..*...............P<...............................?.......?...@A.........................<<.u.....=.P.....=.@.............>..%....=.........T....................u..........@.............=..............................text...e0<......2<................. ..`.data...`"...P<......6<.............@....idata........=.......<.............@..@.rsrc...@.....=.......<.............@..@.reloc........=.......<.............@..B........................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):2205743
                  Entropy (8bit):7.923318114432295
                  Encrypted:false
                  SSDEEP:
                  MD5:54D4E14BFF05C268248CAB2EEDFB61DD
                  SHA1:33AF472176F6E5FB821FFE23C9FBCCC7C735B5B9
                  SHA-256:2CAC401BFFA9FD4DFFE11E05EE18FC5CA7A30EC5BF7EF6A3EA8518A4F3344790
                  SHA-512:5A6893E7EA30EAA0EFF44687B0D15366A8224E476E4AE8FE0D5C7EF2B3C62E6B0184F73EAD36C4E4E08D6936524CEF8429660B3EC29453EED128E3C5368CE78C
                  Malicious:false
                  Reputation:unknown
                  Preview:........K....[.....[.....[.....[Y....[.....[.....[.....[.....[P ...[.!...[."...[.#...[.$...[.%...[.%...[T&...[0'...[/(...[.(...[.(...[.*...[.+...[{,...[1-...[.-...[3....[b/...[.0...[.1...[.2...[.3...[,4...[.4...[P5...[.5...[#6...[!8...[.8...[.9...[.9...[::...[q;...[Y=...[.=...[ ?...[.@...[0A...[iB...[?D...[.E...[pE...[UF...[.G...[.H...[)I...[.I...[.M...[.M...[DN...[.N...[FO...[.O...[.Q...[oV...[uW...[cX...[[\...[.]...[Ea...[bc...[.c...[ d...[.d...[oe...[.f...[.h...[.i...[Xj...[.k...[.l...[An...[.o...[.p...[.....[....[.....[.....[.....[.....[[!...[.%...[d....[x1...[.4...[.4...[.9...[.C...[.Q...[KS...[#V...[=]...\.b...\.z...\Q}...\.....\.....\*....\`....\.^...\7b...\uy...\g....\.....\.....\=....\....\....\....\'....\.....\....\.... \....!\...."\....$\....%\....&\....)\....*\....+\.Q..,\.S..-\.U...\..../\w...0\....1\8...2\....3\....4\....5\....6\....7\.T..8\.z..9\6...:\....;\c...<\)&..=\.*..>\>5..?\JU..@\.r..A\....B\9...C\....D\S...E\....F\\y..G\Y...H\%...I\....J\M...K\.a..L\.j..M\.n
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):10717392
                  Entropy (8bit):6.282534560973548
                  Encrypted:false
                  SSDEEP:
                  MD5:E0F1AD85C0933ECCE2E003A2C59AE726
                  SHA1:A8539FC5A233558EDFA264A34F7AF6187C3F0D4F
                  SHA-256:F5170AA2B388D23BEBF98784DD488A9BCB741470384A6A9A8D7A2638D768DEFB
                  SHA-512:714ED5AE44DFA4812081B8DE42401197C235A4FA05206597F4C7B4170DD37E8360CC75D176399B735C9AEC200F5B7D5C81C07B9AB58CBCA8DC08861C6814FB28
                  Malicious:false
                  Reputation:unknown
                  Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ......E.......E.......E..P/...E.../...E..P7...E...7...E...h...F...h.. F..Pi..0F......DF.....WF.....jF..P...}F.......F..`....F.......F.. ....F.......F..0....F.......G......G......(G.....;G..@...NG......aG.....tG.......G.......G..@....G.......G.......G.......G..P....G.......H.......H..P...2H......EH..`...UH......hH......yH..P....H.......H.......H..`....H.......H.......H..P....I.......I......-I..@...=I......PI......aI..@...uI.......I...0...I.. 1...I..p1...I...e...I...e...I...i...I..`i...J...i..)J...K..BJ..p...^J..."'.uJ..P.'..J....'..J...5'..J..06'..J...>'..J..P?'..K...D'..K...F'.0K...H'.IK...V'.hK....(..K....(..K..P.)..K....)..K..pW*..K..P.*..L...*+.?L..p.+.bL....+..L...U,..L....,..L....,..L....,..L..@.,..M....,.-M..P.-.IM.. e-.`M...e-.~M...R/..M.../..M..0.0..M..@.0..M..P.0..M....0..N....0.!N...,0.9N...,0.NN..0-0.fN...-0.vN...Y0..N...Z0..N..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):377856
                  Entropy (8bit):6.602916265542373
                  Encrypted:false
                  SSDEEP:
                  MD5:8BC03B20348D4FEBE6AEDAA32AFBBF47
                  SHA1:B1843C83808D9C8FBA32181CD3A033C66648C685
                  SHA-256:CBEE7AC19C7DCCCA15581BD5C6AD037A35820DDFE7C64E50792292F3F2E391E6
                  SHA-512:3F9EEC2C75D2A2684C5B278A47FB0E78B57F4F11591FAC4F61DE929F716BBAA8F7DF05E10390408AD6628538611541548C26869822372E9C38D2C9C43881651E
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....`...`............................................... ............@A........................8,..h....:..(.......x........................>..........................D........p..............(<..`............................text....^.......`.................. ..`.rdata..L....p.......d..............@..@.data....4...p.......`..............@....00cfg...............|..............@..@.tls.................~..............@....rsrc...x...........................@..@.reloc...>.......>..................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):6635008
                  Entropy (8bit):6.832077162910607
                  Encrypted:false
                  SSDEEP:
                  MD5:63988D35D7AB96823B5403BE3C110F7F
                  SHA1:8CC4D3F4D2F1A2285535706961A26D02595AF55C
                  SHA-256:E03606B05EEAED4D567EA0412350721C0D566B3096B18C23BD0B3FCDE239E45A
                  SHA-512:D5F5ACA00BE9E875FCD61531CC7F04F520FB12999E36E4FE06BEAAE491B47D2E9FE182015DB1CBFBB8E78CF679F2EB49E20ECDF1B16D1D42058D6F2D91BC3359
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!......L...........@.......................................e...........@A.........................].......^.d.....a.......................a.."...U]......................T].....X.L.............H.^.@.....].@....................text.....L.......L................. ..`.rdata...I....L..J....L.............@..@.data...X....._.......^.............@....00cfg........a.......a.............@..@.tls..........a.......a.............@....rsrc.........a.......a.............@..@.reloc..."....a..$....a.............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):176517632
                  Entropy (8bit):7.025874989859836
                  Encrypted:false
                  SSDEEP:
                  MD5:F5259CC7721CA2BCC8AC97B76B1D3C7A
                  SHA1:C2FC0C8396D8CD6764809A2A592972E2EBCA64BA
                  SHA-256:3FE6A262EF01CB8FD4DC2D4373DE0F1F0A89EE51953452ED4557CB55F1DA9AB4
                  SHA-512:2D01B1F2B24717EFF37965BBC32D167434A65F3DFFF74342D2E2FA8FBB0E97C3F61FDF673A13AD63031D630D9CE46A6F9F0C4F89EBD30C31F3EA55817B9D1331
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.........N.......k....................................................@A........................#..........h....0J.(C....................L.|.\.P................................?..............`.......LY..@....................text............................... ..`.rdata...%2..0...&2.................@..@.data...dr+..`.......>..............@....00cfg........I.......&.............@..@.rodata.@.....I.......&............. ..`.tls..........J.......&.............@...CPADinfo(.....J.......&.............@...malloc_h..... J.......&............. ..`.rsrc...(C...0J..D....&.............@..@.reloc..|.\...L..0\..B).............@..B........................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:current ar archive
                  Category:dropped
                  Size (bytes):40258
                  Entropy (8bit):4.547436244061504
                  Encrypted:false
                  SSDEEP:
                  MD5:310744A0E10BD9C2C6F50C525E4447F9
                  SHA1:9BA62D6AC2CB8EFF46C9B21051677FC1DC66D718
                  SHA-256:E9C55CFF925E26812139CDCAD6612E0D69E317CB7BB1435C9EB5113D338ACCE7
                  SHA-512:6DF9E3F9AFD7CDEC750B006987E5AEC445E163DD0B9CF1A9EA53F78DB2EE5FD654E3B4F82BCA3E1F4BEDB189F5DFA51189C820905676AD048DBE2E0AD405BF5B
                  Malicious:false
                  Reputation:unknown
                  Preview:!<arch>./ 0 0 0 0 14390 `.......8z..:&..:...;...;...<&..<&..<...<...=...=...=...=...>...>...>...>...>...>...?f..?f..?...?...@B..@B..@...@...A$..A$..A...A...B"..B"..B...B...C...C...C...C...D...D...D...D...D...D...E...E...E...E...Fn..Fn..F...F...GZ..GZ..G...G...HJ..HJ..H...H...I$..I$..I...I...J...J...J...J...K ..K ..K...K...L...L...L...L...M...M...M...M...N...N...N|..N|..N...N...Od..Od..O...O...P`..P`..P...P...QP..QP..Q...Q...RT..RT..R...R...S@..S@..S...S...T...T...T...T...U...U...Un..Un..U...U...VP..VP..V...V...W,..W,..W...W...X...X...X...X...X...X...Y\..Y\..Y...Y...ZB..ZB..Z...Z...[,..[,..[...[...\...\...\...\...\...\...]b..]b..]...]...^N..^N..^...^..._6.._6.._..._...`$..`$..`...`...a...a...a...a...b...b...b...b...c...c...c...c...c...c...dj..dj..d...d...e^..e^..e...e...fV..fV..f...f...g8..g8..g...g...h*..h*..h...h...i"..i"..i...i...j...j...j...j...k...k...k...k...l...l...l...l...l...l...mh..mh..m...m...nN..nN..n...n...o2..o2..o...o...p...p...p.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):470498
                  Entropy (8bit):5.409080468053459
                  Encrypted:false
                  SSDEEP:
                  MD5:64F46DC20A140F2FA3D4677E7CD85DD1
                  SHA1:5A4102E3E34C1360F833507A48E61DFD31707377
                  SHA-256:BA5CA0A98E873799A20FD0DF39FDB55AAB140E3CC6021E0B597C04CCE534246D
                  SHA-512:F7D789427316595764C99B00AF0EF1861204F74B33F9FAB0450F670CB56290C92BFB06EF7D1D3B3BF0B6ACDC6295E77F842C49579BD9973E3D5805920CDB2527
                  Malicious:false
                  Reputation:unknown
                  Preview:........$$..e.>...h.F...i.N...j.Z...k.i...l.t...n.|...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................&...........5.....<.....C.....D.....E.....J.....W.....f.....w.................x.................A.......................S.........................................%.....{.......................V.......................J.......................Y.......................e.......................a.......................l...................................O.....f.......................).....z.......................6.....u.......................Q.......................E.....w.................!.....I.....R.............................l.......................f.................+.............................f.......................D.......................<......................._.......................2.....~.................2.....v.................X...........$.....8.................P.....r...........6.....j.....}.................1.....?...................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):763010
                  Entropy (8bit):4.909167677028143
                  Encrypted:false
                  SSDEEP:
                  MD5:3B0D0F3EC195A0796A6E2FAB0C282BFB
                  SHA1:6FCFCD102DE06A0095584A0186BD307AA49E49BD
                  SHA-256:F9F620F599BC00E84A9826948C3DA985AC9ADB7A6FFB4C6E4FBEFEAF6A94CF85
                  SHA-512:CA9217F22C52EF44E4F25142D1AD5DD9D16E4CCC3B6641609E1F4C2650944E35BA4CAB59CA5CD9EA6FEFD6BE1D3E8227FC0E3E6BDEDD14B059CA2C72D096D836
                  Malicious:false
                  Reputation:unknown
                  Preview:........>${.e.r...h.z...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.(...|.....}.@.....H.....M.....U.....].....e.....l.....s.....z.....{.....|...............................................F.....f.....'...........V...........Y.............................5.................F.................!.................d.....z...............................................C...........\.................z...........h...........3...........$.....C.................e.................i.................,.......................X.............................h.......................!.....|...........$.............................1.....}.........................................Z.................|...........'.....N...........F.................;.............................G.................v............ ....4 ..... ....X!.....!.....!....x"....."....Z#.....#....M$.....%.....%.....%.....&....+'.....'.....'.....(....D).....).....)....2*.....*.....*.....*.....+....",.....,
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):838413
                  Entropy (8bit):4.920788245468804
                  Encrypted:false
                  SSDEEP:
                  MD5:C70B71B05A8CA5B8243C951B96D67453
                  SHA1:DEED73A89F0B3EDAB8FF74117CC6B31CB4F426E8
                  SHA-256:5E0D4BC0893A334B6FFF610F66E4A00920530D73EC3257EB9D37A96EBD555C13
                  SHA-512:E000FD3592AC5FE700C4CE117868915C066AC66D5954A1DE4F5AFF0F4559C93F7DFF47623F1837CE827FFF94E91ECD89A974037BE9CCCC8E672E229A1E8115E9
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.!...n.)...o.....p.;...q.A...r.M...s.^...t.g...v.|...w.....y.....z.....|.....}.........................................................................-.....d.................n...........A...........u.......................O.......................D.................Y...........3.....J...........=.....g.....~.....&.................O.......................B.....!...........u...........5...........).....W.................3.....N.....U.....B...........!.........../.....Y........... .......................g...........).....I.................#.....A...........@.................6........... .....D...........I.................%.............................=.................?...................................G...................................).....t............ ..... ..... ..... ....o!.....!....6"....\"....."....S#.....#.....#.....$.....%....V&.....&....5'.....'.....(....J(.....(....X).....).....).....*....z*.....*.....*....t+.....,....{,.....,....--
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):869469
                  Entropy (8bit):4.677916300869337
                  Encrypted:false
                  SSDEEP:
                  MD5:12A9400F521EC1D3975257B2061F5790
                  SHA1:100EA691E0C53B240C72EAEC15C84A686E808067
                  SHA-256:B7FD85B33B69D7B50F6C3FDC4D48070E8D853C255F2711EEDAA40D1BA835F993
                  SHA-512:31EAA1CBF13BC711750B257C6B75813ACC8E4E04E9262815E399A88B96BA7B5BE64CE2450638B5521D5CB36750C64848944168C3234D2CE15A7E3E844A1E1667
                  Malicious:false
                  Reputation:unknown
                  Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....L.....n...................................I...........Q...........q.......................T.................E.......................7.....~...........<.................:.....&...........F.................X...........$.................Z...........X...........m.................C.........................................{...........:.....a...................................8................._...........O.....}...................................$.....h.........................................2.............................3 ....e .....!.....!.....!.....".....".....#....W#.....#....{$....-%.....%.....%.....&....k'.....'....T(.....).....).....).....).....*....`+.....+.....+.....,....p-.....-....&....../...../.....0.....0.....1....o2.....2....73.....4.....4.....4....-5.....5....X6.....6.....6.....7.....8.....9
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1118348
                  Entropy (8bit):4.2989199535081895
                  Encrypted:false
                  SSDEEP:
                  MD5:89A24AF99D5592AB8964B701F13E1706
                  SHA1:2177122C6DCC20E1D07EF43AF5A112E8E5C6B95B
                  SHA-256:5BDBBCD0D07B6AE3A7F96F07871EE541F4111D90D73FD6E112C5ABE040025C96
                  SHA-512:60F6CD73BF35886EF54FA6200F86BCED78DD11F612C8071F63EB31108F109C166D45609879E8E5107024A025BAFCFCF1C80051B6D8FF650D92DCF17136384EB1
                  Malicious:false
                  Reputation:unknown
                  Preview:........($..e.F...h.N...i._...j.k...k.z...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......#.....(.....0.....8.....=.....E.....L.....S.....Z.....[.....\.....a.............................=.....G...........?.....4...........................................................B.....}.....>...........k...........X...........].............................q.....W...................................W...........S...........e.............................I.....m.....e..........._.....(.................9...........q.................p...........5.....X.....8...........Q...........M...........I.....u.....-...........!.....G............ ..... ..... .....!....P".....".....".....#.....%.....%.....&.....'.....'....^(.....(....;).....).....*....6*.....+.....+....1,....],....E-................-/...../....x0.....0.....0.....1.....2.....2.....3...."4.....4....x5.....5.....6....78....*9....]9.....:.....;....;<.....<.....=....?>.....>.....>.....?....y@.....@.... A....&B.....B
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):537139
                  Entropy (8bit):5.397688491907634
                  Encrypted:false
                  SSDEEP:
                  MD5:37B54705BD9620E69E7E9305CDFAC7AB
                  SHA1:D9059289D5A4CAB287F1F877470605ED6BBDA2C8
                  SHA-256:98B2B599C57675EFC1456B38B23CE5657B142E0547F89AB1530870652C8EB4BA
                  SHA-512:42D667FEB59BB5FA619AC43DC94629ED1157CBE602643FB21378A2C524EF1F6E32098E7C62D3F3DE35D9FEDEF6607FE034908601AE3C49156CD0916E2514D2F9
                  Malicious:false
                  Reputation:unknown
                  Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....I.....c.....|................._...........[.....z...........O.................D...........(.....G.................B....._.................A.....T.................8.....I...........3.....u...........(.......................p.................,.......................1.................T.....o.............................v.......................b.......................@.......................@.......................O.......................<.............................`.......................P.........................................M.......................H......................._.........................................n.......................Q.......................[.............................1.................>.........................................6.............................|...........".....>.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):545011
                  Entropy (8bit):5.844949195905198
                  Encrypted:false
                  SSDEEP:
                  MD5:65A2C2A73232AB1073E44E0FB6310A5F
                  SHA1:F3158AA527538819C93F57E2C778198A94416C98
                  SHA-256:E9A1610AFFCA9F69CD651C8D2EDD71B5A0F82CB3910A8A9D783F68E701DB5BB0
                  SHA-512:20ED527F3BBBA2CECE03D7B251B19D6DCC9D345B5425291D8139FCDD5646EC34D585891160CC4BD96C668D18FFFFDD56F4D159880CFC0D538749F429F7F65512
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.&...i.....j.:...k.I...l.T...n.\...o.a...p.n...q.t...r.....s.....t.....v.....w.....y.....z.....|.....}.................................................#.....$.....%.....'.....7.....I.....[.....p.............................|.................%...........(.........................................3......................./.......................2.......................z...........I.....k...........R.......................v................./.......................z...........=.....W.................&.....=....................... .....o.......................^.......................r.......................m.......................b.......................z.................0...........%.....i.......................3.....G.......................(.......................1.................R................./.....J.....^...........A.....q.................`.................,...................................V.....w...........Z.......................O.....t.................b.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):496165
                  Entropy (8bit):5.446061543230436
                  Encrypted:false
                  SSDEEP:
                  MD5:A44EC6AAA456A6129FD820CA75E968BE
                  SHA1:9B5B17AFD57ADB8513D2DA9A72223E8A003975A5
                  SHA-256:F01F9C3E4E6204425F2969F77BF6241D1111CE86CDD169BDF27E5D2D4B86C91A
                  SHA-512:947DB81EA64009CC301CD2DCE06384202E56446F6D75E62390334B91D09B564CB0681E06BF7A945033BD6C28C2171346A91EE16693262C4E373A31B51AD42A9E
                  Malicious:false
                  Reputation:unknown
                  Preview:........,$..e.N...h.V...i.g...j.s...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.".....*...../.....7.....?.....G.....N.....U.....\.....].....^.....`.....n.....~.........................................Q.............................*.....q.................].......................P.....w.................8.....b.....p...........9.....h.................n.................7.......................^............................. .....p...................................q.......................X.......................1...............................................".............................{.......................Z.......................C.....p.....~...........y.................4.............................l.......................I.....f.....v...........^.................................................................F.......................B...................................O.....~...........J.....z.................$.....@.....M.................F.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):534726
                  Entropy (8bit):5.49306456316532
                  Encrypted:false
                  SSDEEP:
                  MD5:49CA708EBB7A4913C36F7461F094886B
                  SHA1:13A6B5E8DC8B4DF7A976A0859684DC0AA70F1B12
                  SHA-256:8AE7D6B77C51A4FE67459860ABDAE463F10766FAF2BA54F2BB85FD9E859D2324
                  SHA-512:6908F96BFDF7499B33E76697AA96103E89ACB3E25EDBD6156B610564AF14D4ED474C547A760503490B6327A801478E223039836BEEF2B938AF76827A15C0F751
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.~...h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.%...y.+...z.:...|.@...}.R.....Z....._.....g.....o.....w.....~.................................................................X.................E...................................^.....x...........n................./.......................Z...................................U.....w.............................h...........&.....7...........9.....w........... ................. ..........._.................D.......................U.......................h...................................a.....x...........f.........................................F.......................u...........).....;...........j.................A.......................;.......................9.......................t...........,.....`...........-.....K.....b...........G.....s.................}.................T...........,.....6...........S................./.......................K.......................t...........*.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):950999
                  Entropy (8bit):4.76377388695373
                  Encrypted:false
                  SSDEEP:
                  MD5:9CBC320E39CFF7C29F61BD367C0BF3BB
                  SHA1:2AF07EFFF54A0CF916CF1C0A657F7B7ADF2029FF
                  SHA-256:E8837DEFA908EB2FD8B4EB6344412C93403A4258F75EC63A69547EB06A8E53B3
                  SHA-512:F7D84185F4520E7AAF3F3CACF38B53E9638BB7D5023FA244020EC8D141FFD5C10B198FF089824D69671FE8350F931B0BB19B6CAF14AF47B0838953367A146DD0
                  Malicious:false
                  Reputation:unknown
                  Preview:........)$..e.H...h.P...i.X...j.b...k.q...l.|...n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...................&...........6.....=.....D.....K.....L.....M.....O.....v.......................5...................................V.................h...........F.....i...........~...........{...........a...........'.................&.......................M.....U.....O............................./.....J.....1..........._...........{.....6................. .............................g.......................<.................J...........8.....t.....O.....).......................U............................................................ ..... .....!.....!.....".....#.....$.....$.....$.....%....|&.....&.....'.....'....;(....t(.....(....M).....)....;*....h*....U+.....,.....,.....,.....-....8.....t...........f/....(0.....0.....0.....1....S2.....2.....3....64....Q5.....6....@6....A7....(8.....8.....8.....9.....:....o;.....;....[<....%=.....=.....=.....>.....?....6@
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):430665
                  Entropy (8bit):5.517246002357965
                  Encrypted:false
                  SSDEEP:
                  MD5:0F1E2BC597771A8DB11D1D3AC59B84F3
                  SHA1:C1F782C550AC733852C6BED9AD62AB79FC004049
                  SHA-256:E4798E5FF84069C3BFD7D64734CCD9FF5C8A606315B44A714ACDCABDDAF3CA6E
                  SHA-512:07E9B98357C880995576059AD4E91E0F145DC0F2FFF2DFDAD8649FA42EB46FA86F7F093503C41019EAD4550784E26C553D171518355FBBF995E38B1F6D7ABFF0
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$ .e.(...h.0...i.>...j.J...k.Y...l.d...n.l...o.q...p.~...q.....r.....s.....t.....v.....w.....y.....z.....|.....}.....................................%.....,.....3.....4.....5.....:.....G.....V.....f.....w...........J.......................H.....y.................I.......................@.....o.......................?.....M............................._.......................B.......................8.............................[.......................*.....V.....a...........*.....l............................. .....^.............................A.....b.....n.................H.....[.......................+.....t.......................5.....y.......................:.....c.....n...........'.....d.....y.................).....?.............................G.............................].......................4.....O.....^.................6.....F.................#.....;.................V.....d...........$.....[.....x.................F.....U.............................k.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):434598
                  Entropy (8bit):5.509004494756697
                  Encrypted:false
                  SSDEEP:
                  MD5:FEAB603B4C7520CCFA84D48B243B1EC0
                  SHA1:E04138F1C2928D8EECE6037025B4DA2995F13CB4
                  SHA-256:C5B8FBDBB26F390A921DCACC546715F5CC5021CD7C132FD77D8A1562758F21F4
                  SHA-512:E6B3970A46D87BFD59E23743B624DA8116D0E1A9912D014557C38FD2664F513E56317AFA536DF52E7E703863FBD92136BE57EE759A2FFC2958AB028F6287E8B7
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.,...y.2...z.A...|.G...}.Y.....a.....f.....n.....v.....~.................................................................G.......................\.......................Q.......................T......................./.....t.......................7.....^.....k.................".....9.................!.....9.............................i.......................7.......................!.............................K.....f.....u.............................Y.............................k.......................G.....t.......................7.....B.............................J.......................$.....~.......................^.............................=.....R.............................q.......................X.............................X.......................7.....o.................X.......................k.......................a.......................!.....C.....S.................,.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):524728
                  Entropy (8bit):5.377464936206393
                  Encrypted:false
                  SSDEEP:
                  MD5:32A59B6D9C8CA99FBD77CAA2F586509A
                  SHA1:7E8356D940D4D4CC2E673460483656915AA59893
                  SHA-256:AA4A5AA83DD5F8476867005844F54664DB1F5464A855EF47EC3A821DAF08E8F2
                  SHA-512:860BA06228BBA31EEC7EB8BD437DDB6E93BABD0129033FB6EFF168F2FB01B54E2B93D2AB50A5D4F5D2FB7B04A5D0DD5541999D708CC2613B74AADD17B3E98735
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....j.....|.......................J...........>.....Y...........1.....v..........."...................................L.....g.................4.....G.................,.....=...........7.....}...........6...................................6.....I.................\.....s..........._.................Z...........2.....Y.......................:.......................".......................0.................R.....e...........).....g.....s.................P.....[.................4.....>.................L.....\...........O.................!.....v.................+.....x.................i.................:.................2.......................!.......................0.................I.....c...........x.............................B.....p...........V.......................G.....j.....}...........n.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):523181
                  Entropy (8bit):5.356449408331279
                  Encrypted:false
                  SSDEEP:
                  MD5:3D1720FE1D801D54420438A54CBE1547
                  SHA1:8B1B0735AE0E473858C59C54111697609831D65A
                  SHA-256:AE32D66C0329104B9624BA0811FE79149D1680D28299440EC85835DBA41C7BD2
                  SHA-512:C033BBB5261EC114DCB076EDB5E4B3293F37D60C813674A947F996606A6289204C04D2E4315356D92EEEB43FF41D534997DBEBBF960B17F2F24AA731AFE4B7E1
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.p...j.|...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.+.....3.....8.....@.....H.....P.....W.....^.....e.....f.....g.....i.....|.......................O...........G.....b...........D.................0........... .....:.................Y.....t.........../.....^.....n...........0.....X.....i...........c.................W...................................I.....Z...........*.....f.....{...........o.................g...........+.....P.................8.....N.................".....1.................*.....@.................?.....R.................;.....G.................%.....0.............................y...................................D.....^.................@.....].................5.....T...........;.....`.....s...........h.................M.......................A.......................W.............................&.................)...................................A.....U................. .....3.................D.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):475733
                  Entropy (8bit):5.456553040437113
                  Encrypted:false
                  SSDEEP:
                  MD5:C00D66D3FD4FD9D777949E2F115F11FB
                  SHA1:A8EAAD96CABCDFB7987AF56CB53FA5E16143EC48
                  SHA-256:26C438935E3F666329EE8D1DABA66B39179BCF26EBAC902F9B957A784BDC9B4A
                  SHA-512:E7E8C083B556DD05874AC669B58A4D1CD05D1E1B771EB4C32942869E387C6FA2B317B5F489138BD90135117DAEB051D96A7823B531DF0303BD4245A036F25A20
                  Malicious:false
                  Reputation:unknown
                  Preview:........@$y.e.v...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................S...........J.....e...........4.....d.....w...........Y.......................u.......................m.......................\.......................[.........................................7.......................;.......................K.......................x...........;.....R.................9.....T................. .....,.............................w...........#......................./.....=.................'...../.................".....1.................$.....,.................O.....g.................4.....J.................,.....O.................4.....A.................=.....i.................&.....7.................#.....;.................?.....Z...........U.................C...................................@.....M...........................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):773397
                  Entropy (8bit):5.04618630633187
                  Encrypted:false
                  SSDEEP:
                  MD5:C998140F7970B81117B073A87430A748
                  SHA1:8A6662C3AABDAC68083A4D00862205689008110C
                  SHA-256:182F18E4EFCA13CA59AFD1DF2A49B09733449D42526EE4700B11A9C5E6AAC357
                  SHA-512:5A947A44F674F9556FDD44D2E4FF8CF0E0AAC4475FFA12480CA1BD07CFE7514961B7CACE6760189432B4B4BEB5EA5816701158EB3CB827A806F3063853C46D5E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.#...s.4...t.=...v.R...w._...y.e...z.t...|.z...}...............................................................................-.....T.....9.......................^...........u..........._.............................H.................a...........S.....f...................................?.................j..........._.............................'...........f.......................I.......................v.............................Q.....u...........}.................S...........).....@...........x.................m...........M.....d...........p.................H.................:...........`.................`...........l...............................................s...........C...........0.....P.......................;...........1 ....V ....q ....+!.....!....'"....I"....."....|#.....#.....#.....$.....%.....&.....&....j'.....(....l(.....(....W).....)....M*....p*.....*....n+.....+.....+....d,.....-....P-....x-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):483378
                  Entropy (8bit):5.428549632880935
                  Encrypted:false
                  SSDEEP:
                  MD5:1CFD31A6B740D95E4D5D53432743EBF1
                  SHA1:20CEEEA204150BD2F7AAE5866C09A3B0AE72D4C5
                  SHA-256:F821E06B4BACD9E7660A2D6912A049591FFD56C6D2A0A29B914648589B17B615
                  SHA-512:C483B7347F91BE8EE515DCF352A1D7502B9A159EDE35EACCEBAA763B93A625BCE2D0C7D598C2A6111092257D6DAC7A167102E956697210D4694B9812D70C8A94
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.%...v.:...w.G...y.M...z.\...|.b...}.t.....|.....................................................................................................^.....q...........7.....j.....}...........Z.......................~.......................s.......................D.....d.....t........... .....F.....`...........C.......................Q.....}.................S.......................T.........................................E.............................k......................./.....P.....\.................).....3.............................p.......................L.......................0.......................%.......................B.............................g.......................e.......................d.......................M.....d.....s...........*.....T.....f...........".....[.....u...........x.................I.......................Y.......................4.....v.......................S.....~.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):546749
                  Entropy (8bit):5.197094281578282
                  Encrypted:false
                  SSDEEP:
                  MD5:6EDA0CD3C7D513AAB9856EC504C7D16F
                  SHA1:BA24C4B994E7866F2C012CCEC6C22DFC1A4FCFF6
                  SHA-256:3CD2BC9E887663C5E093E0334BC60CF684655A815E3DE7AD9A34BAD5EBB858B1
                  SHA-512:47000F5EA882CB9EDDCF4FB42ED229423EE55AA18B4A4353D7EF85ADFA7E1B0BBB33C2469887224D7146B3E33FB2296749CD053D68D7DAF26980BC710A27C63E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.@...h.H...i.^...j.j...k.y...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......!.....&...........6.....>.....E.....L.....S.....T.....U.....Z.....g.....|.................K...........:.....X...........O.................Q...........>.....e...........Z.......................~.................%.......................h.................H...........^.................M.................!.................H.....b...........].................V...........B.....d...........#.....N.....k.................A.....N.................,.....;.................S.....i...........5.....k.....z...........=.....o.....}...........>.....o.....}...........@.....r...................................R.......................L.......................<.......................e.................U.................F.....`...........>.....q.........................................%.................4.................4.................J.....b.................B.....X...........N.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):568277
                  Entropy (8bit):5.380723339968972
                  Encrypted:false
                  SSDEEP:
                  MD5:D185162DF4CAC9DCE7D70926099D1CF1
                  SHA1:46594ADB3FC06A090675CA48FFA943E299874BBD
                  SHA-256:E40C07183A32B75930242F166C5AAE28F4CD769BB2268391BEAA241814E7D45A
                  SHA-512:987D9CC6AD5F2ED6A87537FDADF105F6EB31A97B11156E70814FE021047E5D8D08398F008812038DF3CCDCB6254BF5B744D9982FE04F79D407AC2F53BB046E25
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e. ...h.(...i.9...j.E...k.T...l._...n.g...o.l...p.y...q.....r.....s.....t.....v.....w.....y.....z.....|.....}..................................... .....'.........../.....0.....2.....B.....P.....b.....q.................6.....X...........?.................'.................(.................W.................4.....`.....p...........D.........................................{...........(.....L...........*.....i.....{...........S.........................................}...........i.................N.......................H.....r.................N.......................f.......................}.......................x.......................e.......................d.................+.................&.......................8.....~.......................k.................0...........;.......................f.........................................d.................6...........4................."...................................R.....k.................G.....[...........G.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1103776
                  Entropy (8bit):4.336526106451521
                  Encrypted:false
                  SSDEEP:
                  MD5:44F704DB17F0203FA5195DC4572C946C
                  SHA1:205CBCC20ADCCCF40E80AA53272FBA8CD07389CA
                  SHA-256:4B073F08F0C8C035974B5EC43AA500F8BDD50E6CFE91A2FB972A39E0F15ECEDD
                  SHA-512:3CFD4501556845141EE9B461C831CA59779AD99F0E83E8D03433DE78D774378E87DE752DD9711C112A0C584259AD1DA6DC891D92F3F447F63A4D84263CD5BFCE
                  Malicious:false
                  Reputation:unknown
                  Preview:........4$..e.^...h.f...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.#...|.)...}.;.....C.....H.....P.....X.....`.....g.....n.....u.....v.....w.....|.......................&.....b....._.....0.....l....._..... ...............................................a.......................G.................r...........\.....|....._...........z.......................V...........n.....B...................................7.....4...../.......................".......................4.....p...........P...........E.....m.......................................................................'...........}.......................C.................j .....!....u!.....!.....".....#....\$.....$....K%.....%....R&....{&.....'.....'.....'.....'.....(....b).....).....*....'+.....+....t,.....,.....-....9.....|............/....W0.....0.....0.....1.....2....33....f3.....4.....5.....6.....6.....7.....8....<9.....9....|:....H;.....;.....;.....<....s=.....=.....=.....?.....?.....@
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):681555
                  Entropy (8bit):4.658620623200349
                  Encrypted:false
                  SSDEEP:
                  MD5:E75086A24ECAA25CD18D547AB041C65A
                  SHA1:C88CE46E6321E4A21032308DFD72C272FB267DBD
                  SHA-256:55BE8A5ED9FB9C129AC45B7FC99574B9907350AFD024BAA5D07525F43E995F6B
                  SHA-512:01D7FDD90B8D0D3779B8442250E2AA767481B2E581F880BF9C3DCBB15FCE52E477B1881F3704FBCB3172DB77DB10241BCB24851BFE30066D1E9B66244B3C6877
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.'...k.6...l.A...n.I...o.N...p.[...q.a...r.m...s.~...t.....v.....w.....y.....z.....|.....}.........................................................................+.....D.....].....z.....?...........~...........).............................O.................T...........#.....E...........:.......................w.................W................./...........F.................V...........5.....T...........K.................3.............................o...................................E.........../.....a.....t.............................z...........,.....?...........5.....v.................q.................5.......................r.................1...........X.................I.......................y.................$.................k...........).................!.......................#.................7.....P...........e.......................e.............................w...........W ..... ....$!....K!.....!....7"....g"....."....@#.....#....-$
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1167065
                  Entropy (8bit):4.308980564019689
                  Encrypted:false
                  SSDEEP:
                  MD5:1FF8A0B82218A956D2701A5E4BFA84EF
                  SHA1:56BB8218963E14ADCC435F2455891F3A0453D053
                  SHA-256:62E7C3ABC317931723BE11ADD3712DD15EAAB0A35A4D8E7DB0B6347104EC5733
                  SHA-512:3330D983401953AA5ED4856A8D10FFCBEEFC2A4E594CF850566A0AD38837BC1164870BB1270B6BBE5D7DD6FB1ECA29CDE85869A5C51808B901CDC282E04764E4
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.%...n.-...o.2...p.?...q.E...r.Q...s.b...t.k...v.....w.....y.....z.....|.....}...............................................................................?.....j.............................................../.....j.........................................N.....}.....P...........^...........F...........A.....d.....K...........N.............................L.....&...........V...........f...................................L.....~.................{.................A.................y.....*.....}...........;...................................*.....[.................,.....K...................................j ..... ..... .....!....J".....".....".....#.....$....T%.....%....@&.....&....8'....d'.....'.....(.....(.....(.....)....6*.....*.....*.....+.....,.....-....c-......................%/.....0.....0.....1.....1.....2....i3.....4....B4.....5.....6.....7.....7.....9.....9....S:.....:.....;.....<....F=.....=.....>....N?.....?.....@.....@.....A....LB
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):526575
                  Entropy (8bit):5.518614920030561
                  Encrypted:false
                  SSDEEP:
                  MD5:0BD2F9847C151F9A6FC0D59A0074770C
                  SHA1:EA5313A194E9D99489E9F1D7B4DFC0BC986C8E17
                  SHA-256:5F2F1AA2E2EC78F375084A9C35275E84692EE68A1E87BBEF5A12A2C0FCF7F37A
                  SHA-512:0032C0B41FDF769DAA1AF23C443D4195B127DF9EA8621174F1AABDBAFAE4954383095FA1EEAD14FC458188B8837BBE9AECA0D5338E4D47F10D976FBED8609496
                  Malicious:false
                  Reputation:unknown
                  Preview:........F$s.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.)...y./...z.>...|.D...}.V.....^.....c.....k.....s.....{.................................................................k...........Y.....z...........F.....~...................................e.......................y.......................m.......................l................. .................q................._.........................................A.............................4.......................j.......................D.....f.....w.................*.....:.................4.....I.................&.....5.................8.....M................. .....0.........................................S.....n.................0.....M.......................3....................... .................E.....v...........!.....F.....\...........).....[.....t...........U.................M...........(.....:...........".....`.................G.....v.................$.....B.....T...........0.....n.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):566819
                  Entropy (8bit):5.6387082185760935
                  Encrypted:false
                  SSDEEP:
                  MD5:4C27A1C79AB9A058C0A7DFFD22134AFD
                  SHA1:5F0A1B34E808B91ADB1E431E462D9FCF82F4FFF2
                  SHA-256:AD98C0A367B51EB217E69D66FA6A946946E85EC8452FC5A7AE0F179F35BE28C3
                  SHA-512:0F066DB5905EB24B6CB4FBC7C81F017B43AFB7A6E975886644D871E979406B990509905D100653496EE2D20969A77434B702FF1EA5D348274AE54EA597A91D5E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.!...j.+...k.:...l.E...n.M...o.R...p._...q.e...r.q...s.....t.....v.....w.....y.....z.....|.....}.........................................................................+.....A.....V.....j.................9.....W...........N.................*.................*...........".....X.....q...........K.....r.................Y.................?................."...........I.................7.......................k...........'.....7...........:................./.................:.................Z.....w...........O.....v.................f.................5.................(...........2.....u...................................M.................0...........6.....x...................................m.................)................. .....I.................O.....g...........c.................O.......................E.......................r...........'.....H...........v.............................l...........7.........................................5...........& ....q
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):466959
                  Entropy (8bit):5.379636778781472
                  Encrypted:false
                  SSDEEP:
                  MD5:1466C484179769A2263542E943742E59
                  SHA1:18E45A08661FD6D34BADE01CDB1E1D5184BA2B67
                  SHA-256:C331293D16B16B08DEF73BE73437845D58C593941320C547A377DB423749AEBB
                  SHA-512:ABC54D5CAAA663578F064E43CC0465BEB97EFC46991936708EBF3FCD64BD007E47072AB4834A5361B21F064BB0F6527E247BC2C2F0DFB8336F50C2FF3E15A59C
                  Malicious:false
                  Reputation:unknown
                  Preview:........ $..e.6...h.>...i.O...j.[...k.j...l.u...n.}...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................'...../.....6.....=.....D.....E.....F.....H.....V.....c.....s.................k................. .....l.......................l.................-.......................0.............................R.....s.................I.....x.................T.......................@.....j.....w.................L.....Y.................Z.....m...........H.......................%.....@.....Q.............................c.......................<.......................#.....t.......................L.....x.................%.....R.....^.................>.....K.................5.....G.............................J.......................".....h.......................L.....}.................#.....=.....K.................+.....:.................2.....K...........C.......................u.................,.....|.......................C.....b.....r...........1.....h.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):522800
                  Entropy (8bit):5.284113957149261
                  Encrypted:false
                  SSDEEP:
                  MD5:7767A70358D0AE6D408FF979DF9B2CD4
                  SHA1:9C57A5B068DC12AAF1591778DEF5D3696377EDAB
                  SHA-256:672908E77E9EACA793654C8E630442099DE3BE772FD3230A9C4045CAFBCC0B1E
                  SHA-512:913AA8C49D04CD84706D08A88453D1ED36FDE6A00F7C1DF63DECEA99316A8A234924457C0C50937329B3979E437B1C2D7796E63ADF209505E212FDCEAE3BFDB5
                  Malicious:false
                  Reputation:unknown
                  Preview:........-$..e.P...h.X...i.i...j.u...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.$.....,.....1.....9.....A.....I.....P.....W.....^....._.....`.....b.....u.......................E...........3.....O.................V.....g..........._.................o...........#.....L.............................k.......................n.................2...........*.......................w.................5.......................R...................................c................./.....[.....y.................=.....K.............................x.................*.............................`.......................4.............................^.........................................B.............................F.....\.....r........... .....L.....a...........=.......................b.......................8.....c.....v...........[.................c...........S.....j...........d.................[.................).....v.......................X.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):634636
                  Entropy (8bit):5.718480148171718
                  Encrypted:false
                  SSDEEP:
                  MD5:4A4AF69546DCF65F2D722A574E221BEA
                  SHA1:EE51613F111CF5B06F5605B629952EFFE0350870
                  SHA-256:7AD195AF107F2A394BAB527C3E84E08F3B7748076F23459F084CF0E05DD29655
                  SHA-512:0E93F6B22F7C9176EFC9D49901BFBD281FA5AC3632780DFA76CE597CADD8C1CF570A9163A86BC320BBFBD354F48288DBEC5E36A6088999B00A3561D302A96D03
                  Malicious:false
                  Reputation:unknown
                  Preview:........n#K.e.....h.....i.....j.....k.....l.....m.....o.%...p.2...q.8...v.D...w.Q...y.W...z.f...|.l...}.~...............................................................................................6.....W...........}.................l........... .....8...........c.......................B.................W.......................x...................................7.....V...........e.................=.......................].......................{...........#.....2...........y.................`...................................<.....W...........j.................y...........e...................................h...........(.....:...........%.....a.....p...........{.................}...........m..................................._...................................Z.....x.............................o...................................:.....U...........*.....d.....z....."...........*.....?...........X.................`.................@.................g............ ..... ..... .....
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1256908
                  Entropy (8bit):4.247594585839553
                  Encrypted:false
                  SSDEEP:
                  MD5:6A41A5AB03A22BDAEC7985B9A75EC11A
                  SHA1:6BB02DF557BD6522E02FE026C0243BEB9332B2E5
                  SHA-256:E22873652AC7D9D18E47DAE838D121B5644EDA4C67F7B0BC110733BF7E931FEA
                  SHA-512:BCA661D802D29463A847AC77EB8D5DFA41C31455E7314049CA26555957DCA3BE33701C074F7ED26D2C375A0A9C5F8A93461007B8D74F5ED3BD27C02E5DB170A5
                  Malicious:false
                  Reputation:unknown
                  Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}.................................................................W...........".....V.....W...................................n...........b............................._.......................<.....)...........s.......................).............................1.....7...................................[.................................................................*.....u...........f...........K.....^........................ ..... .....!..../"....i"....=#.....#....r$.....$....I%.....%....l&.....&....p'....((.....(.....(.....)....N*.....*.....*.....,.....-.....-................./.....0....W0.....0....z1.....1.....1.....2....Y3.....3.....4....@5.....6.....6.....7.....8.....8.....9....V9.....:....R;.....;....1<.....=....B>.....?....]?.....@....DB....BC....wC.....D.....E.....F....$G....\H....AI.....I....4J.....K.....K.....L....PL.....M....lN.....O
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):532715
                  Entropy (8bit):6.0824169765918725
                  Encrypted:false
                  SSDEEP:
                  MD5:5FD9942F57FFC499481947DB0C3FDFA7
                  SHA1:4D60AB21305902877467FF6151C1B7AB12553AAE
                  SHA-256:09E279860E20E9E559945940E29446CAD4273D05C5F3F15D0BAD664A1D5749F2
                  SHA-512:97953E580588C07769F1BD0002E2DF648FFCE5B246D2359E4475EDCFA1CD6E7286BAF168A115D7A65686B2151C313B6FD0C271E40B1F9DD4132F2F39904FE8D4
                  Malicious:false
                  Reputation:unknown
                  Preview:........O#j.e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s.....t.....y.#...z.2...|.8...}.J.....R.....W....._.....j.....r.................................................................].................5.................O.....b...........F.......................p.................'.......................,.......................;.......................L.......................e.......................Y.......................X...................................Q.....h.................>.....U................. .....0.........................................-.....I.................A.....Q.................L....._.................K.....[.................J.....Z...........O.......................Z.....{.................U.....}.................`.................%.......................J.............................h.......................\.................+.......................m.........................................'.............................x.........................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):573015
                  Entropy (8bit):5.63016577624216
                  Encrypted:false
                  SSDEEP:
                  MD5:8745B87D09D9ECC1112C60F5DD934034
                  SHA1:2F411E4EEF0E656CAC0C755FECE1AD2531CB689E
                  SHA-256:D546C994C81510122E7B2359DA50F694E1F0CA4081830404E16187A5CF4D4E0D
                  SHA-512:27B658C153A01AABB9595C5B1059567E535EDFC8F8187B89316D2C85694DE32696D209CFDD2A32C4826DFB1E50AC692937156563EE190E68DB358C40F9AAE15F
                  Malicious:false
                  Reputation:unknown
                  Preview:........+$..e.L...h.T...i.e...j.q...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}. .....(.....-.....5.....=.....E.....L.....S.....Z.....[.....\.....^.....l.....y.................4...........".....=...........S.................M...........'.....A...........8.....p...................................A...................................B.....g...........z.................R...................................;.....K...........c.................T...........2.....P...........2.....Y.....t...........W.........................................E...................................D.....S...........Q.........................................S.............................B.................&.......................t...........1.....Y...........K.................+.........................................'...........N.................A.................,...........q.................d...........&.....F...........x.................(.......................H ..... .....!
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):570683
                  Entropy (8bit):5.624052036286866
                  Encrypted:false
                  SSDEEP:
                  MD5:E16B0B814074ACBD3A72AF677AC7BE84
                  SHA1:10744490B3E40BEB939B3FDCA411075A85A34794
                  SHA-256:46B5C09AA744AF0F660C79B0CDBDE8C8DBDD40A0BA1A23AAF28D37ECC4211DC5
                  SHA-512:70EA9DFAC667C0992AE0E95815A47EB8E779BAAE1215E733AFE84EEE26D3BA754AD838C12E9AEE3114D7BBE11CD21B31C550F5CAFE6C5E838B69E54C6174EF18
                  Malicious:false
                  Reputation:unknown
                  Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}...................................................................................Z.................G.................%...........Z.................F.................6.................Q.....\...........Q.........................................|.....#.....t...................................W.................0...........T.................B...........8.....Y...........$.....J.....`...........-.....V.....h...........;.....b.....v.............................G.......................r.........../.....>...........'.....Z.....k...........c.................@...........3.....K.................).....>...........=.....t.................c.................(.................2.......................8...........<.....q.........................................:.................8...................................N.....^...........0.....K.....m............ .....
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1307271
                  Entropy (8bit):4.279854356980692
                  Encrypted:false
                  SSDEEP:
                  MD5:309E068B4E15157486D095301370B234
                  SHA1:D962CDAF9361767045A928966F4323EAD22D9B37
                  SHA-256:4F2C19B7E94B695C5C5CAB95DEE6E49AE53C3337C351B5C665BCB6BA4E6AE909
                  SHA-512:6B1333946C7950D97D2DF29D063DB39A0EC5C0EEAA1ECA40743E4A6A0E4C972D897D3FF2BA837B53E31B8003F2C5C4BACCB7A4AB4B50C6CB47DF39AD7B8E05E7
                  Malicious:false
                  Reputation:unknown
                  Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.,...w.9...y.?...z.N...|.T...}.f.....n.....s.....{...........................................................$.....d.................Z.....C.......................W...........%.....r.....a.......................}.................n...........................................................I.................m.......................l.......................5.....y.............................^.............................j.......................|............ ..... .....!.....!....*".....#.....#....V$.....$....n%.....&.....&.....&.....'....n(.....(.....).....*.....*....W+.....+....c,....+-.....-.....-...........0.....0.....1.....1.....2....!3....Y3.....4.....4.....5....T5....06.....6.....7.....7.....9.....9.....:.....;.....;.....<.....=....Z=....|>....s?.....@....T@.....A....UB.....C....SC.....D.....E....yF.....F.....G.....H.....I.....I....-K....(L.....L.....M.....N.....N....eO.....O.....P.....Q.....R
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1075591
                  Entropy (8bit):4.313573412022857
                  Encrypted:false
                  SSDEEP:
                  MD5:69C36C23D6D9841F4362FF3A0F86CFDF
                  SHA1:C4C1F632EB8373107AEEBD6C26ECF036AEDA2B6B
                  SHA-256:6A794C2B08F8B046BE771DF33719536BDAF2371E3825D49A0E556958B781832D
                  SHA-512:8C1329BDB371677BC0A9D727A38591EDF32025BAE1E7EFE402D01C6A8BB5F647D827C59A18F40455D5C9C0482798525C98C3F1C8AC568AA886D7C1ED07D1580E
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i."...j.....k.=...l.H...n.P...o.U...p.b...q.h...r.t...s.....t.....v.....w.....y.....z.....|.....}.........................................................................@.....b.................%.....]...........W.................J.............................:.....@.....=...................................&.................&.....F.....P.......................h...........o...............................................c...................................R..........._.................i...............................................J.................. .....!.....!....(".....#.....#....O$....{$....B%.....&....c&.....&....F'.....(...._(.....(....R).....*....y*.....*.....+.....-.....-................./...../...../.....0....61....l1.....1....Z2.... 3.....3.....3.....4.....5.....6.....6.....7.....8.....9....E9....u:....n;.....;....@<.....=....O>.....?....5?.....@.....A.....B.....B....MD....WE.....E....eF....nG....LH.....H.....H.....I.....J.....J.....K....5L....)M.....M
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):489457
                  Entropy (8bit):5.250540323172458
                  Encrypted:false
                  SSDEEP:
                  MD5:A1253E64F8910162B15B56883798E3C0
                  SHA1:68D402D94D2145704DC3760914BF616CC71FC65D
                  SHA-256:E033BFAD6CD73EA7B001DFAF44B7102E3BBE2A1C418F005C149E4FB2565DB19F
                  SHA-512:ABD63713093049ECC8E24FD8145EAE065340058A3C38758A59EE8796FBED7E6CFBC54982D650889F1CEB54797060C7DDA12EEE2A963B14C5E907A110C2057DBE
                  Malicious:false
                  Reputation:unknown
                  Preview:........T$e.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v./...w.<...y.B...z.Q...|.W...}.i.....q.....v.....~........................................................................................._.....{...........:.....n.....~...........\.................#.......................=.......................1.......................3.......................Y.................*.....z.......................W.......................E.......................b.........../.....A.............................N.......................$.....x.......................r.......................z.......................p.......................^.......................Q.......................r.................!.....s.......................S.....w.................6....._.....p.................T.....w.......................#.......................$.................2.....K...........B.......................s.................,.............................P.....r.................0.....].
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):476208
                  Entropy (8bit):5.4272499712806965
                  Encrypted:false
                  SSDEEP:
                  MD5:622ED80836E0EF3F949ED8A379CBE6DF
                  SHA1:9A94CD80E747B88582470EF49B7337B9E5DE6C28
                  SHA-256:560B2F09C1B6E6BB7E6A5A5F9BF85A88BD2ACA054B7D4A5955D9C91B6D7CA67C
                  SHA-512:950627E74180E1451BB35AE4A7416AC14D42D67BBBB59DC51D7B69E4CEB61715F8F9B0EB9D7F35FCEFD4D43FABE5CE2103F1AF3709CAE6733C25AC19E6339A83
                  Malicious:false
                  Reputation:unknown
                  Preview:........2$..e.Z...h.b...i.y...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.....}.......................N...........A.....V.................X.....k...........z.................K.......................L.......................:.......................;.......................g................./...........<.........................................R.................1...........Q.......................\.....u.................1.....V.....f.................9.....I.................H.....\.................J.....Z...........".....T.....d.................@.....P.................<.....J...........4.....y.................B.....h.....{...........&.....E.....^.................-.....?...........,.....k.................V.....|.................b.......................i.................&.......................s...........9.....b...........*.....V.....i.................".....0.................).
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):491139
                  Entropy (8bit):5.362822162782947
                  Encrypted:false
                  SSDEEP:
                  MD5:C8378A81039DB6943F97286CC8C629F1
                  SHA1:758D9AB331C394709F097361612C6D44BDE4E8FE
                  SHA-256:318FB294CE025BDA7636B062CA7B6A1FB1E30C485D01856159CB5DB928782818
                  SHA-512:6687FFE4DE0D5A2314743EB3134096292724163D4E0332D2F47922B4807B0CDE7C20E2D57D2662E403D801BC7A20BC247F5D0EDD787AB650E5766B49AF7D3C63
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.*...h.2...i.C...j.O...k.^...l.i...n.q...o.v...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................#.....*.....1.....8.....9.....:.....<.....H.....X.....i.....{.............................X.......................|...........4.....J.................M.....d.................8.....G.......................).................8.....Y...........1.....h.................F.....{.................U.........................................\.................4.............................Y.......................-.....~.......................}.......................v.......................V.......................5.....a.....n...........*.....^.....m...........I.......................X.......................>....._.....v...........,.....T.....f...........8.....o.................=.....[.....o...........3.....e.....v...........H.....................................................E.....j...........5.....f.....{.................B.....R.................B.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):550453
                  Entropy (8bit):5.757462673735937
                  Encrypted:false
                  SSDEEP:
                  MD5:80C5893068C1D6CE9AEF23525ECAD83C
                  SHA1:A2A7ADEE70503771483A2500786BF0D707B3DF6B
                  SHA-256:0069648995532EFD5E8D01CC6F7DD75BD6D072E86C3AE06791088A1A9B6DACC4
                  SHA-512:3D1C41A851E1CF7247539B196AD7D8EE909B4F47C3CFB5BA5166D82CDA1C38049B81A109C23FA6D887490E42EE587CC2A6BD96A3EA890267C089AC74710C755F
                  Malicious:false
                  Reputation:unknown
                  Preview:........6$..e.b...h.j...i.{...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.............................X...........S.....o...........=.....w...................................i...............................................z.................$.................1.....W...........M.................*.......................@.......................l...........0.....L...........].................9.....v.......................E.....h.....x.................,.....:.................<.....P.................>.....P.................6.....F.......................-.........................................e.....}.................4.....K.......................;.................+.....@.................a.................+.....I.....`.................9.....U...........2.....}...................................w...........'.....R.................9.....J.............................v.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):516256
                  Entropy (8bit):5.426294949123783
                  Encrypted:false
                  SSDEEP:
                  MD5:3BA426E91C34E1C33F13912974835F7D
                  SHA1:467A1B05BAD23252A08EE22E6B9EBB4404F6A0F0
                  SHA-256:CB66D88D3B3938FE1E42C50ECB85CEDB0D57E0F0AB2FA2A5FC0E4CDEA640E2B7
                  SHA-512:824A4301DC4D935FF34CE88FAA0354440FC1A3A8E79B0F4B0B2DCC8F12542ECEF65828FB930EDF5B35BF16863296BBAE39E9306962B4D3CFA9F6495AC05BDEF4
                  Malicious:false
                  Reputation:unknown
                  Preview:........9$..e.h...h.p...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.$...|.*...}.<.....D.....I.....Q.....Y.....a.....h.....o.....v.....w.....x.....}.............................d...........L.....h.........../.....h.....x.............................w.................(.....y.......................^...................................:.....j..........._.................:......................._...................................K.....d...........p.................5.............................q.......................n.......................w.......................p.......................O.....}.................).....W.....a.................V.....g...........b................. .....j.......................;.....a.................=.....U...........N.................2.....W.....p...........8.....p.................S.................@.................0...........1.....{.................X.......................0.....V.....k...........C...................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):518861
                  Entropy (8bit):5.4029194034596575
                  Encrypted:false
                  SSDEEP:
                  MD5:4D7D724BE592BD0280ED28388EAA8D43
                  SHA1:8E3C46B77639EB480A90AD27383FBB14C4176960
                  SHA-256:4724D82866C0A693C2B02D1FFA67D880B59CDB0D3334317B34EC0C91C3D3E2A2
                  SHA-512:D05388F66C50E039F7D3393515740F6B2593F9C0EF8651F9CDE910C5FF06656E0D22FDB066B22665289EE495837EA16CC085ECB3F85B0F6FB498AECDAA19ADF7
                  Malicious:false
                  Reputation:unknown
                  Preview:........I$p.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v."...w./...y.5...z.D...|.J...}.\.....d.....i.....q.....y.......................................................................u...........Z.....u...........@.................).................$.................S.....w.................D.....T.................(.....:...........(.....j.................x.................H.......................g...................................9.....N...........D.......................p.......................^.......................a.......................q.......................r.......................U.............................[.....e.................P.....a...........?.......................O.....y.............................?.................0.....J...........#.....p.................9.....c.....u...........#.....Y.....n.........../.....}...............................................G.....k...........N.......................B.....g.....|...........J.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):537125
                  Entropy (8bit):5.4566742297332596
                  Encrypted:false
                  SSDEEP:
                  MD5:4F1C0A8632218F6FEF6BAB0917BEB84F
                  SHA1:05E497C8525CB1ADE6A0DAEFE09370EC45176E35
                  SHA-256:9C19835F237B1427000D72C93703311CFCBEFF6C2B709474B16DB93E629BC928
                  SHA-512:A7CDF94F79CD888BB81FD167F6B09BF1BEF2C749218869E5A12A0A3B2C2506D1A63F64B63D8E48EA49375636041C639082563BF9D526FE44003FC5A5E8D50E9D
                  Malicious:false
                  Reputation:unknown
                  Preview:........0$..e.V...h.^...i.o...j.y...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.(.....0.....5.....=.....E.....M.....T.....[.....b.....c.....d.....f.....u.......................3.................+.................%.....9...........@.................1.......................Q.......................4.......................C...................................>.....b...........@.......................d.........................................p...........@.....n.................+.....H.............................h.......................M.......................J.......................7.............................].......................E.....t...................................?.............................W.....w.................\.................).......................f.......................W.........................................'...........$.....y...................................f.......................j.......................l...........+.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):878725
                  Entropy (8bit):4.848685093578222
                  Encrypted:false
                  SSDEEP:
                  MD5:3A3D0D865A78399306924D3ED058274E
                  SHA1:AA1A42DB6021666B2297A65094D29978792CE29B
                  SHA-256:EAB4C32FEBE084CC7A3A272CDA008B69D6617ED6D042376B0316BE185B9E66FE
                  SHA-512:ACA8C87D0B2BB35A325726F7774F8A0232B99C8EFE0F948AB68210958E23B95E9D9026A9430D96FC2D5CEBA94815F4217896EF877C9A6E1D0E56F73533FB1D12
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#/.e.....h.....i.#...j./...k.>...l.I...n.Q...o.V...p.c...q.i...r.u...s.....t.....v.....w.....y.....z.....|.....}.........................................................................9.....V.....n...........V.......................g...........i...........l.....).................g...........,.....f.......................@.................6.....M......................./....."...........l..........._...........D.....y..... .................&.......................5.....9.....3.............................B.................r.................D...................................=.....b.........................................E.....\...........Y.................'...................................D.....n...........j.................9.......................a...........i...........v...........t...........a........................ ....,!....l!.....!....j"....."....R#....|#....O$.....%.....%.....%.....&....x'.....(....Q(.....(....z).....).....)....]*.....*.....+....$+.....+.....,.....-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):553886
                  Entropy (8bit):5.812150703289796
                  Encrypted:false
                  SSDEEP:
                  MD5:A9656846F66A36BB399B65F7B702B47D
                  SHA1:4B2D6B391C7C2B376534C0AF9AA6779755B4B74E
                  SHA-256:02B65F48375911C821786D91698E31D908A4C0F5F4F1460DE29980A71124480E
                  SHA-512:7E23CAA89FF80BF799AC5353CEAF344CBED0393F23D15FCBE8DC24EE55757F417CEA3BFC30889FD2CB41951F9FA5629C2E64B46DD9617D4A85EFEF0A255246F6
                  Malicious:false
                  Reputation:unknown
                  Preview:........5$..e.`...h.h...i.|...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.%...}.7.....?.....D.....L.....T.....\.....c.....j.....q.....r.....s.....u.............................h...............................................[.........../.....I.................S.....j...........9.....h.....{...........4.....].....q...........J.................?.............................%.....`.....y...........\................./.............................%.....v.................G.....g.....|...........=.....c.....u...........6.....].....o...........O.........................................".......................3.......................R.............................-.....x.................0.....K....._.................0.....E.................G.....W...........T.................).....w.................-.......................M.............................O.................J.........................................'.........................................E.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):532410
                  Entropy (8bit):5.486224954097277
                  Encrypted:false
                  SSDEEP:
                  MD5:BE49BB186EF62F55E27FF6B5FD5933F4
                  SHA1:84CFD05C52A09B4E6FA62ADCAF71585538CF688E
                  SHA-256:833F2E1B13381AA874E90B747931945B1637E53F2396A7409CCDA0A19CBE7A84
                  SHA-512:1808631559D3C28589D3F5A4B95554CEBC342DE3D71B05DDC213F34851BF802967BFFAC3D7668C487265EE245D1E26EFCE5D317EDBFBBEEB4BC2C9F122980585
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.6...i.G...j.Q...k.`...l.k...n.s...o.x...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................%.....,.....3.....:.....;.....<.....>.....P.....^.....n...................................y.................&...........2.....}.................h.......................g.......................Z.......................v.................O...................................3.....I.................T.....h...........b.................S...........$.....J.......................(.............................n.......................z...........$.....8.................2.....C...........).....j.................;.....i.....|...........?.....q.................[.......................g.......................L.....j.................G.......................~.................I.......................B.......................b.............................^.............................o.........................................j.......................x.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):818089
                  Entropy (8bit):4.779985663253385
                  Encrypted:false
                  SSDEEP:
                  MD5:AFA2DFBA3BD71FE0307BFFB647CDCD98
                  SHA1:CD7A5C54246E891981AEEEAA88D39EC9E3F2C594
                  SHA-256:1375353837629A20102C69BF62701EE5401BED84D3DC4845BED5EE43E4D322CF
                  SHA-512:CE8BBBDDC33CB6B8DF4AEE127A8987E6D8C1D0761AC5BD25D685310BAA2D377F239BDF06F2C04B54295CF8FD440697A69A040644D5A7C0395C4F71A0252B8E87
                  Malicious:false
                  Reputation:unknown
                  Preview:........=$|.e.p...h.x...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.,...|.2...}.D.....L.....Q.....Y.....a.....i.....p.....w.....~.........................................).................W...........O...........\...........z.....E...................................3...........b.................a.................5.......................1.....1...........v...........|...........{...........`...........Y.....~.....d...................................S........... .......................{...........(.....K...........H.................c...........d...........3.................)...........B.................D.................(...........W.......................E.................~...........'.....O...........^.................~ .....!....]!....z!....J"....."....=#.....#....0$.....$.....$.....%.....%....P&.....&.....&.....'....1(.....(.....(.....).....*....5+....S+....A,.....,....Z-.....-....^...........=/....^/...../....Y0.....0.....0.....1....'2.....2
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):479512
                  Entropy (8bit):5.541069475898216
                  Encrypted:false
                  SSDEEP:
                  MD5:09592A0D35100CD9707C278C9FFC7618
                  SHA1:B23EEF11D7521721A7D6742202209E4FE0539566
                  SHA-256:9C080A2F6D4EDF0E2E94F78550B9DB59ADF5B1B9166DE2BAE496E6ABB6733304
                  SHA-512:E0760B3F227A3E7EAEB4816B8E02BEE51C62730D24403724D66B36BCCBC0BDCD56DF9EAB28B073AB727EE12C8856A858E52A9803E1A1C9164FCD3CF2F716D8AF
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.....h.....i.....j.%...k.4...l.?...n.G...o.L...p.Y...q._...r.k...s.|...t.....v.....w.....y.....z.....|.....}.........................................................................#.....5.....I.....]...........b.................).......................e...........2.....K.................T.....p...........&.....U.....e...........%.....V.....f...........J.........................................O.......................Y..................................._.....u.............................n.......................J.......................'...............................................(.............................z.......................j.......................h.......................|.................$.....w.......................M.....k.......................?.....Q...........).....f.................J.....i.................;.....c.....x...........1.....l...................................q.................?.................;.....N.............................p.............
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):504856
                  Entropy (8bit):5.34516819438501
                  Encrypted:false
                  SSDEEP:
                  MD5:9E038A0D222055FED6F1883992DCA5A8
                  SHA1:8FA17648492D7F093F89E8E98BF29C3725E3B4B5
                  SHA-256:DDCA575D659545D80E715EB4176BBBBFBD3F75E24B223537B53740B0DCB282BD
                  SHA-512:FB70F97E08191DFEB18E8F1A09A3AB61687E326265B1349AB2EFF5055F57E177A496BF0EA3592B61C71FE1F73C9143CA1495B05226F36EB481024827CAE6DCC4
                  Malicious:false
                  Reputation:unknown
                  Preview:........4$..e.^...h.f...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....m.............................?.................$.................2.....D...........7.......................P.......................A.....l.....{...........&.....U.....c...........0.....d..................................._.......................m.......................n.............................*.......................J.....r.......................>.....G.........................................A.....O.................4.....F.................G.....R.................).....6.................).....2.................\.....u...........(.....T.....p...........2.....c.................D.......................l.................B.............................j.................+.......................j...........?.....S...........5.....x...................................P.......................r...........%.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1298313
                  Entropy (8bit):4.058495187693592
                  Encrypted:false
                  SSDEEP:
                  MD5:36104CB0D5E26E0BBB313E529C14F4B4
                  SHA1:69A509DEE8419DA719DCF6DE78BFE0A6737508C5
                  SHA-256:DC28C869A143424F71EDCFDB08B56DA31C2EC96E9D608535FFA7DC0B0842B7D8
                  SHA-512:D46ED1AA19EB298BC4C3D61EFC28D80753D6B551F01808E6158A0869FAAE8755DF61D4B4BAFF1310DD09FCFC385ABA67E1AA7D61BBE399DF7BB2D483EBE0FEFF
                  Malicious:false
                  Reputation:unknown
                  Preview:.........$..e.(...h.0...i.A...j.M...k.\...l.g...n.o...o.t...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................!.....(...../.....6.....7.....8.....=.....k.................:...........5...........$.....v...........`...........(...........Z.................%.............................O...........j.....L.........................................m...........u...................................;.....c...........7.................................................................8 ..... ....m!....I".....".....".....#.....$.....%....9%....d&....n'.....(....L(....C)....4*.....*.....*.....+.....,....3-....a-....Z.....J/...../...../.....0.....1....Z2.....2.....3....:5.....6....Z6....U7....=8.....8.....8.....9.....:.....:....F;.....<.....=.....=.....>....E?....S@.....@....[A....3B.....B....IC.....C.....D.....E....[F.....F....+H....>I.....J....pJ....\L....FN.....O.....O....DQ....QR.....S....{S.....T.....V.....V....'W....+X.....Y.....Y.....Y.....[....9\.....\
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1199612
                  Entropy (8bit):4.314031920337284
                  Encrypted:false
                  SSDEEP:
                  MD5:98714389748A98ECC536CD2F17859BDF
                  SHA1:07761AA31588F30C2CED4A1E31FE99DDC43A5E8D
                  SHA-256:8A81B1A5457407E49D6372677938E7A2D28DFCA69F555FEDC8A2C9C09C333A65
                  SHA-512:38CC4F064BD874EEC9DBFAB4C2A83A487FBCD89CEFB40BE4213C42231BC48AF9255341C9D325EE059BC50EE533898C5FA22CD3B3927A8E045049DEF3C5DFB2C6
                  Malicious:false
                  Reputation:unknown
                  Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t. ...v.5...w.B...y.H...z.W...|.]...}.o.....w.....|.......................................................................X...........J...........|...............................................f.........................................~.............................Y.............................A.............................d.....X.........../.....k.....b...........5...............................................'.......................L.....u ....:!.....!.....!.....".....#....*$....k$.....%.....&....6'.....'.....(.....).....*...._*.....+....P,.....,.....-....'...........m/...../.....0.....1...."2....f2.....3.....4....R5.....5.....6....G7.....7.....7.....8....I9.....9.....9....{:....0;.....;....)<.....=.....>.....?.....?.....@....bA.....A.....B....JC....(D.....D.....D....DF.....F.....G.....G.....I....@K....qL.....L....4N....EO.....O....pP.....Q.....R....?S.....S.....T....^U.....U.....V....`W....[X.....Y
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1008989
                  Entropy (8bit):4.356501290091745
                  Encrypted:false
                  SSDEEP:
                  MD5:56F29DE3465795E781A52FCF736BBE08
                  SHA1:EAA406E5ED938468760A29D18C8C3F16CF142472
                  SHA-256:529C561747BF8B6206BE4F8BCF287A1D15E1B14A33113242DDAD5E035CA37BE6
                  SHA-512:519B5B3CC7032B2AF856456EEC25019B3A6A7F2A6DB7A0318CF87C41E08C6F6BFA73E239939B0DA16972C1D357FF06177765D875E19742D23E99A95FD4AC5416
                  Malicious:false
                  Reputation:unknown
                  Preview:........i#P.e.....h.....i.....j.....k.....l.....o.....p.....q.....r.....s.0...t.9...v.N...w.[...y.a...z.p...|.v...}.....................................................................................'.....{.......................^...........e...........f.................s...........I...........]...........P...........r.................{...........D.....]...........;...........$.................,.....}.....K...........v...........e...........r...........m.....................................................E.......................P.......................:.......................B.......................b.......................s.......................X.......................S..................!.....".....".....".....#....0$....|$.....$....j%.....%....5&....l&.....'....z'.....'....!(....A).....).....*.....*.....+.....,....H,....x,....M-.....-....6.....l.....k/...../....o0.....0.....1.....2....>3...._3.....4.....5....c6.....6.....7....n8.....8.....9.....9....f:.....:.....:.....;.....<....D=
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):515329
                  Entropy (8bit):5.616482888977033
                  Encrypted:false
                  SSDEEP:
                  MD5:46CA9EE922C3C175DE466066F40B29CE
                  SHA1:5563E236A15CD9CC44AE859165DF1E4E722936C7
                  SHA-256:BD8B1441FD2057F0B61512CC0AA23DFD2619560CF886B4D453FA7472E7153A3F
                  SHA-512:45AA2D6896568751C2F986ABD281EA07CB731880DF8F28F2F0AEFD95736F41B1E005D8DFB6F0AEF0CED6CEF94154D34FD0DA2CB7F0B0C66D9C085F5C47F32605
                  Malicious:false
                  Reputation:unknown
                  Preview:........c$V.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}...........................................................................................)...........L.................+.......................e........... .....;.................7.....J.......................)......................................... .....B...........5.....x.................Z.......................Q.....{.................w.................Q.................!.......................'.......................&....................... ................."...../.................5.....F.................9.....F.................2.....>.................7.....D...........I.......................v.......................i.......................P.......................q.................-.....z.......................m.................,.............................*.................B................."...........(.....n.................N.....~.................l.......
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):876131
                  Entropy (8bit):4.88404350774067
                  Encrypted:false
                  SSDEEP:
                  MD5:1365ABDD1EFB44720EA3975E4A472530
                  SHA1:8421FC4905C592EB1269C5D524AA46866D617D3C
                  SHA-256:29AB0F7EE69FB7A1E1E54DD2A3746D2CFEAAA71AE5971EE30AA8E2E0F6556FA5
                  SHA-512:2E806A9BEA864E689BBD1D78B800DFDBC6E4109320F9A4790E52010BFDEC20C7644655A6FE3BABDE0B84D9580208CB78EF1FA0DB3476F8676C17A13D130296C7
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.'...s.8...t.A...v.V...w.c...y.i...z.x...|.~...}.....................................................................................1.....s.....W.......................r...........x...........m.....!.......................<.............................n...........,.................-...........|.............................=.....y.....+...........%.....K...................................w.............................N...................................r.................O...........N.................^...........\...............................................h...............................................R.....m.....f.....6.............................W.....y...........O.....x...........K...........j...........z .....!.....!.....".....".....#....R#.....#....&$.....$.....$.....%.....%....s&.....&.... '.....(.....(....~).....).....*....Q+.....+.....,.....,....Z-.....-.....-....[............/....4/.....0.....0....$1
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):765853
                  Entropy (8bit):5.17061834928747
                  Encrypted:false
                  SSDEEP:
                  MD5:3FED15E64BEAFBA75DE61B08A45AE106
                  SHA1:E24953271D8C0254AD011D3A65B2C2FA57903681
                  SHA-256:B6E250C3F4FBAC3AF5FB8BB1C61CACAD8685D7F2A97063DE23BC22E91B7F2E27
                  SHA-512:3948D080135AFEB240815D43F7B5B8D407BA2830FF701D9B8343F2A72E610827EDAAB643444CDCEB86812ADFC9FB3FBA3AAD6DB7488843C2A04E92A3E63FE40D
                  Malicious:false
                  Reputation:unknown
                  Preview:........1$..e.X...h.`...i.h...j.t...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.#.....+.....0.....8.....@.....H.....O.....V.....].....^....._.....d.....|.............................n.....................................................).....^.......................<...........G.................J.................9...........E.................~...........{...........\...........L.....k.......................,.................9.....e.....C.......................>...................................8.....Z...........C.................;.................-...........L.................N.................1...........-.....y.........................................s.......................*.....p........... .......................i...........).....J.......................L...........M ..... ..... ....Y!.....!....4"....Z"....,#.....#....&$....W$....'%.....%....^&.....&....f'.....(.....(.....(.....)....3*.....*.....*....]+.....+.....,....F,.....,....z-.....-
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):609259
                  Entropy (8bit):5.796202390024141
                  Encrypted:false
                  SSDEEP:
                  MD5:CD741C24AF7597E0DC11069D3AC324E0
                  SHA1:2A883DFBCF48D5093D70D4B77BBFFFA521287334
                  SHA-256:13E982DC4B2B1AEE093E96BA27E02258C2B815CBB062006A4396BB3A3E6A84B1
                  SHA-512:6D27998E25B57FF0CE08C3590B69031038CBA390E68333A83514022B2C56B689AF8AD9715302824027864B5320852E9AB77D74E3B8A90DC66DF59F48CEB528C9
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.*...s.;...t.D...v.Y...w.f...y.l...z.{...|.....}...........................................................................................;.......................-...........A.................[...........O.....u...........v.................6.......................+.......................}...........G.....y.....9...........K.....y.............................z...........?.....V...................................T.................X.......................r...................................9.....J...........H.......................}.................'.......................<.......................O.............................Z................._.................*.................)........... .....V.....v.......................j...........N.................3...................................O.....v................./.....C.......................@...........) ....^ ....w ..... ....J!....}!.....!..../".....".....#....8#
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):441207
                  Entropy (8bit):6.685712707138377
                  Encrypted:false
                  SSDEEP:
                  MD5:99E6ACFB46923C4F8B29058E9EE6166B
                  SHA1:AF06C42E5F3578ADBC4F0BD7262DC6775FDD351F
                  SHA-256:9D8498875263B19552A982D1850F2F942FF44AF4E323BC5A3A67C34413994D95
                  SHA-512:4FDF5186FC2FC68210C2BE91F5B821F0979CA67D6C9B8915C14E7A20D3CE2548EB2660D5F9F398CF6C585A5C0725FA34FD3670F416F7C8A4F009C729BCF02988
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#..e.T...h.\...i.d...j.g...k.v...l.}...m.....o.....p.....q.....r.....s.....t.....v.....w.....|.....}...............................(.....-.....5.....<.....C.....E.....J.....S....._.....q.................v.................1......................./.......................:.......................>.............................c.......................D.....j................._.......................n.......................T.....}.................@.....o.................V.......................5.....O.....i................."...........x.......................U.......................].......................=.......................".....s.......................L.....u.................g.......................W.....w.................3.....X.....o...........&.....J.....\.................=.....].............................y.......................y...................................N.....`...........,.....d.....y...........).....O.....^.............................|.......................x.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):439630
                  Entropy (8bit):6.6906570508767995
                  Encrypted:false
                  SSDEEP:
                  MD5:BB7C995F257B9125457381BB01856D72
                  SHA1:21C55FF5CBC4F223C23D5A2FBCC9E051DB78A44C
                  SHA-256:F2299E03E99B0E9A9CACE3B1C72E6C8C5FE089487CA1C82F2AAF4273B62E37A2
                  SHA-512:5247C5DA6F00DF6241500524DDB162041A03649FA0AFCC11AD40E820814958768A2E11CE34E1250FDBF42B2459F8C06B00AE7442B537F0731A62C6724FC8D890
                  Malicious:false
                  Reputation:unknown
                  Preview:.........#,.e.....h.....i.)...j.-...k.<...l.G...n.O...o.T...p.\...q.b...r.n...s.....t.....v.....w.....y.....z.....|.....}...................................................................%.....4.....C...........3.....q.................+.....T.....`........... .....R.....d.................M.....b.................3.....?.............................g.......................[.......................S.......................;.......................*.......................@.......................F.............................D.....d.....p.................2.....A.............................q.......................T.......................<.............................i.......................f.......................A.....[.....o.................!.............................u.......................^.............................h.......................P.........................................H.......................Z.......................$.....e.....z.................1.....X.....j...........#.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):275968
                  Entropy (8bit):5.778490068583466
                  Encrypted:false
                  SSDEEP:
                  MD5:7EA1429E71D83A1CCAA0942C4D7F1C41
                  SHA1:4CE6ACF4D735354B98F416B3D94D89AF0611E563
                  SHA-256:EDEC54DA1901E649588E8CB52B001AB2AEC76ED0430824457A904FCC0ABD4299
                  SHA-512:91C90845A12A377B617140B67639CFA71A0648300336D5EDD422AFC362E65C6CCD3A4FF4936D4262B0EAF7BAE2B9624BCD3C7EEC79F7E7CA18ABE1EC62C4C869
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.X...........!.....,..........~K... ...`....... ..............................H.....@.................................$K..W....`...............................I............................................... ............... ..H............text....+... ...,.................. ..`.rsrc........`......................@..@.reloc...............4..............@..B................`K......H...........<x...............-..P .......................................i.)V.#c....e../.`...V....j>..*..?.LbrzKV.x.}...........[.f)..dD`..66.61[.z....W^....>F..r...#. ..g...T...P....Ss)ii.a.v.(0.....(1...o2...s....}....*...0..7........{....-%~....r...p.{....r9..p(3...(.....(.......(4....*.........//........{....*"..}....*..{....*....0..4..........%...(5....-.~....r?..p(....+...}.......,..(6....*........')........{....*..{....*"..}....*.*..{....*"..}....*.0..........
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1547797
                  Entropy (8bit):4.370092880615517
                  Encrypted:false
                  SSDEEP:
                  MD5:32AB4E0A9A82245EE3B474EF811F558F
                  SHA1:9F2C4C9EEB5720D765F2321ACD0FF9F8DD11E6A4
                  SHA-256:9BBF4D15F8FB11F7D2C032BD920D2A33B2C2CB8EF62E7E023049AF6132F5D6C1
                  SHA-512:A0574A170F69F9926C32BAF6119A16A381FEC9E881B304082859EE7CFF463570C78984EE14369C59CDB19E532B3ABF193D02B462F1B40D07214B6244150CD63F
                  Malicious:false
                  Reputation:unknown
                  Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>log4net</name>.. </assembly>.. <members>.. <member name="T:log4net.Appender.AdoNetAppender">.. <summary>.. Appender that logs to a database... </summary>.. <remarks>.. <para>.. <see cref="T:log4net.Appender.AdoNetAppender"/> appends logging events to a table within a.. database. The appender can be configured to specify the connection .. string by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionString"/> property. .. The connection type (provider) can be specified by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionType"/>.. property. For more information on database connection strings for.. your specific database see <a href="http://www.connectionstrings.com/">http://www.connectionstrings.com/</a>... </para>.. <para>.. Record
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):342741
                  Entropy (8bit):5.496697631795104
                  Encrypted:false
                  SSDEEP:
                  MD5:A58DB728B50E6B82CBDCAA0DB61D36B1
                  SHA1:7CD76526CB29A0FF5350A2B52D48D1886360458B
                  SHA-256:BA2F2AC6AE9BC67399728F25772A0EB3E840695395CC747ADF4B2F8B5D6D9A46
                  SHA-512:0DB9AFBDADA44364521D89BAB6055458125F4F3C8C1B09048EAFA4055A194231CCFFD82FCDADA9360AB2B19F472B893330EBFCB027391E7A0C2B1100FC51E673
                  Malicious:false
                  Reputation:unknown
                  Preview:..mirrors....(function(a,b){."use strict";.var c=a.Array;.var d=a.isNaN;.var e=a.JSON.stringify;.var f;.var g;.var h=b.ImportNow("promise_state_symbol");.var i=b.ImportNow("promise_result_symbol");.var j;.var k;.b.Import(function(l){.f=l.MapEntries;.g=l.MapIteratorNext;.j=l.SetIteratorNext;.k=l.SetValues;.});.var m={.UNDEFINED_TYPE:'undefined',.NULL_TYPE:'null',.BOOLEAN_TYPE:'boolean',.NUMBER_TYPE:'number',.STRING_TYPE:'string',.SYMBOL_TYPE:'symbol',.OBJECT_TYPE:'object',.FUNCTION_TYPE:'function',.REGEXP_TYPE:'regexp',.ERROR_TYPE:'error',.PROPERTY_TYPE:'property',.INTERNAL_PROPERTY_TYPE:'internalProperty',.FRAME_TYPE:'frame',.SCRIPT_TYPE:'script',.CONTEXT_TYPE:'context',.SCOPE_TYPE:'scope',.PROMISE_TYPE:'promise',.MAP_TYPE:'map',.SET_TYPE:'set',.ITERATOR_TYPE:'iterator',.GENERATOR_TYPE:'generator',.}.var n=0;.var o=-1;.var p=[];.var q=true;.function MirrorCacheIsEmpty(){.return n==0&&p.length==0;.}.function ToggleMirrorCache(r){.q=r;.ClearMirrorCache();.}.function ClearMirrorCache(r){.
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8226870
                  Entropy (8bit):7.996842728494533
                  Encrypted:true
                  SSDEEP:
                  MD5:F7EC58AEA756F3FD8A055AC582103A78
                  SHA1:086B63691F5E5375A537E99E062345F56512A22C
                  SHA-256:517418184EA974C33FFE67B03732D19B1234DCB9E5C1C2E9E94ED41B3BC1D064
                  SHA-512:C620C6E16BBCEE9BC607E6CA75D602C756276AC69E5F3761D82DE7728164133656A71A69043EB1A86CE3051FDE4327A47EFD41D1FF47C8385699CA67C423AD7B
                  Malicious:false
                  Reputation:unknown
                  Preview:............f.6:..{..D..|..G..~. K.....]....._....=.....c...........9.....B.............................F.....K/.....2....54....r5.....6.....?.....@....jB.....C....hD.....E.....H....nj.....k.....r....@~...."..........W.....................;..../;'...2;P...7;....8;....C;....D;U...E;....F;....G;A,..H;.;..I;gK..J;.Z..K;.h..L;.}..M;y...N;{...O;z...P;....Q;8...R;....S;....T;C'..U;.=..V;.W..W;.m..X;....Y;....Z;D...[;....\;....];.....<.....<x....<.....<-....<\....<.....<.....<.....<.....<*(...< /...<+3...<.3..I=.3..J=.7..K=.9..R= >..S=.G..T=}V..[=;w..\=.x..]=.}..^=R..._=....`=....a=....b=....c=....e=:...f=.....=....=.....=....=`....=p....=.....=.....=.....=.....=.....=K....=.....=t....=.....=.....=.....=\....=Z....=.....=T....=[....=x....=.....=.....=D....=.....=.....=.....=l....=F....=.'...=j)...>.+...>l,...>_0...>.2...>.6...>.8..N>.\..O>~^..P>._..Q>%d..R>.k..S>.l..T>Tn..U>.p..b>.u..c>/y..d>.|..B@....C@....D@o...E@....F@W...L@Z...M@(...N@...O@....D.....D ....D ....D;....D.....D....D..
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):276319
                  Entropy (8bit):4.242318669799302
                  Encrypted:false
                  SSDEEP:
                  MD5:8234983533FA47D2A1D7710FF8274299
                  SHA1:E4C5793B6FE6A6C6C9D8E3921B3BC341AE3448D8
                  SHA-256:F95553D8066144CBB8A05EED1735C94A4B97A2E44E49F624C2302990A13017C9
                  SHA-512:1E7E201B0FF9AFA7821B5FFD0A36548A49CD4DBBABA5858E13DA35058670A5053723DD3544B2FD85C619F2B8FC9E5DB48DF977BB293E7BA7DE6F22CC8DAB28CA
                  Malicious:false
                  Reputation:unknown
                  Preview:.........X./j1N.11.8.172.9.......................................................@...y...........@..`....`....`....`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.8731406795131327
                  Encrypted:false
                  SSDEEP:
                  MD5:2C66F3C2190A84FAFD4449DAF6440EAC
                  SHA1:7B9E4C94329FE26C34E63AB8336227FD5EB553E9
                  SHA-256:58EB97E30289A3FCAE270DBCC01258A862936350CB0EF781AE76D6A9444C0155
                  SHA-512:62713209575426CE503605C6F451E9DFB025BE0295F0A453614862CE390F5987F0E16BAE6B37B4B1A7330A7CB5AA31249F8CF58DE37B8B701C16881E4E4E61C1
                  Malicious:false
                  Reputation:unknown
                  Preview:start GamePall.exe OuWe5kl
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:MSVC program database ver 7.00, 512*4023 bytes
                  Category:dropped
                  Size (bytes):2059776
                  Entropy (8bit):4.067542396670122
                  Encrypted:false
                  SSDEEP:
                  MD5:70F9EAEA8A2A604E59F72EDE66F83AB4
                  SHA1:0AB9EA1BFFDFF471EC22AB289C7FBC5E0CDF48BF
                  SHA-256:38A07BA75CC2BBDF715CA87D380A4E5A0DCFAF9C30C5ECD30F6107871D51825B
                  SHA-512:47DE4DAD93385A4907FADE307040FE026ED66989C0C9915AFC96CB2BC93DE5E106DC1274E4AD2382021C758C60FEDE06D68998CF3591E23E2951778CE09D6D4C
                  Malicious:false
                  Reputation:unknown
                  Preview:Microsoft C/C++ MSF 7.00...DS................J..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):346624
                  Entropy (8bit):6.54104466243173
                  Encrypted:false
                  SSDEEP:
                  MD5:7A53AD3E5D2E65C982450E7B7453DE8A
                  SHA1:99F27E54F1F61207C02110CAC476405557A8AD54
                  SHA-256:24FDDD6A367792A9D86D9060FC9AA459B5FB0F67804CB7D139A100D86BBDAFF8
                  SHA-512:2B5E5DB46FDC787CB46CDAEBFFC01586E248FBB864677B27AF03CDC33E956DEF51B3F836597E7092C4175CF605C44728C6F96B74BB2C9870E9715D4AF4C531A1
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.........T............................................................@A....................................P....p...........................3..4.......................8........G...............................................text............................... ..`.rdata..............................@..@.data....4..........................@....00cfg.......@......................@..@.tls.........P......................@....voltbl......`...........................rsrc........p......................@..@.reloc...3.......4..................@..B........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):2445312
                  Entropy (8bit):6.750207745422387
                  Encrypted:false
                  SSDEEP:
                  MD5:334C3157E63A34B22CCE25A44A04835F
                  SHA1:C6B05BD55BE9FED3B0C5077C5649E2A41C10DC08
                  SHA-256:3E307570B574469EC8BCF1CE6D5291DF8D627CA3812F05AACFEBBD3F00B17F89
                  SHA-512:11F538ADD05515861891892EBB90163B6540B72FEB380D64B4A0AA56C6415E3B71374557BF50D0B936712B1006F2B94D59BEBFBF18CBF93BB883D9055CAAEEE9
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.....4 .................................................p*...........@A..........................#.. ....$.d....P)......................`).......#.......................#......."...............$.P............................text.../2 ......4 ................. ..`.rdata..\....P ......8 .............@..@.data...L....@$...... $.............@....00cfg....... )......>$.............@..@.tls.........0)......@$.............@....voltbl.M....@)......B$..................rsrc........P)......D$.............@..@.reloc.......`)......H$.............@..B........................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):631017
                  Entropy (8bit):5.144793130466209
                  Encrypted:false
                  SSDEEP:
                  MD5:0794DF29DF8DFC3ECE5C443F864F5AEB
                  SHA1:BFD4A9A34BEB9751BC4203FB9A9172F1F05E5B16
                  SHA-256:3EE2237E9B14871165B051CCF892C8375E45B5F12841E02F4B9D37F5D5A03283
                  SHA-512:0D34E36F7455B977F086F04840FBA679284A619A7164A56B5C7FC2ADCB23A231B67A62101540EB07CF5C8192790266B08D2CC232D291621C331FE77C1F5E52C0
                  Malicious:false
                  Reputation:unknown
                  Preview:..........d..<..11.8.172.9......................................................@...]!...S..y...-[..........`....`....`T...`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...........................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4400640
                  Entropy (8bit):6.667314807988382
                  Encrypted:false
                  SSDEEP:
                  MD5:7F913E31D00082338F073EF60D67B335
                  SHA1:AC831B45F2A32E23BA9046044508E47E04CDA3A4
                  SHA-256:B60E9818C4EA9396D0D2D2A4AC79C7DC40D0DFF6BB8BC734D0AB14ADC30FBF30
                  SHA-512:E1AC79C775CF9137283CD2C1AE1A45EC597E0351CDB9C11D483E2E1F8B00CC2BBC5807A50DED13A3A5E76F06C1A565EFF1233F4EC727B0C5F7AA3BEAEA906750
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....$5.........P.-......................................PD...........@A........................8=?.~....\?.P.... B......................0B.X.....?.....................H.?......@5.............._?..............................text...T#5......$5................. ..`.rdata...a...@5..b...(5.............@..@.data...@N....?..x....?.............@....00cfg........B.......A.............@..@.tls....5.....B.......A.............@....rsrc........ B.......A.............@..@.reloc..X....0B.......A.............@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):106
                  Entropy (8bit):4.724752649036734
                  Encrypted:false
                  SSDEEP:
                  MD5:8642DD3A87E2DE6E991FAE08458E302B
                  SHA1:9C06735C31CEC00600FD763A92F8112D085BD12A
                  SHA-256:32D83FF113FEF532A9F97E0D2831F8656628AB1C99E9060F0332B1532839AFD9
                  SHA-512:F5D37D1B45B006161E4CEFEEBBA1E33AF879A3A51D16EE3FF8C3968C0C36BBAFAE379BF9124C13310B77774C9CBB4FA53114E83F5B48B5314132736E5BB4496F
                  Malicious:false
                  Reputation:unknown
                  Preview:{"file_format_version": "1.0.0", "ICD": {"library_path": ".\\vk_swiftshader.dll", "api_version": "1.0.5"}}
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):826368
                  Entropy (8bit):6.78646032943732
                  Encrypted:false
                  SSDEEP:
                  MD5:A031EB19C61942A26EF74500AD4B42DF
                  SHA1:FDC6EA473234F153639E963E8EFB8D028DA1BE20
                  SHA-256:207706A3A3FAA8500F88CB034B26413074EFC67221A07C5F70558F3C40985A91
                  SHA-512:80F843E47FC2B41B17EF6EA1BB2BB04119B2417311599EC52120D9F9DF316B4D7B1DAF97EE5CDF2AE78CDB9475E5C65255A7F2AB2A9231804F6A82C83303FD19
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....|..........@.....................................................@A...........................<!..$...P....p..............................l..............................................P................................text....z.......|.................. ..`.rdata..tr.......t..................@..@.data....7..........................@....00cfg.......P......................@..@.tls.........`......................@....rsrc........p......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\AppData\Local\Temp\setup.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):211456
                  Entropy (8bit):6.566524833521835
                  Encrypted:false
                  SSDEEP:
                  MD5:6D7FD214164C858BBCF4AA050C114E8C
                  SHA1:B8868DA6BB9A79EE7C9901A9BFAC580D5BAFCC96
                  SHA-256:3F58FB22BD1A1159C351D125BEE122A16BB97BABB5FCA67FDBD9AAAED3B302E6
                  SHA-512:0F8F2523C3A616AC7C72A1239B7E353F6A684FF75DA79D1CAF9B98A47FF6FE06329165825704C67C04E92073BA2C17D0FF339C57731DDF0F1489C2E97D1D0A14
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............^...^...^..._...^..._q..^..._..^..._..^..._..^..._..^k.._...^..._...^...^...^k.._...^k.._...^n..^...^k.._...^Rich...^........................PE..L...Ua.X.........."!.........(......c........0............................................@.................................x...<....@.......................P..T"......8...............................@............0..0............................text............................... ..`.rdata..`....0....... ..............@..@.data...............................@....gfids.......0......................@..@.rsrc........@......................@..@.reloc..T"...P...$..................@..B........................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):166912
                  Entropy (8bit):6.630595699867236
                  Encrypted:false
                  SSDEEP:
                  MD5:7904C33D58C3E399BF5BC6E9C1D67BCB
                  SHA1:90BEEFB222C7AEB95D521C0C323C4AEA823101AA
                  SHA-256:D6D251F8DC5E403B7B00D5DE2831E411E91DCCF2A1EBDEC794A9CA6210F90487
                  SHA-512:F9C6CD236186FE1EC0F80E0326D58CB87AF409FAB41FB8DBAEB1906157C69C74A45C06CE5FFCEFC8BF82C3A2BD8C98ECEDB3367F9F0F5B967451CE69FCA05CC1
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 61%
                  Reputation:unknown
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.................d.......u.......c.x...?"..........u.....j.......t.......q.....Rich............PE..L.....d.................l....0...................@..........................`1.....#..........................................P.....0.................................................................................|............................text...nk.......l.................. ..`.rdata..` ......."...p..............@..@.data...H...........................@....rsrc.........0.....................@..@................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\explorer.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:unknown
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.630595699867236
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:EiPVv5yELP.exe
                  File size:166'912 bytes
                  MD5:7904c33d58c3e399bf5bc6e9c1d67bcb
                  SHA1:90beefb222c7aeb95d521c0c323c4aea823101aa
                  SHA256:d6d251f8dc5e403b7b00d5de2831e411e91dccf2a1ebdec794a9ca6210f90487
                  SHA512:f9c6cd236186fe1ec0f80e0326d58cb87af409fab41fb8dbaeb1906157c69c74a45c06ce5ffcefc8bf82c3a2bd8c98ecedb3367f9f0f5b967451ce69fca05cc1
                  SSDEEP:3072:Tj5vLNHqjZ7ks9YZkt+p2S7omEhhPQ5spUMLjgfzVzu1KuU3:/5vLNHOFksiZp0S7oT1UUsfpz7
                  TLSH:62F3497136F69136F3F75A341BB4E6945E3BB8A37934818E26102F4E0E326D18D62763
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.................d.......u.......c.x...?"..........u.....j.......t.......q.....Rich............PE..L......d.................l.
                  Icon Hash:cb97374d55515d9a
                  Entrypoint:0x401908
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x64A9E7B6 [Sat Jul 8 22:48:22 2023 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:1f26c0d9ea65ace741c1ad9345fbbca3
                  Instruction
                  call 00007F8310EE9F05h
                  jmp 00007F8310EE61CEh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  sub esp, 00000328h
                  mov dword ptr [0041C918h], eax
                  mov dword ptr [0041C914h], ecx
                  mov dword ptr [0041C910h], edx
                  mov dword ptr [0041C90Ch], ebx
                  mov dword ptr [0041C908h], esi
                  mov dword ptr [0041C904h], edi
                  mov word ptr [0041C930h], ss
                  mov word ptr [0041C924h], cs
                  mov word ptr [0041C900h], ds
                  mov word ptr [0041C8FCh], es
                  mov word ptr [0041C8F8h], fs
                  mov word ptr [0041C8F4h], gs
                  pushfd
                  pop dword ptr [0041C928h]
                  mov eax, dword ptr [ebp+00h]
                  mov dword ptr [0041C91Ch], eax
                  mov eax, dword ptr [ebp+04h]
                  mov dword ptr [0041C920h], eax
                  lea eax, dword ptr [ebp+08h]
                  mov dword ptr [0041C92Ch], eax
                  mov eax, dword ptr [ebp-00000320h]
                  mov dword ptr [0041C868h], 00010001h
                  mov eax, dword ptr [0041C920h]
                  mov dword ptr [0041C81Ch], eax
                  mov dword ptr [0041C810h], C0000409h
                  mov dword ptr [0041C814h], 00000001h
                  mov eax, dword ptr [0041B004h]
                  mov dword ptr [ebp-00000328h], eax
                  mov eax, dword ptr [0041B008h]
                  mov dword ptr [ebp-00000324h], eax
                  call dword ptr [000000A4h]
                  Programming Language:
                  • [C++] VS2008 build 21022
                  • [ASM] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x197ec0x50.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x23080000xdbe8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x180000x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x16b6e0x16c0095e3c50764435980083cc8037c11bde0False0.8049128605769231data7.509218380839062IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x180000x20600x22002471ecf55d839f1dc649ef6231121337False0.35098805147058826data5.387579547232506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x1b0000x22ec5480x1e00f2fc4642fd97088336782ef23b34fe07unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x23080000xdbe80xdc00c81d265eafcdf8a212e6a822ca10eb08False0.5248579545454546data5.201018124138037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  NUSUTUMA0x230eed80x3faASCII text, with very long lines (1018), with no line terminatorsTurkishTurkey0.6277013752455796
                  RT_CURSOR0x230f2d80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                  RT_ICON0x23086a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.6090085287846482
                  RT_ICON0x23095480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6944945848375451
                  RT_ICON0x2309df00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.7546082949308756
                  RT_ICON0x230a4b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7955202312138728
                  RT_ICON0x230aa200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5968879668049792
                  RT_ICON0x230cfc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.7263133208255159
                  RT_ICON0x230e0700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.7364754098360655
                  RT_ICON0x230e9f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.8820921985815603
                  RT_STRING0x230f5d00xaadata0.611764705882353
                  RT_STRING0x230f6800x6edata0.6
                  RT_STRING0x230f6f00x6b2data0.4305717619603267
                  RT_STRING0x230fda80x688data0.4342105263157895
                  RT_STRING0x23104300x6a4data0.42764705882352944
                  RT_STRING0x2310ad80x202data0.5019455252918288
                  RT_STRING0x2310ce00x6a4data0.42705882352941177
                  RT_STRING0x23113880x6d8data0.4297945205479452
                  RT_STRING0x2311a600x7e0data0.42162698412698413
                  RT_STRING0x23122400x71adata0.42684268426842686
                  RT_STRING0x23129600x698data0.4277251184834123
                  RT_STRING0x2312ff80x798data0.4202674897119342
                  RT_STRING0x23137900x6dcdata0.4299544419134396
                  RT_STRING0x2313e700x82cdata0.41634799235181646
                  RT_STRING0x23146a00x672data0.44
                  RT_STRING0x2314d180x752data0.4247598719316969
                  RT_STRING0x23154700x720data0.42598684210526316
                  RT_STRING0x2315b900x52data0.6585365853658537
                  RT_GROUP_CURSOR0x230f4080x14data1.15
                  RT_GROUP_ICON0x230ee600x76dataTurkishTurkey0.6610169491525424
                  RT_VERSION0x230f4200x1b0data0.5972222222222222
                  DLLImport
                  KERNEL32.dllZombifyActCtx, CreateJobObjectW, GetModuleHandleExW, SetVolumeMountPointW, SleepEx, GetCommProperties, GetModuleHandleW, GetTickCount, ReadConsoleOutputA, GlobalAlloc, GetConsoleAliasExesLengthW, lstrcpynW, WriteConsoleW, GetModuleFileNameW, OpenJobObjectA, GetLastError, GetProcAddress, BuildCommDCBW, GetAtomNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, SetFileApisToANSI, AddAtomA, FoldStringA, lstrcatW, EnumDateFormatsW, FindFirstVolumeA, GetConsoleAliasesW, GetComputerNameA, CreateFileA, GetConsoleOutputCP, MultiByteToWideChar, HeapReAlloc, HeapAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, Sleep, HeapSize, ExitProcess, HeapCreate, VirtualFree, HeapFree, VirtualAlloc, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, ReadFile, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA
                  GDI32.dllGetBoundsRect
                  ole32.dllCoTaskMemRealloc
                  Language of compilation systemCountry where language is spokenMap
                  TurkishTurkey
                  Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:01:46:55
                  Start date:03/07/2024
                  Path:C:\Users\user\Desktop\EiPVv5yELP.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\EiPVv5yELP.exe"
                  Imagebase:0x400000
                  File size:166'912 bytes
                  MD5 hash:7904C33D58C3E399BF5BC6E9C1D67BCB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2273459134.0000000004371000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.2273150285.00000000028B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:01:47:08
                  Start date:03/07/2024
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\Explorer.EXE
                  Imagebase:0x7ff609140000
                  File size:5'141'208 bytes
                  MD5 hash:662F4F92FDE3557E86D110526BB578D5
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:6
                  Start time:01:47:25
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\whhsvcw
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\whhsvcw
                  Imagebase:0x400000
                  File size:166'912 bytes
                  MD5 hash:7904C33D58C3E399BF5BC6E9C1D67BCB
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2576511233.00000000029D1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000006.00000002.2576456147.00000000029B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000006.00000002.2576427770.00000000029A0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                  Antivirus matches:
                  • Detection: 61%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:01:47:38
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\2499.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\2499.exe
                  Imagebase:0xd20000
                  File size:6'642'176 bytes
                  MD5 hash:BD2EAC64CBDED877608468D86786594A
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000003.2650281642.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000003.2650072383.0000000001A54000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 50%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:10
                  Start time:01:47:47
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\45DE.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\45DE.exe
                  Imagebase:0x7ff7934f0000
                  File size:293'869 bytes
                  MD5 hash:60172CA946DE57C3529E9F05CC502870
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 21%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:11
                  Start time:01:47:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\62FC.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Local\Temp\62FC.exe
                  Imagebase:0x210000
                  File size:578'048 bytes
                  MD5 hash:DA4B6F39FC024D2383D4BFE7F67F1EE1
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 0000000B.00000002.3523455444.000000000091D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 16%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:14
                  Start time:01:49:13
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Local\Temp\setup.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Local\Temp\setup.exe"
                  Imagebase:0x400000
                  File size:107'232'830 bytes
                  MD5 hash:FF2293FBFF53F4BD2BFF91780FABFD60
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 3%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:15
                  Start time:01:49:43
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Imagebase:0x770000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 3%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:17
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3728 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                  Imagebase:0xbd0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:18
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xa90000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Target ID:19
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4412 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Imagebase:0xcc0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:20
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4492 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                  Imagebase:0x800000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:21
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642839349 --mojo-platform-channel-handle=4608 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Imagebase:0x1a0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:22
                  Start time:01:49:53
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Android 13; Mobile; rv:127.0) Gecko/127.0 Firefox/127.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719979751033256 --launch-time-ticks=6642849290 --mojo-platform-channel-handle=4680 --field-trial-handle=3716,i,10340991844468305379,15237520807086814430,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                  Imagebase:0x6e0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:23
                  Start time:01:49:54
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xc10000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:24
                  Start time:01:49:54
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x5b0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:25
                  Start time:01:49:54
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xc30000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:26
                  Start time:01:49:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x350000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:27
                  Start time:01:49:55
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x9f0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:28
                  Start time:01:49:57
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x790000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:29
                  Start time:01:49:58
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x380000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:30
                  Start time:01:49:58
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x120000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:31
                  Start time:01:49:58
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xfd0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:32
                  Start time:01:49:59
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xa00000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:33
                  Start time:01:49:59
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xca0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:34
                  Start time:01:49:59
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xa50000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:35
                  Start time:01:50:00
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x1c0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:36
                  Start time:01:50:00
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0x140000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:37
                  Start time:01:50:01
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xcc0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:38
                  Start time:01:50:01
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                  Imagebase:0xbf0000
                  File size:296'448 bytes
                  MD5 hash:7A3502C1119795D35569535DE243B6FE
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Target ID:39
                  Start time:01:50:01
                  Start date:03/07/2024
                  Path:C:\Users\user\AppData\Roaming\whhsvcw
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\whhsvcw
                  Imagebase:0x400000
                  File size:166'912 bytes
                  MD5 hash:7904C33D58C3E399BF5BC6E9C1D67BCB
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:8.7%
                    Dynamic/Decrypted Code Coverage:20.1%
                    Signature Coverage:46%
                    Total number of Nodes:139
                    Total number of Limit Nodes:6
                    execution_graph 3691 28ee02e 3692 28ee03d 3691->3692 3695 28ee7ce 3692->3695 3696 28ee7e9 3695->3696 3697 28ee7f2 CreateToolhelp32Snapshot 3696->3697 3698 28ee80e Module32First 3696->3698 3697->3696 3697->3698 3699 28ee81d 3698->3699 3700 28ee046 3698->3700 3702 28ee48d 3699->3702 3703 28ee4b8 3702->3703 3704 28ee4c9 VirtualAlloc 3703->3704 3705 28ee501 3703->3705 3704->3705 3705->3705 3803 402e63 3805 402e67 3803->3805 3804 401918 8 API calls 3806 402f44 3804->3806 3805->3804 3805->3806 3845 401543 3855 401546 3845->3855 3846 4015e6 NtDuplicateObject 3847 401603 NtCreateSection 3846->3847 3856 401702 3846->3856 3848 401683 NtCreateSection 3847->3848 3849 401629 NtMapViewOfSection 3847->3849 3851 4016af 3848->3851 3848->3856 3849->3848 3850 40164c NtMapViewOfSection 3849->3850 3850->3848 3852 40166a 3850->3852 3853 4016b9 NtMapViewOfSection 3851->3853 3851->3856 3852->3848 3854 4016e0 NtMapViewOfSection 3853->3854 3853->3856 3854->3856 3855->3846 3855->3856 3905 401924 3906 401929 3905->3906 3907 40195e Sleep 3906->3907 3908 401979 3907->3908 3909 401538 7 API calls 3908->3909 3910 40198a 3908->3910 3909->3910 3728 402fe9 3729 403140 3728->3729 3730 403013 3728->3730 3730->3729 3731 4030ce RtlCreateUserThread NtTerminateProcess 3730->3731 3731->3729 3911 281092b GetPEB 3912 2810972 3911->3912 3823 401496 3824 401447 3823->3824 3824->3823 3825 4015e6 NtDuplicateObject 3824->3825 3833 40152f 3824->3833 3826 401603 NtCreateSection 3825->3826 3825->3833 3827 401683 NtCreateSection 3826->3827 3828 401629 NtMapViewOfSection 3826->3828 3830 4016af 3827->3830 3827->3833 3828->3827 3829 40164c NtMapViewOfSection 3828->3829 3829->3827 3831 40166a 3829->3831 3832 4016b9 NtMapViewOfSection 3830->3832 3830->3833 3831->3827 3832->3833 3834 4016e0 NtMapViewOfSection 3832->3834 3834->3833 3706 402eb7 3709 402eb8 3706->3709 3707 402f44 3709->3707 3710 401918 3709->3710 3711 401929 3710->3711 3712 40195e Sleep 3711->3712 3713 401979 3712->3713 3715 40198a 3713->3715 3716 401538 3713->3716 3715->3707 3717 401539 3716->3717 3718 4015e6 NtDuplicateObject 3717->3718 3726 401702 3717->3726 3719 401603 NtCreateSection 3718->3719 3718->3726 3720 401683 NtCreateSection 3719->3720 3721 401629 NtMapViewOfSection 3719->3721 3723 4016af 3720->3723 3720->3726 3721->3720 3722 40164c NtMapViewOfSection 3721->3722 3722->3720 3724 40166a 3722->3724 3725 4016b9 NtMapViewOfSection 3723->3725 3723->3726 3724->3720 3725->3726 3727 4016e0 NtMapViewOfSection 3725->3727 3726->3715 3727->3726 3732 417b5a 3737 41785c 3732->3737 3734 417b62 3735 41785c 34 API calls 3734->3735 3761 4175bf GlobalAlloc 3734->3761 3735->3734 3738 417869 3737->3738 3739 4178e8 lstrcatW InterlockedExchangeAdd WriteConsoleW 3738->3739 3747 4179e5 3738->3747 3740 417923 7 API calls 3739->3740 3745 4179b4 3740->3745 3746 4179ab GetBoundsRect 3740->3746 3741 4179f3 GlobalAlloc AddAtomA 3742 417a02 GetCommProperties GetTickCount GetLastError 3741->3742 3743 417a28 ZombifyActCtx 3742->3743 3744 417a2f GetConsoleAliasesW 3742->3744 3743->3744 3744->3747 3748 4179d7 3745->3748 3749 4179bd GetModuleHandleExW 3745->3749 3746->3745 3747->3741 3747->3742 3750 417a4f FoldStringA 3747->3750 3751 417a63 3747->3751 3748->3747 3749->3748 3750->3747 3762 4175bf GlobalAlloc 3751->3762 3753 417aab LoadLibraryA 3763 4175fc 3753->3763 3758 417b09 3768 417819 3758->3768 3760 417b0e 3760->3734 3761->3734 3762->3753 3764 41763b 3763->3764 3765 417647 GetModuleHandleW GetProcAddress 3764->3765 3766 41771d 3764->3766 3765->3764 3767 4175de VirtualProtect 3766->3767 3767->3758 3775 417742 3768->3775 3771 417854 3780 417799 3771->3780 3772 41783c GetConsoleAliasExesLengthW UnhandledExceptionFilter FindFirstVolumeA 3772->3771 3774 417859 3774->3760 3776 417757 CreateJobObjectW 3775->3776 3777 41775f 3775->3777 3776->3777 3778 417773 OpenJobObjectA BuildCommDCBW LoadLibraryA 3777->3778 3779 41778e 3777->3779 3778->3779 3779->3771 3779->3772 3781 4177b3 3780->3781 3782 4177f6 3780->3782 3781->3782 3783 4177d3 GetComputerNameA SleepEx 3781->3783 3782->3774 3783->3781 3784 281003c 3785 2810049 3784->3785 3797 2810e0f SetErrorMode SetErrorMode 3785->3797 3790 2810265 3791 28102ce VirtualProtect 3790->3791 3793 281030b 3791->3793 3792 2810439 VirtualFree 3796 28104be LoadLibraryA 3792->3796 3793->3792 3795 28108c7 3796->3795 3798 2810223 3797->3798 3799 2810d90 3798->3799 3800 2810dad 3799->3800 3801 2810dbb GetPEB 3800->3801 3802 2810238 VirtualAlloc 3800->3802 3801->3802 3802->3790 3807 4014de 3808 401447 3807->3808 3809 4015e6 NtDuplicateObject 3808->3809 3818 40152f 3808->3818 3810 401603 NtCreateSection 3809->3810 3809->3818 3811 401683 NtCreateSection 3810->3811 3812 401629 NtMapViewOfSection 3810->3812 3814 4016af 3811->3814 3811->3818 3812->3811 3813 40164c NtMapViewOfSection 3812->3813 3813->3811 3815 40166a 3813->3815 3816 4016b9 NtMapViewOfSection 3814->3816 3814->3818 3815->3811 3817 4016e0 NtMapViewOfSection 3816->3817 3816->3818 3817->3818

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 146 401496-4014a5 147 4014a7 146->147 148 40151b-40152d 146->148 150 4014a9-4014b5 147->150 151 4014cf 147->151 158 4014ba 148->158 159 40152f-401535 148->159 154 401471-401472 150->154 155 4014b7-4014b8 150->155 152 4014d6 151->152 152->152 156 4014d8 152->156 157 401473-401484 154->157 155->158 160 401449 155->160 156->148 162 40147b-40148e call 4011b7 157->162 164 401447-401456 158->164 165 4014bc-4014c3 158->165 160->162 163 40144b 160->163 162->146 168 40144c-401470 163->168 164->168 169 4014c5-4014c8 165->169 170 401539-401567 165->170 168->157 169->151 180 401558-401563 170->180 181 40156a-401590 call 4011b7 170->181 180->181 188 401592 181->188 189 401595-40159a 181->189 188->189 191 4015a0-4015b1 189->191 192 4018b8-4018c0 189->192 196 4018b6-4018c5 191->196 197 4015b7-4015e0 191->197 192->189 199 4018da 196->199 200 4018cb-4018d6 196->200 197->196 205 4015e6-4015fd NtDuplicateObject 197->205 199->200 202 4018dd-401915 call 4011b7 199->202 200->202 205->196 207 401603-401627 NtCreateSection 205->207 209 401683-4016a9 NtCreateSection 207->209 210 401629-40164a NtMapViewOfSection 207->210 209->196 213 4016af-4016b3 209->213 210->209 212 40164c-401668 NtMapViewOfSection 210->212 212->209 215 40166a-401680 212->215 213->196 216 4016b9-4016da NtMapViewOfSection 213->216 215->209 216->196 218 4016e0-4016fc NtMapViewOfSection 216->218 218->196 221 401702 call 401707 218->221
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                    • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 224 401538-401567 230 401558-401563 224->230 231 40156a-401590 call 4011b7 224->231 230->231 238 401592 231->238 239 401595-40159a 231->239 238->239 241 4015a0-4015b1 239->241 242 4018b8-4018c0 239->242 246 4018b6-4018c5 241->246 247 4015b7-4015e0 241->247 242->239 249 4018da 246->249 250 4018cb-4018d6 246->250 247->246 255 4015e6-4015fd NtDuplicateObject 247->255 249->250 252 4018dd-401915 call 4011b7 249->252 250->252 255->246 257 401603-401627 NtCreateSection 255->257 259 401683-4016a9 NtCreateSection 257->259 260 401629-40164a NtMapViewOfSection 257->260 259->246 263 4016af-4016b3 259->263 260->259 262 40164c-401668 NtMapViewOfSection 260->262 262->259 265 40166a-401680 262->265 263->246 266 4016b9-4016da NtMapViewOfSection 263->266 265->259 266->246 268 4016e0-4016fc NtMapViewOfSection 266->268 268->246 271 401702 call 401707 268->271
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                    • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 274 4014de-4014ed 275 401563 274->275 276 4014ef 274->276 279 40156a-401590 call 4011b7 275->279 277 401551-401552 276->277 278 4014f1-401502 276->278 277->275 280 401504-401516 278->280 281 40151d-40152d 278->281 297 401592 279->297 298 401595-40159a 279->298 284 40151b-40151c 280->284 286 4014ba 281->286 287 40152f-401535 281->287 284->281 290 401447-401456 286->290 291 4014bc-4014c3 286->291 300 40144c-401470 290->300 294 4014c5-4014c8 291->294 295 401539-401567 291->295 296 4014cf 294->296 295->279 313 401558-401560 295->313 301 4014d6 296->301 297->298 309 4015a0-4015b1 298->309 310 4018b8-4018c0 298->310 312 401473-401484 300->312 301->301 304 4014d8 301->304 304->284 320 4018b6-4018c5 309->320 321 4015b7-4015e0 309->321 310->298 317 40147b-4014a5 call 4011b7 312->317 313->275 317->284 331 4014a7 317->331 324 4018da 320->324 325 4018cb-4018d6 320->325 321->320 333 4015e6-4015fd NtDuplicateObject 321->333 324->325 328 4018dd-401915 call 4011b7 324->328 325->328 331->296 335 4014a9-4014b5 331->335 333->320 336 401603-401627 NtCreateSection 333->336 338 401471-401472 335->338 339 4014b7-4014b8 335->339 340 401683-4016a9 NtCreateSection 336->340 341 401629-40164a NtMapViewOfSection 336->341 338->312 339->286 343 401449 339->343 340->320 345 4016af-4016b3 340->345 341->340 344 40164c-401668 NtMapViewOfSection 341->344 343->317 347 40144b 343->347 344->340 348 40166a-401680 344->348 345->320 349 4016b9-4016da NtMapViewOfSection 345->349 347->300 348->340 349->320 351 4016e0-4016fc NtMapViewOfSection 349->351 351->320 354 401702 call 401707 351->354
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                    • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 357 401543-401544 358 401546-401567 357->358 359 4015af-4015b1 357->359 367 401558-401563 358->367 368 40156a-401590 call 4011b7 358->368 361 4018b6-4018c5 359->361 362 4015b7-4015e0 359->362 365 4018da 361->365 366 4018cb-4018d6 361->366 362->361 376 4015e6-4015fd NtDuplicateObject 362->376 365->366 370 4018dd-401915 call 4011b7 365->370 366->370 367->368 387 401592 368->387 388 401595-40159a 368->388 376->361 379 401603-401627 NtCreateSection 376->379 382 401683-4016a9 NtCreateSection 379->382 383 401629-40164a NtMapViewOfSection 379->383 382->361 389 4016af-4016b3 382->389 383->382 386 40164c-401668 NtMapViewOfSection 383->386 386->382 391 40166a-401680 386->391 387->388 398 4015a0-4015ad 388->398 399 4018b8-4018c0 388->399 389->361 392 4016b9-4016da NtMapViewOfSection 389->392 391->382 392->361 395 4016e0-4016fc NtMapViewOfSection 392->395 395->361 400 401702 call 401707 395->400 398->359 399->388
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                    • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 405 401565-401590 call 4011b7 410 401592 405->410 411 401595-40159a 405->411 410->411 413 4015a0-4015b1 411->413 414 4018b8-4018c0 411->414 418 4018b6-4018c5 413->418 419 4015b7-4015e0 413->419 414->411 421 4018da 418->421 422 4018cb-4018d6 418->422 419->418 427 4015e6-4015fd NtDuplicateObject 419->427 421->422 424 4018dd-401915 call 4011b7 421->424 422->424 427->418 429 401603-401627 NtCreateSection 427->429 431 401683-4016a9 NtCreateSection 429->431 432 401629-40164a NtMapViewOfSection 429->432 431->418 435 4016af-4016b3 431->435 432->431 434 40164c-401668 NtMapViewOfSection 432->434 434->431 437 40166a-401680 434->437 435->418 438 4016b9-4016da NtMapViewOfSection 435->438 437->431 438->418 440 4016e0-4016fc NtMapViewOfSection 438->440 440->418 443 401702 call 401707 440->443
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                    • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 401579-401590 call 4011b7 452 401592 446->452 453 401595-40159a 446->453 452->453 455 4015a0-4015b1 453->455 456 4018b8-4018c0 453->456 460 4018b6-4018c5 455->460 461 4015b7-4015e0 455->461 456->453 463 4018da 460->463 464 4018cb-4018d6 460->464 461->460 469 4015e6-4015fd NtDuplicateObject 461->469 463->464 466 4018dd-401915 call 4011b7 463->466 464->466 469->460 471 401603-401627 NtCreateSection 469->471 473 401683-4016a9 NtCreateSection 471->473 474 401629-40164a NtMapViewOfSection 471->474 473->460 477 4016af-4016b3 473->477 474->473 476 40164c-401668 NtMapViewOfSection 474->476 476->473 479 40166a-401680 476->479 477->460 480 4016b9-4016da NtMapViewOfSection 477->480 479->473 480->460 482 4016e0-4016fc NtMapViewOfSection 480->482 482->460 485 401702 call 401707 482->485
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                    • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 488 40157c-401590 call 4011b7 492 401592 488->492 493 401595-40159a 488->493 492->493 495 4015a0-4015b1 493->495 496 4018b8-4018c0 493->496 500 4018b6-4018c5 495->500 501 4015b7-4015e0 495->501 496->493 503 4018da 500->503 504 4018cb-4018d6 500->504 501->500 509 4015e6-4015fd NtDuplicateObject 501->509 503->504 506 4018dd-401915 call 4011b7 503->506 504->506 509->500 511 401603-401627 NtCreateSection 509->511 513 401683-4016a9 NtCreateSection 511->513 514 401629-40164a NtMapViewOfSection 511->514 513->500 517 4016af-4016b3 513->517 514->513 516 40164c-401668 NtMapViewOfSection 514->516 516->513 519 40166a-401680 516->519 517->500 520 4016b9-4016da NtMapViewOfSection 517->520 519->513 520->500 522 4016e0-4016fc NtMapViewOfSection 520->522 522->500 525 401702 call 401707 522->525
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                    • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 528 402fe9-40300d 529 403140-403145 528->529 530 403013-40302b 528->530 530->529 531 403031-403042 530->531 532 403044-40304d 531->532 533 403052-403060 532->533 533->533 534 403062-403069 533->534 535 40308b-403092 534->535 536 40306b-40308a 534->536 537 4030b4-4030b7 535->537 538 403094-4030b3 535->538 536->535 539 4030c0 537->539 540 4030b9-4030bc 537->540 538->537 539->532 542 4030c2-4030c7 539->542 540->539 541 4030be 540->541 541->542 542->529 543 4030c9-4030cc 542->543 543->529 544 4030ce-40313d RtlCreateUserThread NtTerminateProcess 543->544 544->529
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                    • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 545 28ee7ce-28ee7e7 546 28ee7e9-28ee7eb 545->546 547 28ee7ed 546->547 548 28ee7f2-28ee7fe CreateToolhelp32Snapshot 546->548 547->548 549 28ee80e-28ee81b Module32First 548->549 550 28ee800-28ee806 548->550 551 28ee81d-28ee81e call 28ee48d 549->551 552 28ee824-28ee82c 549->552 550->549 555 28ee808-28ee80c 550->555 556 28ee823 551->556 555->546 555->549 556->552
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 028EE7F6
                    • Module32First.KERNEL32(00000000,00000224), ref: 028EE816
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, Offset: 028EB000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_28eb000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 5f927ac68123b39d970d494c1742f540fae5c0651afe429fd2522ae91cab7878
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 7EF0683E1007256BDB203AF59C8DB6A76E8EF4A639F104629E657D10C0DB70E8454A61

                    Control-flow Graph

                    APIs
                    • lstrcatW.KERNEL32(?,00000000), ref: 004178F0
                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 004178FE
                    • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00417915
                    • lstrcpynW.KERNEL32(?,00000000,00000000), ref: 0041792C
                    • GetAtomNameA.KERNEL32(00000000,00000000,00000000), ref: 00417935
                    • SetFileApisToANSI.KERNEL32 ref: 0041793B
                    • ReadConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 0041797C
                    • SetVolumeMountPointW.KERNEL32(00000000,00000000), ref: 00417984
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 00417993
                    • EnumDateFormatsW.KERNEL32(00000000,00000000,00000000), ref: 0041799C
                    • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 004179AE
                    • GetModuleHandleExW.KERNEL32(00000000,0041931C,?), ref: 004179CA
                    • GlobalAlloc.KERNEL32(00000000,00000000), ref: 004179F5
                    • AddAtomA.KERNEL32(00000000), ref: 004179FC
                    • GetCommProperties.KERNELBASE(00000000,?), ref: 00417A0A
                    • GetTickCount.KERNEL32 ref: 00417A10
                    • GetLastError.KERNEL32 ref: 00417A16
                    • ZombifyActCtx.KERNEL32(00000000), ref: 00417A29
                    • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00417A38
                    • FoldStringA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00417A54
                    • LoadLibraryA.KERNELBASE(004193A0), ref: 00417AFD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Console$AtomFileModuleName$AliasesAllocApisBoundsCommCountDateEnumErrorExchangeFoldFormatsGlobalHandleInterlockedLastLibraryLoadMountOutputPointPropertiesReadRectStringTickVolumeWriteZombifylstrcatlstrcpyn
                    • String ID: k`$tl_$}$
                    • API String ID: 3342591227-211918992
                    • Opcode ID: f57c8d55a3b0fce3545dfe034b3181d3b0cfbbc214520a92931e9c23be15421d
                    • Instruction ID: ee85e0ce5380fe6a93d76390f7868a1e87d883590811e132613b796483cd1889
                    • Opcode Fuzzy Hash: f57c8d55a3b0fce3545dfe034b3181d3b0cfbbc214520a92931e9c23be15421d
                    • Instruction Fuzzy Hash: 90718D71945528AFD721AB61EC88CDF7B79FF09354B10846AF505E2160CF388A89CFAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 61 281003c-2810047 62 2810049 61->62 63 281004c-2810263 call 2810a3f call 2810e0f call 2810d90 VirtualAlloc 61->63 62->63 78 2810265-2810289 call 2810a69 63->78 79 281028b-2810292 63->79 84 28102ce-28103c2 VirtualProtect call 2810cce call 2810ce7 78->84 80 28102a1-28102b0 79->80 83 28102b2-28102cc 80->83 80->84 83->80 90 28103d1-28103e0 84->90 91 28103e2-2810437 call 2810ce7 90->91 92 2810439-28104b8 VirtualFree 90->92 91->90 93 28105f4-28105fe 92->93 94 28104be-28104cd 92->94 97 2810604-281060d 93->97 98 281077f-2810789 93->98 96 28104d3-28104dd 94->96 96->93 100 28104e3-2810505 96->100 97->98 103 2810613-2810637 97->103 101 28107a6-28107b0 98->101 102 281078b-28107a3 98->102 112 2810517-2810520 100->112 113 2810507-2810515 100->113 105 28107b6-28107cb 101->105 106 281086e-28108be LoadLibraryA 101->106 102->101 107 281063e-2810648 103->107 109 28107d2-28107d5 105->109 111 28108c7-28108f9 106->111 107->98 110 281064e-281065a 107->110 114 2810824-2810833 109->114 115 28107d7-28107e0 109->115 110->98 116 2810660-281066a 110->116 117 2810902-281091d 111->117 118 28108fb-2810901 111->118 119 2810526-2810547 112->119 113->119 123 2810839-281083c 114->123 120 28107e2 115->120 121 28107e4-2810822 115->121 122 281067a-2810689 116->122 118->117 124 281054d-2810550 119->124 120->114 121->109 125 2810750-281077a 122->125 126 281068f-28106b2 122->126 123->106 127 281083e-2810847 123->127 129 28105e0-28105ef 124->129 130 2810556-281056b 124->130 125->107 131 28106b4-28106ed 126->131 132 28106ef-28106fc 126->132 133 2810849 127->133 134 281084b-281086c 127->134 129->96 135 281056d 130->135 136 281056f-281057a 130->136 131->132 137 281074b 132->137 138 28106fe-2810748 132->138 133->106 134->123 135->129 141 281059b-28105bb 136->141 142 281057c-2810599 136->142 137->122 138->137 145 28105bd-28105db 141->145 142->145 145->124
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0281024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2810000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: f4ec62c4d129d2e658f4702112ec1a846add4b308be7e49c314ac1af42bcde23
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: F5526C78A01229DFDB64CF58C984BACBBB5BF09304F1480D9E94DAB351DB30AA85CF15

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 558 2810e0f-2810e24 SetErrorMode * 2 559 2810e26 558->559 560 2810e2b-2810e2c 558->560 559->560
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,02810223,?,?), ref: 02810E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,02810223,?,?), ref: 02810E1E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2810000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 2990e7859dc59adbfe0ae8cfe0c40638cdeba9547af7afc42933400fb5fde7f1
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: B5D0123514512877DB002A95DC09BCD7B1CDF05B66F008011FB0DD9080C770954046E5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 561 4175de-4175fb VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004175F4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                    • Instruction ID: 4c62818881ac23e86d27b7ad5f6e3bb285c85b39ac0806b91a2128f0277fdf34
                    • Opcode Fuzzy Hash: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                    • Instruction Fuzzy Hash: 8CC08CB194020DFFDB018B91FC41E8D7BACF300248F808020B716A1060CAB1AD289F68
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                    • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                    • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 028EE4DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, Offset: 028EB000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_28eb000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 4a3c6c9a6f7b31436f2db69bc4f1d88a6543b2770d80fe44d2b35bffdb111658
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 39113C79A00208EFDB01DF98C985E98BBF5AF08351F058094F9489B362D371EA50DF80
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                    • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                    • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000000.00000002.2271986347.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                    • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                    APIs
                    • GlobalAlloc.KERNELBASE(00000000,00417AAB), ref: 004175C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: AllocGlobal
                    • String ID:
                    • API String ID: 3761449716-0
                    • Opcode ID: 6adb750e7ea17ba4dfc271b57f0e32d75a63e91da777faa17e994a4e47bbaa96
                    • Instruction ID: d55db0c2126c828c826ef05274ed4aaa6eabc9571a3453db39e0ff1d3a989bdf
                    • Opcode Fuzzy Hash: 6adb750e7ea17ba4dfc271b57f0e32d75a63e91da777faa17e994a4e47bbaa96
                    • Instruction Fuzzy Hash: B6B01270C80204DFDB000FB0EC44B0C7FA1B30C302F40C415F50441158CFB004289F20
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2810000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 8b3dfb3103d74bef027eb01afde4e0937cc6795672d9fd6111d89925f8242f03
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: 87314BBA900609DFDB10CF99C880AADBBF9FF48328F14414AD845E7255D771EA85CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273300535.00000000028EB000.00000040.00000020.00020000.00000000.sdmp, Offset: 028EB000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_28eb000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction ID: e23d476a1563bf25fbcffcd8e80946758f44a798eb9c756362e1c698026bb41c
                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                    • Instruction Fuzzy Hash: F811C27A340100AFDB44CF59DC80FA273EAFB8A330B198065ED09CB305E675E842C760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2273002099.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_2810000_EiPVv5yELP.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction ID: 0a5e45809e9ab2bd28259a3a17de88e61a5747013c4f4048131069efbb1ef87b
                    • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                    • Instruction Fuzzy Hash: 2901A27EB106048FDF21CF24CC05BAA33E9EB86216F5545A5DD0AD72C5E774B9818B90
                    APIs
                    • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00417759
                    • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 00417776
                    • BuildCommDCBW.KERNEL32(00000000,?), ref: 00417781
                    • LoadLibraryA.KERNEL32(00000000), ref: 00417788
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: Object$BuildCommCreateLibraryLoadOpen
                    • String ID:
                    • API String ID: 2043902199-0
                    • Opcode ID: 7df94fd6bf9f208e1cc973fbf73958218a3292a0f949f69b578a69ac1710d983
                    • Instruction ID: 2dd2d935300218f949cd4a80b8b19ea8151a20586d8ba572a601e9e808751894
                    • Opcode Fuzzy Hash: 7df94fd6bf9f208e1cc973fbf73958218a3292a0f949f69b578a69ac1710d983
                    • Instruction Fuzzy Hash: ABE0393184252CEF87106B61EC888DF7FACFF0A359B418024F50191145DB785949CFE9
                    APIs
                    • GetModuleHandleW.KERNEL32(02705280), ref: 004176C8
                    • GetProcAddress.KERNEL32(00000000,0041D350), ref: 00417705
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID:
                    • API String ID: 1646373207-3916222277
                    • Opcode ID: c054b58ef60272508c52d8ce0959ba2e779dab446c0d3af84fe4e19f33e188f5
                    • Instruction ID: 188306fdaf063e76ab0ecfc48abf1b8285a39ed65ec2a3a45992faf074ba6428
                    • Opcode Fuzzy Hash: c054b58ef60272508c52d8ce0959ba2e779dab446c0d3af84fe4e19f33e188f5
                    • Instruction Fuzzy Hash: C03181B5D883C4DCF30187A4B8497B23B61AF15B04F48882AD954CB2E5D7FA1558C76F
                    APIs
                    • GetComputerNameA.KERNEL32(?,?), ref: 004177E1
                    • SleepEx.KERNEL32(00000000,00000000), ref: 004177EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2272005474.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_40b000_EiPVv5yELP.jbxd
                    Similarity
                    • API ID: ComputerNameSleep
                    • String ID: -
                    • API String ID: 3354815184-2547889144
                    • Opcode ID: 347c83839daa0cc67e8e5ca0e434d6f2c6d0aa0798e0c70473897e97347d3a12
                    • Instruction ID: 34470d39200a0421186c80d74f0428dceed76811111abc87235c1a620d2995ab
                    • Opcode Fuzzy Hash: 347c83839daa0cc67e8e5ca0e434d6f2c6d0aa0798e0c70473897e97347d3a12
                    • Instruction Fuzzy Hash: 5B012B70804218C6C7209F24D9C17DEBBB8DB08314F51416DD761B60C1CE345AC9CFAD

                    Execution Graph

                    Execution Coverage:8.7%
                    Dynamic/Decrypted Code Coverage:20.1%
                    Signature Coverage:0%
                    Total number of Nodes:139
                    Total number of Limit Nodes:6
                    execution_graph 3793 402e63 3796 402e67 3793->3796 3794 401918 8 API calls 3795 402f44 3794->3795 3796->3794 3796->3795 3835 401543 3846 401546 3835->3846 3836 4015e6 NtDuplicateObject 3837 401603 NtCreateSection 3836->3837 3845 401702 3836->3845 3838 401683 NtCreateSection 3837->3838 3839 401629 NtMapViewOfSection 3837->3839 3840 4016af 3838->3840 3838->3845 3839->3838 3841 40164c NtMapViewOfSection 3839->3841 3842 4016b9 NtMapViewOfSection 3840->3842 3840->3845 3841->3838 3843 40166a 3841->3843 3844 4016e0 NtMapViewOfSection 3842->3844 3842->3845 3843->3838 3844->3845 3846->3836 3846->3845 3895 401924 3896 401929 3895->3896 3897 40195e Sleep 3896->3897 3898 401979 3897->3898 3899 401538 7 API calls 3898->3899 3900 40198a 3898->3900 3899->3900 3696 29a003c 3697 29a0049 3696->3697 3709 29a0e0f SetErrorMode SetErrorMode 3697->3709 3702 29a0265 3703 29a02ce VirtualProtect 3702->3703 3705 29a030b 3703->3705 3704 29a0439 VirtualFree 3708 29a04be LoadLibraryA 3704->3708 3705->3704 3707 29a08c7 3708->3707 3710 29a0223 3709->3710 3711 29a0d90 3710->3711 3712 29a0dad 3711->3712 3713 29a0dbb GetPEB 3712->3713 3714 29a0238 VirtualAlloc 3712->3714 3713->3714 3714->3702 3737 402fe9 3738 403140 3737->3738 3739 403013 3737->3739 3739->3738 3740 4030ce RtlCreateUserThread NtTerminateProcess 3739->3740 3740->3738 3901 29a092b GetPEB 3902 29a0972 3901->3902 3681 2a2f976 3682 2a2f985 3681->3682 3685 2a30116 3682->3685 3686 2a30131 3685->3686 3687 2a3013a CreateToolhelp32Snapshot 3686->3687 3688 2a30156 Module32First 3686->3688 3687->3686 3687->3688 3689 2a30165 3688->3689 3691 2a2f98e 3688->3691 3692 2a2fdd5 3689->3692 3693 2a2fe00 3692->3693 3694 2a2fe11 VirtualAlloc 3693->3694 3695 2a2fe49 3693->3695 3694->3695 3695->3695 3813 401496 3814 401447 3813->3814 3814->3813 3815 4015e6 NtDuplicateObject 3814->3815 3821 40152f 3814->3821 3816 401603 NtCreateSection 3815->3816 3815->3821 3817 401683 NtCreateSection 3816->3817 3818 401629 NtMapViewOfSection 3816->3818 3819 4016af 3817->3819 3817->3821 3818->3817 3820 40164c NtMapViewOfSection 3818->3820 3819->3821 3822 4016b9 NtMapViewOfSection 3819->3822 3820->3817 3823 40166a 3820->3823 3822->3821 3824 4016e0 NtMapViewOfSection 3822->3824 3823->3817 3824->3821 3715 402eb7 3717 402eb8 3715->3717 3716 402f44 3717->3716 3719 401918 3717->3719 3720 401929 3719->3720 3721 40195e Sleep 3720->3721 3722 401979 3721->3722 3724 40198a 3722->3724 3725 401538 3722->3725 3724->3716 3726 401539 3725->3726 3727 4015e6 NtDuplicateObject 3726->3727 3733 401702 3726->3733 3728 401603 NtCreateSection 3727->3728 3727->3733 3729 401683 NtCreateSection 3728->3729 3730 401629 NtMapViewOfSection 3728->3730 3731 4016af 3729->3731 3729->3733 3730->3729 3732 40164c NtMapViewOfSection 3730->3732 3731->3733 3734 4016b9 NtMapViewOfSection 3731->3734 3732->3729 3735 40166a 3732->3735 3733->3724 3734->3733 3736 4016e0 NtMapViewOfSection 3734->3736 3735->3729 3736->3733 3741 417b5a 3746 41785c 3741->3746 3743 417b62 3744 41785c 34 API calls 3743->3744 3770 4175bf GlobalAlloc 3743->3770 3744->3743 3747 417869 3746->3747 3748 4178e8 lstrcatW InterlockedExchangeAdd WriteConsoleW 3747->3748 3758 4179e5 3747->3758 3751 417923 7 API calls 3748->3751 3749 4179f3 GlobalAlloc AddAtomA 3750 417a02 GetCommProperties GetTickCount GetLastError 3749->3750 3754 417a28 ZombifyActCtx 3750->3754 3755 417a2f GetConsoleAliasesW 3750->3755 3752 4179b4 3751->3752 3753 4179ab GetBoundsRect 3751->3753 3756 4179d7 3752->3756 3757 4179bd GetModuleHandleExW 3752->3757 3753->3752 3754->3755 3755->3758 3756->3758 3757->3756 3758->3749 3758->3750 3759 417a4f FoldStringA 3758->3759 3760 417a63 3758->3760 3759->3758 3771 4175bf GlobalAlloc 3760->3771 3762 417aab LoadLibraryA 3772 4175fc 3762->3772 3767 417b09 3777 417819 3767->3777 3769 417b0e 3769->3743 3770->3743 3771->3762 3773 41763b 3772->3773 3774 417647 GetModuleHandleW GetProcAddress 3773->3774 3775 41771d 3773->3775 3774->3773 3776 4175de VirtualProtect 3775->3776 3776->3767 3784 417742 3777->3784 3780 417854 3789 417799 3780->3789 3781 41783c GetConsoleAliasExesLengthW UnhandledExceptionFilter FindFirstVolumeA 3781->3780 3783 417859 3783->3769 3785 417757 CreateJobObjectW 3784->3785 3786 41775f 3784->3786 3785->3786 3787 417773 OpenJobObjectA BuildCommDCBW LoadLibraryA 3786->3787 3788 41778e 3786->3788 3787->3788 3788->3780 3788->3781 3790 4177b3 3789->3790 3791 4177f6 3789->3791 3790->3791 3792 4177d3 GetComputerNameA SleepEx 3790->3792 3791->3783 3792->3790 3797 4014de 3798 401447 3797->3798 3799 40152f 3798->3799 3800 4015e6 NtDuplicateObject 3798->3800 3800->3799 3801 401603 NtCreateSection 3800->3801 3802 401683 NtCreateSection 3801->3802 3803 401629 NtMapViewOfSection 3801->3803 3802->3799 3804 4016af 3802->3804 3803->3802 3805 40164c NtMapViewOfSection 3803->3805 3804->3799 3806 4016b9 NtMapViewOfSection 3804->3806 3805->3802 3807 40166a 3805->3807 3806->3799 3808 4016e0 NtMapViewOfSection 3806->3808 3807->3802 3808->3799

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 146 401496-4014a5 147 4014a7 146->147 148 40151b-40152d 146->148 150 4014a9-4014b5 147->150 151 4014cf 147->151 156 4014ba 148->156 157 40152f-401535 148->157 154 401471-401472 150->154 155 4014b7-4014b8 150->155 153 4014d6 151->153 153->153 158 4014d8 153->158 159 401473-401484 154->159 155->156 160 401449 155->160 164 401447-401456 156->164 165 4014bc-4014c3 156->165 158->148 162 40147b-40148e call 4011b7 159->162 160->162 163 40144b 160->163 162->146 168 40144c-401470 163->168 164->168 169 4014c5-4014c8 165->169 170 401539-401567 165->170 168->159 169->151 180 401558-401563 170->180 181 40156a-401590 call 4011b7 170->181 180->181 188 401592 181->188 189 401595-40159a 181->189 188->189 191 4015a0-4015b1 189->191 192 4018b8-4018c0 189->192 196 4018b6-4018c5 191->196 197 4015b7-4015e0 191->197 192->189 200 4018da 196->200 201 4018cb-4018d6 196->201 197->196 205 4015e6-4015fd NtDuplicateObject 197->205 200->201 202 4018dd-401915 call 4011b7 200->202 201->202 205->196 207 401603-401627 NtCreateSection 205->207 209 401683-4016a9 NtCreateSection 207->209 210 401629-40164a NtMapViewOfSection 207->210 209->196 212 4016af-4016b3 209->212 210->209 214 40164c-401668 NtMapViewOfSection 210->214 212->196 216 4016b9-4016da NtMapViewOfSection 212->216 214->209 217 40166a-401680 214->217 216->196 219 4016e0-4016fc NtMapViewOfSection 216->219 217->209 219->196 221 401702 call 401707 219->221
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                    • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                    • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 224 401538-401567 230 401558-401563 224->230 231 40156a-401590 call 4011b7 224->231 230->231 238 401592 231->238 239 401595-40159a 231->239 238->239 241 4015a0-4015b1 239->241 242 4018b8-4018c0 239->242 246 4018b6-4018c5 241->246 247 4015b7-4015e0 241->247 242->239 250 4018da 246->250 251 4018cb-4018d6 246->251 247->246 255 4015e6-4015fd NtDuplicateObject 247->255 250->251 252 4018dd-401915 call 4011b7 250->252 251->252 255->246 257 401603-401627 NtCreateSection 255->257 259 401683-4016a9 NtCreateSection 257->259 260 401629-40164a NtMapViewOfSection 257->260 259->246 262 4016af-4016b3 259->262 260->259 264 40164c-401668 NtMapViewOfSection 260->264 262->246 266 4016b9-4016da NtMapViewOfSection 262->266 264->259 267 40166a-401680 264->267 266->246 269 4016e0-4016fc NtMapViewOfSection 266->269 267->259 269->246 271 401702 call 401707 269->271
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                    • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                    • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 274 4014de-4014ed 275 401563 274->275 276 4014ef 274->276 277 40156a-401590 call 4011b7 275->277 278 401551-401552 276->278 279 4014f1-401502 276->279 298 401592 277->298 299 401595-40159a 277->299 278->275 281 401504-401516 279->281 282 40151d-40152d 279->282 285 40151b-40151c 281->285 286 4014ba 282->286 287 40152f-401535 282->287 285->282 290 401447-401456 286->290 291 4014bc-4014c3 286->291 300 40144c-401470 290->300 294 4014c5-4014c8 291->294 295 401539-401567 291->295 296 4014cf 294->296 295->277 313 401558-401560 295->313 301 4014d6 296->301 298->299 310 4015a0-4015b1 299->310 311 4018b8-4018c0 299->311 312 401473-401484 300->312 301->301 304 4014d8 301->304 304->285 319 4018b6-4018c5 310->319 320 4015b7-4015e0 310->320 311->299 318 40147b-4014a5 call 4011b7 312->318 313->275 318->285 331 4014a7 318->331 326 4018da 319->326 327 4018cb-4018d6 319->327 320->319 333 4015e6-4015fd NtDuplicateObject 320->333 326->327 328 4018dd-401915 call 4011b7 326->328 327->328 331->296 334 4014a9-4014b5 331->334 333->319 336 401603-401627 NtCreateSection 333->336 337 401471-401472 334->337 338 4014b7-4014b8 334->338 340 401683-4016a9 NtCreateSection 336->340 341 401629-40164a NtMapViewOfSection 336->341 337->312 338->286 342 401449 338->342 340->319 344 4016af-4016b3 340->344 341->340 346 40164c-401668 NtMapViewOfSection 341->346 342->318 347 40144b 342->347 344->319 349 4016b9-4016da NtMapViewOfSection 344->349 346->340 350 40166a-401680 346->350 347->300 349->319 352 4016e0-4016fc NtMapViewOfSection 349->352 350->340 352->319 354 401702 call 401707 352->354
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectView
                    • String ID:
                    • API String ID: 1652636561-0
                    • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                    • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                    • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 357 401543-401544 358 401546-401567 357->358 359 4015af-4015b1 357->359 366 401558-401563 358->366 367 40156a-401590 call 4011b7 358->367 360 4018b6-4018c5 359->360 361 4015b7-4015e0 359->361 368 4018da 360->368 369 4018cb-4018d6 360->369 361->360 377 4015e6-4015fd NtDuplicateObject 361->377 366->367 388 401592 367->388 389 401595-40159a 367->389 368->369 370 4018dd-401915 call 4011b7 368->370 369->370 377->360 380 401603-401627 NtCreateSection 377->380 383 401683-4016a9 NtCreateSection 380->383 384 401629-40164a NtMapViewOfSection 380->384 383->360 386 4016af-4016b3 383->386 384->383 390 40164c-401668 NtMapViewOfSection 384->390 386->360 392 4016b9-4016da NtMapViewOfSection 386->392 388->389 400 4015a0-4015ad 389->400 401 4018b8-4018c0 389->401 390->383 393 40166a-401680 390->393 392->360 395 4016e0-4016fc NtMapViewOfSection 392->395 393->383 395->360 398 401702 call 401707 395->398 400->359 401->389
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                    • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                    • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 405 401565-401590 call 4011b7 410 401592 405->410 411 401595-40159a 405->411 410->411 413 4015a0-4015b1 411->413 414 4018b8-4018c0 411->414 418 4018b6-4018c5 413->418 419 4015b7-4015e0 413->419 414->411 422 4018da 418->422 423 4018cb-4018d6 418->423 419->418 427 4015e6-4015fd NtDuplicateObject 419->427 422->423 424 4018dd-401915 call 4011b7 422->424 423->424 427->418 429 401603-401627 NtCreateSection 427->429 431 401683-4016a9 NtCreateSection 429->431 432 401629-40164a NtMapViewOfSection 429->432 431->418 434 4016af-4016b3 431->434 432->431 436 40164c-401668 NtMapViewOfSection 432->436 434->418 438 4016b9-4016da NtMapViewOfSection 434->438 436->431 439 40166a-401680 436->439 438->418 441 4016e0-4016fc NtMapViewOfSection 438->441 439->431 441->418 443 401702 call 401707 441->443
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                    • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                    • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 401579-401590 call 4011b7 452 401592 446->452 453 401595-40159a 446->453 452->453 455 4015a0-4015b1 453->455 456 4018b8-4018c0 453->456 460 4018b6-4018c5 455->460 461 4015b7-4015e0 455->461 456->453 464 4018da 460->464 465 4018cb-4018d6 460->465 461->460 469 4015e6-4015fd NtDuplicateObject 461->469 464->465 466 4018dd-401915 call 4011b7 464->466 465->466 469->460 471 401603-401627 NtCreateSection 469->471 473 401683-4016a9 NtCreateSection 471->473 474 401629-40164a NtMapViewOfSection 471->474 473->460 476 4016af-4016b3 473->476 474->473 478 40164c-401668 NtMapViewOfSection 474->478 476->460 480 4016b9-4016da NtMapViewOfSection 476->480 478->473 481 40166a-401680 478->481 480->460 483 4016e0-4016fc NtMapViewOfSection 480->483 481->473 483->460 485 401702 call 401707 483->485
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                    • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                    • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 488 40157c-401590 call 4011b7 492 401592 488->492 493 401595-40159a 488->493 492->493 495 4015a0-4015b1 493->495 496 4018b8-4018c0 493->496 500 4018b6-4018c5 495->500 501 4015b7-4015e0 495->501 496->493 504 4018da 500->504 505 4018cb-4018d6 500->505 501->500 509 4015e6-4015fd NtDuplicateObject 501->509 504->505 506 4018dd-401915 call 4011b7 504->506 505->506 509->500 511 401603-401627 NtCreateSection 509->511 513 401683-4016a9 NtCreateSection 511->513 514 401629-40164a NtMapViewOfSection 511->514 513->500 516 4016af-4016b3 513->516 514->513 518 40164c-401668 NtMapViewOfSection 514->518 516->500 520 4016b9-4016da NtMapViewOfSection 516->520 518->513 521 40166a-401680 518->521 520->500 523 4016e0-4016fc NtMapViewOfSection 520->523 521->513 523->500 525 401702 call 401707 523->525
                    APIs
                    • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                    • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                    • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                    • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$View$Create$DuplicateObject
                    • String ID:
                    • API String ID: 1546783058-0
                    • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                    • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                    • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 528 402fe9-40300d 529 403140-403145 528->529 530 403013-40302b 528->530 530->529 531 403031-403042 530->531 532 403044-40304d 531->532 533 403052-403060 532->533 533->533 534 403062-403069 533->534 535 40308b-403092 534->535 536 40306b-40308a 534->536 537 4030b4-4030b7 535->537 538 403094-4030b3 535->538 536->535 539 4030c0 537->539 540 4030b9-4030bc 537->540 538->537 539->532 542 4030c2-4030c7 539->542 540->539 541 4030be 540->541 541->542 542->529 543 4030c9-4030cc 542->543 543->529 544 4030ce-40313d RtlCreateUserThread NtTerminateProcess 543->544 544->529
                    APIs
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: CreateProcessTerminateThreadUser
                    • String ID:
                    • API String ID: 1921587553-0
                    • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                    • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                    • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                    Control-flow Graph

                    APIs
                    • lstrcatW.KERNEL32(?,00000000), ref: 004178F0
                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 004178FE
                    • WriteConsoleW.KERNEL32(00000000,?,00000000,?,00000000), ref: 00417915
                    • lstrcpynW.KERNEL32(?,00000000,00000000), ref: 0041792C
                    • GetAtomNameA.KERNEL32(00000000,00000000,00000000), ref: 00417935
                    • SetFileApisToANSI.KERNEL32 ref: 0041793B
                    • ReadConsoleOutputA.KERNEL32(00000000,?,?,?,?), ref: 0041797C
                    • SetVolumeMountPointW.KERNEL32(00000000,00000000), ref: 00417984
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000000), ref: 00417993
                    • EnumDateFormatsW.KERNEL32(00000000,00000000,00000000), ref: 0041799C
                    • GetBoundsRect.GDI32(00000000,00000000,00000000), ref: 004179AE
                    • GetModuleHandleExW.KERNEL32(00000000,0041931C,?), ref: 004179CA
                    • GlobalAlloc.KERNEL32(00000000,00000000), ref: 004179F5
                    • AddAtomA.KERNEL32(00000000), ref: 004179FC
                    • GetCommProperties.KERNELBASE(00000000,?), ref: 00417A0A
                    • GetTickCount.KERNEL32 ref: 00417A10
                    • GetLastError.KERNEL32 ref: 00417A16
                    • ZombifyActCtx.KERNEL32(00000000), ref: 00417A29
                    • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 00417A38
                    • FoldStringA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00417A54
                    • LoadLibraryA.KERNELBASE(004193A0), ref: 00417AFD
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: Console$AtomFileModuleName$AliasesAllocApisBoundsCommCountDateEnumErrorExchangeFoldFormatsGlobalHandleInterlockedLastLibraryLoadMountOutputPointPropertiesReadRectStringTickVolumeWriteZombifylstrcatlstrcpyn
                    • String ID: k`$tl_$}$
                    • API String ID: 3342591227-211918992
                    • Opcode ID: f57c8d55a3b0fce3545dfe034b3181d3b0cfbbc214520a92931e9c23be15421d
                    • Instruction ID: ee85e0ce5380fe6a93d76390f7868a1e87d883590811e132613b796483cd1889
                    • Opcode Fuzzy Hash: f57c8d55a3b0fce3545dfe034b3181d3b0cfbbc214520a92931e9c23be15421d
                    • Instruction Fuzzy Hash: 90718D71945528AFD721AB61EC88CDF7B79FF09354B10846AF505E2160CF388A89CFAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 61 29a003c-29a0047 62 29a0049 61->62 63 29a004c-29a0263 call 29a0a3f call 29a0e0f call 29a0d90 VirtualAlloc 61->63 62->63 78 29a028b-29a0292 63->78 79 29a0265-29a0289 call 29a0a69 63->79 81 29a02a1-29a02b0 78->81 83 29a02ce-29a03c2 VirtualProtect call 29a0cce call 29a0ce7 79->83 81->83 84 29a02b2-29a02cc 81->84 90 29a03d1-29a03e0 83->90 84->81 91 29a0439-29a04b8 VirtualFree 90->91 92 29a03e2-29a0437 call 29a0ce7 90->92 94 29a04be-29a04cd 91->94 95 29a05f4-29a05fe 91->95 92->90 97 29a04d3-29a04dd 94->97 98 29a077f-29a0789 95->98 99 29a0604-29a060d 95->99 97->95 101 29a04e3-29a0505 97->101 102 29a078b-29a07a3 98->102 103 29a07a6-29a07b0 98->103 99->98 104 29a0613-29a0637 99->104 112 29a0517-29a0520 101->112 113 29a0507-29a0515 101->113 102->103 105 29a086e-29a08be LoadLibraryA 103->105 106 29a07b6-29a07cb 103->106 107 29a063e-29a0648 104->107 111 29a08c7-29a08f9 105->111 109 29a07d2-29a07d5 106->109 107->98 110 29a064e-29a065a 107->110 114 29a07d7-29a07e0 109->114 115 29a0824-29a0833 109->115 110->98 116 29a0660-29a066a 110->116 119 29a08fb-29a0901 111->119 120 29a0902-29a091d 111->120 121 29a0526-29a0547 112->121 113->121 122 29a07e2 114->122 123 29a07e4-29a0822 114->123 118 29a0839-29a083c 115->118 117 29a067a-29a0689 116->117 124 29a068f-29a06b2 117->124 125 29a0750-29a077a 117->125 118->105 126 29a083e-29a0847 118->126 119->120 127 29a054d-29a0550 121->127 122->115 123->109 128 29a06ef-29a06fc 124->128 129 29a06b4-29a06ed 124->129 125->107 130 29a084b-29a086c 126->130 131 29a0849 126->131 133 29a05e0-29a05ef 127->133 134 29a0556-29a056b 127->134 137 29a074b 128->137 138 29a06fe-29a0748 128->138 129->128 130->118 131->105 133->97 135 29a056f-29a057a 134->135 136 29a056d 134->136 139 29a059b-29a05bb 135->139 140 29a057c-29a0599 135->140 136->133 137->117 138->137 145 29a05bd-29a05db 139->145 140->145 145->127
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 029A024D
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2576427770.00000000029A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_29a0000_whhsvcw.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction ID: 15dd72cf82fc5166a085e7503a59c84fac88b07ac89aea4646bc2deaa0509cbd
                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                    • Instruction Fuzzy Hash: 26527974A01229DFDB64CF68C994BACBBB1BF09304F1480D9E94DAB351DB30AA95CF54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 545 2a30116-2a3012f 546 2a30131-2a30133 545->546 547 2a30135 546->547 548 2a3013a-2a30146 CreateToolhelp32Snapshot 546->548 547->548 549 2a30156-2a30163 Module32First 548->549 550 2a30148-2a3014e 548->550 551 2a30165-2a30166 call 2a2fdd5 549->551 552 2a3016c-2a30174 549->552 550->549 556 2a30150-2a30154 550->556 557 2a3016b 551->557 556->546 556->549 557->552
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02A3013E
                    • Module32First.KERNEL32(00000000,00000224), ref: 02A3015E
                    Memory Dump Source
                    • Source File: 00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02A2D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2a2d000_whhsvcw.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFirstModule32SnapshotToolhelp32
                    • String ID:
                    • API String ID: 3833638111-0
                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction ID: 6dfeee63c075c1cadfbabd295d1a52a0b84c793b82d0037ea204360620840084
                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                    • Instruction Fuzzy Hash: 0CF06D322007156FD7213BB9A88CB6FB6F8AF49629F100568F642D65C0DFB0E8498A61

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 558 29a0e0f-29a0e24 SetErrorMode * 2 559 29a0e2b-29a0e2c 558->559 560 29a0e26 558->560 560->559
                    APIs
                    • SetErrorMode.KERNELBASE(00000400,?,?,029A0223,?,?), ref: 029A0E19
                    • SetErrorMode.KERNELBASE(00000000,?,?,029A0223,?,?), ref: 029A0E1E
                    Memory Dump Source
                    • Source File: 00000006.00000002.2576427770.00000000029A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_29a0000_whhsvcw.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 91407c7c25d1176a7ac32c2b20d2d680231b239d56b718290677dbbec1f824e6
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 85D01232245228B7DB402A94DC09BCEBB1CDF09BA6F108021FB0DE9080CBB09A4046EA

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 561 4175de-4175fb VirtualProtect
                    APIs
                    • VirtualProtect.KERNELBASE(00000040,?), ref: 004175F4
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                    • Instruction ID: 4c62818881ac23e86d27b7ad5f6e3bb285c85b39ac0806b91a2128f0277fdf34
                    • Opcode Fuzzy Hash: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                    • Instruction Fuzzy Hash: 8CC08CB194020DFFDB018B91FC41E8D7BACF300248F808020B716A1060CAB1AD289F68
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                    • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                    • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                    • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                    • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02A2FE26
                    Memory Dump Source
                    • Source File: 00000006.00000002.2576624780.0000000002A2D000.00000040.00000020.00020000.00000000.sdmp, Offset: 02A2D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_2a2d000_whhsvcw.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction ID: 36a0788709a59bc14cce87575d297d72fdf59d00337a0e700ddc5148699618bd
                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                    • Instruction Fuzzy Hash: 4F113C79A40208EFDB01DF98CA85E99BBF5AF08750F058094F9489B362D771EA50DF80
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                    • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                    • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                    • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                    • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                    APIs
                    • Sleep.KERNELBASE(00001388), ref: 00401966
                      • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                      • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                      • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574935447.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_400000_whhsvcw.jbxd
                    Similarity
                    • API ID: Section$CreateDuplicateObjectSleepView
                    • String ID:
                    • API String ID: 1885482327-0
                    • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                    • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                    • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                    APIs
                    • GlobalAlloc.KERNELBASE(00000000,00417AAB), ref: 004175C7
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: AllocGlobal
                    • String ID:
                    • API String ID: 3761449716-0
                    • Opcode ID: 6adb750e7ea17ba4dfc271b57f0e32d75a63e91da777faa17e994a4e47bbaa96
                    • Instruction ID: d55db0c2126c828c826ef05274ed4aaa6eabc9571a3453db39e0ff1d3a989bdf
                    • Opcode Fuzzy Hash: 6adb750e7ea17ba4dfc271b57f0e32d75a63e91da777faa17e994a4e47bbaa96
                    • Instruction Fuzzy Hash: B6B01270C80204DFDB000FB0EC44B0C7FA1B30C302F40C415F50441158CFB004289F20
                    APIs
                    • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00417759
                    • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 00417776
                    • BuildCommDCBW.KERNEL32(00000000,?), ref: 00417781
                    • LoadLibraryA.KERNEL32(00000000), ref: 00417788
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: Object$BuildCommCreateLibraryLoadOpen
                    • String ID:
                    • API String ID: 2043902199-0
                    • Opcode ID: 7df94fd6bf9f208e1cc973fbf73958218a3292a0f949f69b578a69ac1710d983
                    • Instruction ID: 2dd2d935300218f949cd4a80b8b19ea8151a20586d8ba572a601e9e808751894
                    • Opcode Fuzzy Hash: 7df94fd6bf9f208e1cc973fbf73958218a3292a0f949f69b578a69ac1710d983
                    • Instruction Fuzzy Hash: ABE0393184252CEF87106B61EC888DF7FACFF0A359B418024F50191145DB785949CFE9
                    APIs
                    • GetModuleHandleW.KERNEL32(02705280), ref: 004176C8
                    • GetProcAddress.KERNEL32(00000000,0041D350), ref: 00417705
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID:
                    • API String ID: 1646373207-3916222277
                    • Opcode ID: c054b58ef60272508c52d8ce0959ba2e779dab446c0d3af84fe4e19f33e188f5
                    • Instruction ID: 188306fdaf063e76ab0ecfc48abf1b8285a39ed65ec2a3a45992faf074ba6428
                    • Opcode Fuzzy Hash: c054b58ef60272508c52d8ce0959ba2e779dab446c0d3af84fe4e19f33e188f5
                    • Instruction Fuzzy Hash: C03181B5D883C4DCF30187A4B8497B23B61AF15B04F48882AD954CB2E5D7FA1558C76F
                    APIs
                    • GetComputerNameA.KERNEL32(?,?), ref: 004177E1
                    • SleepEx.KERNEL32(00000000,00000000), ref: 004177EB
                    Strings
                    Memory Dump Source
                    • Source File: 00000006.00000002.2574954505.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_6_2_40b000_whhsvcw.jbxd
                    Similarity
                    • API ID: ComputerNameSleep
                    • String ID: -
                    • API String ID: 3354815184-2547889144
                    • Opcode ID: 347c83839daa0cc67e8e5ca0e434d6f2c6d0aa0798e0c70473897e97347d3a12
                    • Instruction ID: 34470d39200a0421186c80d74f0428dceed76811111abc87235c1a620d2995ab
                    • Opcode Fuzzy Hash: 347c83839daa0cc67e8e5ca0e434d6f2c6d0aa0798e0c70473897e97347d3a12
                    • Instruction Fuzzy Hash: 5B012B70804218C6C7209F24D9C17DEBBB8DB08314F51416DD761B60C1CE345AC9CFAD

                    Execution Graph

                    Execution Coverage:18.5%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:19.6%
                    Total number of Nodes:1454
                    Total number of Limit Nodes:33
                    execution_graph 4044 401ec5 4045 402c17 17 API calls 4044->4045 4046 401ecb 4045->4046 4047 402c17 17 API calls 4046->4047 4048 401ed7 4047->4048 4049 401ee3 ShowWindow 4048->4049 4050 401eee EnableWindow 4048->4050 4051 402ac5 4049->4051 4050->4051 3366 401746 3367 402c39 17 API calls 3366->3367 3368 40174d 3367->3368 3372 405f4a 3368->3372 3370 401754 3371 405f4a 2 API calls 3370->3371 3371->3370 3373 405f55 GetTickCount GetTempFileNameA 3372->3373 3374 405f82 3373->3374 3375 405f86 3373->3375 3374->3373 3374->3375 3375->3370 4052 401947 4053 402c39 17 API calls 4052->4053 4054 40194e lstrlenA 4053->4054 4055 402628 4054->4055 4059 401fcb 4060 402c39 17 API calls 4059->4060 4061 401fd2 4060->4061 4062 4066ff 2 API calls 4061->4062 4063 401fd8 4062->4063 4065 401fea 4063->4065 4066 4062e6 wsprintfA 4063->4066 4066->4065 3412 4034cc SetErrorMode GetVersionExA 3413 40351e GetVersionExA 3412->3413 3415 40355d 3412->3415 3414 40353a 3413->3414 3413->3415 3414->3415 3416 4035e1 3415->3416 3417 406794 5 API calls 3415->3417 3504 406726 GetSystemDirectoryA 3416->3504 3417->3416 3419 4035f7 lstrlenA 3419->3416 3420 403607 3419->3420 3507 406794 GetModuleHandleA 3420->3507 3423 406794 5 API calls 3424 403615 3423->3424 3425 406794 5 API calls 3424->3425 3426 403621 #17 OleInitialize SHGetFileInfoA 3425->3426 3513 406388 lstrcpynA 3426->3513 3429 40366f GetCommandLineA 3514 406388 lstrcpynA 3429->3514 3431 403681 3432 405d45 CharNextA 3431->3432 3433 4036a8 CharNextA 3432->3433 3439 4036b7 3433->3439 3434 40377d 3435 403791 GetTempPathA 3434->3435 3515 40349b 3435->3515 3437 4037a9 3440 403803 DeleteFileA 3437->3440 3441 4037ad GetWindowsDirectoryA lstrcatA 3437->3441 3438 405d45 CharNextA 3438->3439 3439->3434 3439->3438 3445 40377f 3439->3445 3525 402f5c GetTickCount GetModuleFileNameA 3440->3525 3442 40349b 12 API calls 3441->3442 3444 4037c9 3442->3444 3444->3440 3447 4037cd GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3444->3447 3612 406388 lstrcpynA 3445->3612 3446 403816 3448 4038ae ExitProcess OleUninitialize 3446->3448 3451 40389b 3446->3451 3458 405d45 CharNextA 3446->3458 3450 40349b 12 API calls 3447->3450 3452 4038c5 3448->3452 3453 4039e8 3448->3453 3456 4037fb 3450->3456 3555 403b6e 3451->3555 3459 405a9e MessageBoxIndirectA 3452->3459 3454 4039f0 GetCurrentProcess OpenProcessToken 3453->3454 3455 403a66 ExitProcess 3453->3455 3460 403a36 3454->3460 3461 403a07 LookupPrivilegeValueA AdjustTokenPrivileges 3454->3461 3456->3440 3456->3448 3463 403830 3458->3463 3465 4038d2 ExitProcess 3459->3465 3466 406794 5 API calls 3460->3466 3461->3460 3467 403875 3463->3467 3468 4038da 3463->3468 3469 403a3d 3466->3469 3613 405e08 3467->3613 3629 405a09 3468->3629 3472 403a52 ExitWindowsEx 3469->3472 3475 403a5f 3469->3475 3472->3455 3472->3475 3649 40140b 3475->3649 3476 4038f0 lstrcatA 3477 4038fb lstrcatA lstrcmpiA 3476->3477 3477->3448 3479 403917 3477->3479 3481 403923 3479->3481 3482 40391c 3479->3482 3637 4059ec CreateDirectoryA 3481->3637 3632 40596f CreateDirectoryA 3482->3632 3483 403890 3628 406388 lstrcpynA 3483->3628 3488 403928 SetCurrentDirectoryA 3489 403943 3488->3489 3490 403938 3488->3490 3641 406388 lstrcpynA 3489->3641 3640 406388 lstrcpynA 3490->3640 3493 40641b 17 API calls 3494 403985 DeleteFileA 3493->3494 3495 403993 CopyFileA 3494->3495 3501 403950 3494->3501 3495->3501 3496 4039dc 3498 406161 36 API calls 3496->3498 3499 4039e3 3498->3499 3499->3448 3500 40641b 17 API calls 3500->3501 3501->3493 3501->3496 3501->3500 3503 4039c7 CloseHandle 3501->3503 3642 406161 MoveFileExA 3501->3642 3646 405a21 CreateProcessA 3501->3646 3503->3501 3505 406748 wsprintfA LoadLibraryExA 3504->3505 3505->3419 3508 4067b0 3507->3508 3509 4067ba GetProcAddress 3507->3509 3510 406726 3 API calls 3508->3510 3511 40360e 3509->3511 3512 4067b6 3510->3512 3511->3423 3512->3509 3512->3511 3513->3429 3514->3431 3516 406666 5 API calls 3515->3516 3518 4034a7 3516->3518 3517 4034b1 3517->3437 3518->3517 3652 405d1a lstrlenA CharPrevA 3518->3652 3521 4059ec 2 API calls 3522 4034bf 3521->3522 3523 405f4a 2 API calls 3522->3523 3524 4034ca 3523->3524 3524->3437 3655 405f1b GetFileAttributesA CreateFileA 3525->3655 3527 402f9f 3554 402fac 3527->3554 3656 406388 lstrcpynA 3527->3656 3529 402fc2 3657 405d61 lstrlenA 3529->3657 3533 402fd3 GetFileSize 3534 4030cd 3533->3534 3553 402fea 3533->3553 3662 402ebd 3534->3662 3538 403112 GlobalAlloc 3540 403129 3538->3540 3539 40316a 3543 402ebd 32 API calls 3539->3543 3545 405f4a 2 API calls 3540->3545 3542 4030f3 3544 40346e ReadFile 3542->3544 3543->3554 3546 4030fe 3544->3546 3548 40313a CreateFileA 3545->3548 3546->3538 3546->3554 3547 402ebd 32 API calls 3547->3553 3549 403174 3548->3549 3548->3554 3677 403484 SetFilePointer 3549->3677 3551 403182 3678 4031fd 3551->3678 3553->3534 3553->3539 3553->3547 3553->3554 3693 40346e 3553->3693 3554->3446 3556 406794 5 API calls 3555->3556 3557 403b82 3556->3557 3558 403b88 3557->3558 3559 403b9a 3557->3559 3737 4062e6 wsprintfA 3558->3737 3560 40626f 3 API calls 3559->3560 3561 403bc5 3560->3561 3562 403be3 lstrcatA 3561->3562 3565 40626f 3 API calls 3561->3565 3564 403b98 3562->3564 3729 403e33 3564->3729 3565->3562 3568 405e08 18 API calls 3569 403c15 3568->3569 3570 403c9e 3569->3570 3572 40626f 3 API calls 3569->3572 3571 405e08 18 API calls 3570->3571 3574 403ca4 3571->3574 3575 403c41 3572->3575 3573 403cb4 LoadImageA 3577 403d5a 3573->3577 3578 403cdb RegisterClassA 3573->3578 3574->3573 3576 40641b 17 API calls 3574->3576 3575->3570 3579 403c5d lstrlenA 3575->3579 3582 405d45 CharNextA 3575->3582 3576->3573 3581 40140b 2 API calls 3577->3581 3580 403d11 SystemParametersInfoA CreateWindowExA 3578->3580 3611 4038ab 3578->3611 3583 403c91 3579->3583 3584 403c6b lstrcmpiA 3579->3584 3580->3577 3585 403d60 3581->3585 3586 403c5b 3582->3586 3588 405d1a 3 API calls 3583->3588 3584->3583 3587 403c7b GetFileAttributesA 3584->3587 3590 403e33 18 API calls 3585->3590 3585->3611 3586->3579 3589 403c87 3587->3589 3591 403c97 3588->3591 3589->3583 3592 405d61 2 API calls 3589->3592 3593 403d71 3590->3593 3738 406388 lstrcpynA 3591->3738 3592->3583 3595 403e00 3593->3595 3596 403d7d ShowWindow 3593->3596 3739 40557b OleInitialize 3595->3739 3598 406726 3 API calls 3596->3598 3600 403d95 3598->3600 3599 403e06 3602 403e22 3599->3602 3603 403e0a 3599->3603 3601 403da3 GetClassInfoA 3600->3601 3604 406726 3 API calls 3600->3604 3606 403db7 GetClassInfoA RegisterClassA 3601->3606 3607 403dcd DialogBoxParamA 3601->3607 3605 40140b 2 API calls 3602->3605 3609 40140b 2 API calls 3603->3609 3603->3611 3604->3601 3605->3611 3606->3607 3608 40140b 2 API calls 3607->3608 3610 403df5 3608->3610 3609->3611 3610->3611 3611->3448 3612->3435 3757 406388 lstrcpynA 3613->3757 3615 405e19 3758 405db3 CharNextA CharNextA 3615->3758 3618 403881 3618->3448 3627 406388 lstrcpynA 3618->3627 3619 406666 5 API calls 3625 405e2f 3619->3625 3620 405e5a lstrlenA 3621 405e65 3620->3621 3620->3625 3622 405d1a 3 API calls 3621->3622 3624 405e6a GetFileAttributesA 3622->3624 3624->3618 3625->3618 3625->3620 3626 405d61 2 API calls 3625->3626 3764 4066ff FindFirstFileA 3625->3764 3626->3620 3627->3483 3628->3451 3630 406794 5 API calls 3629->3630 3631 4038df lstrcatA 3630->3631 3631->3476 3631->3477 3633 4059c0 GetLastError 3632->3633 3634 403921 3632->3634 3633->3634 3635 4059cf SetFileSecurityA 3633->3635 3634->3488 3635->3634 3636 4059e5 GetLastError 3635->3636 3636->3634 3638 405a00 GetLastError 3637->3638 3639 4059fc 3637->3639 3638->3639 3639->3488 3640->3489 3641->3501 3643 406182 3642->3643 3644 406175 3642->3644 3643->3501 3767 405ff1 3644->3767 3647 405a60 3646->3647 3648 405a54 CloseHandle 3646->3648 3647->3501 3648->3647 3650 401389 2 API calls 3649->3650 3651 401420 3650->3651 3651->3455 3653 405d34 lstrcatA 3652->3653 3654 4034b9 3652->3654 3653->3654 3654->3521 3655->3527 3656->3529 3658 405d6e 3657->3658 3659 405d73 CharPrevA 3658->3659 3660 402fc8 3658->3660 3659->3658 3659->3660 3661 406388 lstrcpynA 3660->3661 3661->3533 3663 402ee3 3662->3663 3664 402ecb 3662->3664 3667 402ef3 GetTickCount 3663->3667 3668 402eeb 3663->3668 3665 402ed4 DestroyWindow 3664->3665 3666 402edb 3664->3666 3665->3666 3666->3538 3666->3554 3696 403484 SetFilePointer 3666->3696 3667->3666 3670 402f01 3667->3670 3697 4067d0 3668->3697 3671 402f36 CreateDialogParamA ShowWindow 3670->3671 3672 402f09 3670->3672 3671->3666 3672->3666 3701 402ea1 3672->3701 3674 402f17 wsprintfA 3675 4054a9 24 API calls 3674->3675 3676 402f34 3675->3676 3676->3666 3677->3551 3679 403228 3678->3679 3680 40320c SetFilePointer 3678->3680 3704 403305 GetTickCount 3679->3704 3680->3679 3685 403305 42 API calls 3686 40325f 3685->3686 3687 4032c5 3686->3687 3688 4032cb ReadFile 3686->3688 3689 40326e 3686->3689 3687->3554 3688->3687 3689->3687 3691 405f93 ReadFile 3689->3691 3719 405fc2 WriteFile 3689->3719 3691->3689 3694 405f93 ReadFile 3693->3694 3695 403481 3694->3695 3695->3553 3696->3542 3698 4067ed PeekMessageA 3697->3698 3699 4067e3 DispatchMessageA 3698->3699 3700 4067fd 3698->3700 3699->3698 3700->3666 3702 402eb0 3701->3702 3703 402eb2 MulDiv 3701->3703 3702->3703 3703->3674 3705 403333 3704->3705 3706 40345d 3704->3706 3721 403484 SetFilePointer 3705->3721 3707 402ebd 32 API calls 3706->3707 3713 40322f 3707->3713 3709 40333e SetFilePointer 3714 403363 3709->3714 3710 40346e ReadFile 3710->3714 3712 402ebd 32 API calls 3712->3714 3713->3687 3717 405f93 ReadFile 3713->3717 3714->3710 3714->3712 3714->3713 3715 405fc2 WriteFile 3714->3715 3716 40343e SetFilePointer 3714->3716 3722 4068d9 3714->3722 3715->3714 3716->3706 3718 403248 3717->3718 3718->3685 3718->3687 3720 405fe0 3719->3720 3720->3689 3721->3709 3723 4068fe 3722->3723 3728 406906 3722->3728 3723->3714 3724 406996 GlobalAlloc 3724->3723 3724->3728 3725 40698d GlobalFree 3725->3724 3726 406a04 GlobalFree 3727 406a0d GlobalAlloc 3726->3727 3727->3723 3727->3728 3728->3723 3728->3724 3728->3725 3728->3726 3728->3727 3730 403e47 3729->3730 3746 4062e6 wsprintfA 3730->3746 3732 403eb8 3747 403eec 3732->3747 3734 403bf3 3734->3568 3735 403ebd 3735->3734 3736 40641b 17 API calls 3735->3736 3736->3735 3737->3564 3738->3570 3750 404451 3739->3750 3741 40559e 3745 4055c5 3741->3745 3753 401389 3741->3753 3742 404451 SendMessageA 3743 4055d7 OleUninitialize 3742->3743 3743->3599 3745->3742 3746->3732 3748 40641b 17 API calls 3747->3748 3749 403efa SetWindowTextA 3748->3749 3749->3735 3751 404469 3750->3751 3752 40445a SendMessageA 3750->3752 3751->3741 3752->3751 3755 401390 3753->3755 3754 4013fe 3754->3741 3755->3754 3756 4013cb MulDiv SendMessageA 3755->3756 3756->3755 3757->3615 3759 405dde 3758->3759 3760 405dce 3758->3760 3762 405d45 CharNextA 3759->3762 3763 405dfe 3759->3763 3760->3759 3761 405dd9 CharNextA 3760->3761 3761->3763 3762->3759 3763->3618 3763->3619 3765 406715 FindClose 3764->3765 3766 406720 3764->3766 3765->3766 3766->3625 3768 406017 3767->3768 3769 40603d GetShortPathNameA 3767->3769 3794 405f1b GetFileAttributesA CreateFileA 3768->3794 3771 406052 3769->3771 3772 40615c 3769->3772 3771->3772 3774 40605a wsprintfA 3771->3774 3772->3643 3773 406021 CloseHandle GetShortPathNameA 3773->3772 3776 406035 3773->3776 3775 40641b 17 API calls 3774->3775 3777 406082 3775->3777 3776->3769 3776->3772 3795 405f1b GetFileAttributesA CreateFileA 3777->3795 3779 40608f 3779->3772 3780 40609e GetFileSize GlobalAlloc 3779->3780 3781 4060c0 3780->3781 3782 406155 CloseHandle 3780->3782 3783 405f93 ReadFile 3781->3783 3782->3772 3784 4060c8 3783->3784 3784->3782 3796 405e80 lstrlenA 3784->3796 3787 4060f3 3789 405e80 4 API calls 3787->3789 3788 4060df lstrcpyA 3790 406101 3788->3790 3789->3790 3791 406138 SetFilePointer 3790->3791 3792 405fc2 WriteFile 3791->3792 3793 40614e GlobalFree 3792->3793 3793->3782 3794->3773 3795->3779 3797 405ec1 lstrlenA 3796->3797 3798 405ec9 3797->3798 3799 405e9a lstrcmpiA 3797->3799 3798->3787 3798->3788 3799->3798 3800 405eb8 CharNextA 3799->3800 3800->3797 4067 404850 4068 404860 4067->4068 4069 404886 4067->4069 4074 404405 4068->4074 4077 40446c 4069->4077 4072 40486d SetDlgItemTextA 4072->4069 4075 40641b 17 API calls 4074->4075 4076 404410 SetDlgItemTextA 4075->4076 4076->4072 4078 40452f 4077->4078 4079 404484 GetWindowLongA 4077->4079 4079->4078 4080 404499 4079->4080 4080->4078 4081 4044c6 GetSysColor 4080->4081 4082 4044c9 4080->4082 4081->4082 4083 4044d9 SetBkMode 4082->4083 4084 4044cf SetTextColor 4082->4084 4085 4044f1 GetSysColor 4083->4085 4086 4044f7 4083->4086 4084->4083 4085->4086 4087 4044fe SetBkColor 4086->4087 4088 404508 4086->4088 4087->4088 4088->4078 4089 404522 CreateBrushIndirect 4088->4089 4090 40451b DeleteObject 4088->4090 4089->4078 4090->4089 4098 4014d6 4099 402c17 17 API calls 4098->4099 4100 4014dc Sleep 4099->4100 4102 402ac5 4100->4102 3896 401759 3897 402c39 17 API calls 3896->3897 3898 401760 3897->3898 3899 401786 3898->3899 3900 40177e 3898->3900 3936 406388 lstrcpynA 3899->3936 3935 406388 lstrcpynA 3900->3935 3903 401784 3907 406666 5 API calls 3903->3907 3904 401791 3905 405d1a 3 API calls 3904->3905 3906 401797 lstrcatA 3905->3906 3906->3903 3922 4017a3 3907->3922 3908 4066ff 2 API calls 3908->3922 3909 405ef6 2 API calls 3909->3922 3911 4017ba CompareFileTime 3911->3922 3912 40187e 3913 4054a9 24 API calls 3912->3913 3915 401888 3913->3915 3914 401855 3916 4054a9 24 API calls 3914->3916 3923 40186a 3914->3923 3917 4031fd 44 API calls 3915->3917 3916->3923 3918 40189b 3917->3918 3919 4018af SetFileTime 3918->3919 3921 4018c1 FindCloseChangeNotification 3918->3921 3919->3921 3920 40641b 17 API calls 3920->3922 3921->3923 3924 4018d2 3921->3924 3922->3908 3922->3909 3922->3911 3922->3912 3922->3914 3922->3920 3925 406388 lstrcpynA 3922->3925 3930 405a9e MessageBoxIndirectA 3922->3930 3934 405f1b GetFileAttributesA CreateFileA 3922->3934 3926 4018d7 3924->3926 3927 4018ea 3924->3927 3925->3922 3928 40641b 17 API calls 3926->3928 3929 40641b 17 API calls 3927->3929 3931 4018df lstrcatA 3928->3931 3932 4018f2 3929->3932 3930->3922 3931->3932 3933 405a9e MessageBoxIndirectA 3932->3933 3933->3923 3934->3922 3935->3903 3936->3904 4103 401659 4104 402c39 17 API calls 4103->4104 4105 40165f 4104->4105 4106 4066ff 2 API calls 4105->4106 4107 401665 4106->4107 4108 401959 4109 402c17 17 API calls 4108->4109 4110 401960 4109->4110 4111 402c17 17 API calls 4110->4111 4112 40196d 4111->4112 4113 402c39 17 API calls 4112->4113 4114 401984 lstrlenA 4113->4114 4116 401994 4114->4116 4115 4019d4 4116->4115 4120 406388 lstrcpynA 4116->4120 4118 4019c4 4118->4115 4119 4019c9 lstrlenA 4118->4119 4119->4115 4120->4118 4121 401a5e 4122 402c17 17 API calls 4121->4122 4123 401a67 4122->4123 4124 402c17 17 API calls 4123->4124 4125 401a0e 4124->4125 4126 401563 4127 402a42 4126->4127 4130 4062e6 wsprintfA 4127->4130 4129 402a47 4130->4129 4131 401b63 4132 402c39 17 API calls 4131->4132 4133 401b6a 4132->4133 4134 402c17 17 API calls 4133->4134 4135 401b73 wsprintfA 4134->4135 4136 402ac5 4135->4136 4137 100013a4 4144 10001426 4137->4144 4145 100013d0 4144->4145 4147 1000142f 4144->4147 4149 100010d0 GetVersionExA 4145->4149 4146 1000145f GlobalFree 4146->4145 4147->4145 4147->4146 4148 1000144b lstrcpynA 4147->4148 4148->4146 4150 10001106 4149->4150 4151 100010fc 4149->4151 4152 10001122 LoadLibraryW 4150->4152 4153 1000110e 4150->4153 4175 100014ba wsprintfA 4151->4175 4155 100011a5 4152->4155 4156 1000113b GetProcAddress 4152->4156 4153->4151 4154 10001225 LoadLibraryA 4153->4154 4154->4151 4159 1000123d GetProcAddress GetProcAddress GetProcAddress 4154->4159 4155->4151 4164 100011c1 WideCharToMultiByte lstrcmpiA 4155->4164 4166 10001217 LocalFree 4155->4166 4168 100011f7 4155->4168 4157 1000118e 4156->4157 4158 1000114e LocalAlloc 4156->4158 4161 1000119a FreeLibrary 4157->4161 4160 10001189 4158->4160 4162 10001323 FreeLibrary 4159->4162 4173 1000126b 4159->4173 4160->4157 4163 1000115c NtQuerySystemInformation 4160->4163 4161->4155 4162->4151 4163->4161 4165 1000116f LocalFree 4163->4165 4164->4155 4165->4157 4167 10001180 LocalAlloc 4165->4167 4166->4151 4167->4160 4168->4155 4169 1000103f 8 API calls 4168->4169 4169->4168 4170 100012a2 lstrlenA 4170->4173 4171 1000131c CloseHandle 4171->4162 4172 100012c4 lstrcpynA lstrcmpiA 4172->4173 4173->4162 4173->4170 4173->4171 4173->4172 4174 1000103f 8 API calls 4173->4174 4174->4173 4178 10001475 4175->4178 4179 100013e3 4178->4179 4180 1000147e GlobalAlloc lstrcpynA 4178->4180 4180->4179 4181 401d65 4182 401d78 GetDlgItem 4181->4182 4183 401d6b 4181->4183 4184 401d72 4182->4184 4185 402c17 17 API calls 4183->4185 4186 401db9 GetClientRect LoadImageA SendMessageA 4184->4186 4187 402c39 17 API calls 4184->4187 4185->4184 4189 401e26 4186->4189 4190 401e1a 4186->4190 4187->4186 4190->4189 4191 401e1f DeleteObject 4190->4191 4191->4189 3376 10001426 3377 1000146f 3376->3377 3379 1000142f 3376->3379 3378 1000145f GlobalFree 3378->3377 3379->3377 3379->3378 3380 1000144b lstrcpynA 3379->3380 3380->3378 4192 402766 4193 40276c 4192->4193 4194 402774 FindClose 4193->4194 4195 402ac5 4193->4195 4194->4195 4196 4055e7 4197 405792 4196->4197 4198 405609 GetDlgItem GetDlgItem GetDlgItem 4196->4198 4200 40579a GetDlgItem CreateThread CloseHandle 4197->4200 4203 4057c2 4197->4203 4241 40443a SendMessageA 4198->4241 4200->4203 4201 405679 4207 405680 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4201->4207 4202 4057f0 4206 40584b 4202->4206 4209 405800 4202->4209 4210 405824 ShowWindow 4202->4210 4203->4202 4204 405811 4203->4204 4205 4057d8 ShowWindow ShowWindow 4203->4205 4211 40446c 8 API calls 4204->4211 4243 40443a SendMessageA 4205->4243 4206->4204 4216 405858 SendMessageA 4206->4216 4214 4056d2 SendMessageA SendMessageA 4207->4214 4215 4056ee 4207->4215 4244 4043de 4209->4244 4212 405844 4210->4212 4213 405836 4210->4213 4218 40581d 4211->4218 4220 4043de SendMessageA 4212->4220 4219 4054a9 24 API calls 4213->4219 4214->4215 4221 405701 4215->4221 4222 4056f3 SendMessageA 4215->4222 4216->4218 4223 405871 CreatePopupMenu 4216->4223 4219->4212 4220->4206 4225 404405 18 API calls 4221->4225 4222->4221 4224 40641b 17 API calls 4223->4224 4226 405881 AppendMenuA 4224->4226 4227 405711 4225->4227 4228 4058b2 TrackPopupMenu 4226->4228 4229 40589f GetWindowRect 4226->4229 4230 40571a ShowWindow 4227->4230 4231 40574e GetDlgItem SendMessageA 4227->4231 4228->4218 4233 4058ce 4228->4233 4229->4228 4234 405730 ShowWindow 4230->4234 4235 40573d 4230->4235 4231->4218 4232 405775 SendMessageA SendMessageA 4231->4232 4232->4218 4236 4058ed SendMessageA 4233->4236 4234->4235 4242 40443a SendMessageA 4235->4242 4236->4236 4237 40590a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4236->4237 4239 40592c SendMessageA 4237->4239 4239->4239 4240 40594e GlobalUnlock SetClipboardData CloseClipboard 4239->4240 4240->4218 4241->4201 4242->4231 4243->4202 4245 4043e5 4244->4245 4246 4043eb SendMessageA 4244->4246 4245->4246 4246->4204 4247 404be8 4248 404c14 4247->4248 4249 404bf8 4247->4249 4251 404c47 4248->4251 4252 404c1a SHGetPathFromIDListA 4248->4252 4258 405a82 GetDlgItemTextA 4249->4258 4254 404c31 SendMessageA 4252->4254 4255 404c2a 4252->4255 4253 404c05 SendMessageA 4253->4248 4254->4251 4256 40140b 2 API calls 4255->4256 4256->4254 4258->4253 4259 4023e8 4260 402c39 17 API calls 4259->4260 4261 4023f9 4260->4261 4262 402c39 17 API calls 4261->4262 4263 402402 4262->4263 4264 402c39 17 API calls 4263->4264 4265 40240c GetPrivateProfileStringA 4264->4265 4266 4027e8 4267 402c39 17 API calls 4266->4267 4268 4027f4 4267->4268 4269 40280a 4268->4269 4270 402c39 17 API calls 4268->4270 4271 405ef6 2 API calls 4269->4271 4270->4269 4272 402810 4271->4272 4294 405f1b GetFileAttributesA CreateFileA 4272->4294 4274 40281d 4275 4028d9 4274->4275 4276 4028c1 4274->4276 4277 402838 GlobalAlloc 4274->4277 4278 4028e0 DeleteFileA 4275->4278 4279 4028f3 4275->4279 4281 4031fd 44 API calls 4276->4281 4277->4276 4280 402851 4277->4280 4278->4279 4295 403484 SetFilePointer 4280->4295 4283 4028ce CloseHandle 4281->4283 4283->4275 4284 402857 4285 40346e ReadFile 4284->4285 4286 402860 GlobalAlloc 4285->4286 4287 402870 4286->4287 4288 4028aa 4286->4288 4290 4031fd 44 API calls 4287->4290 4289 405fc2 WriteFile 4288->4289 4291 4028b6 GlobalFree 4289->4291 4293 40287d 4290->4293 4291->4276 4292 4028a1 GlobalFree 4292->4288 4293->4292 4294->4274 4295->4284 4296 40166a 4297 402c39 17 API calls 4296->4297 4298 401671 4297->4298 4299 402c39 17 API calls 4298->4299 4300 40167a 4299->4300 4301 402c39 17 API calls 4300->4301 4302 401683 MoveFileA 4301->4302 4303 401696 4302->4303 4309 40168f 4302->4309 4305 4066ff 2 API calls 4303->4305 4307 4022ea 4303->4307 4304 401423 24 API calls 4304->4307 4306 4016a5 4305->4306 4306->4307 4308 406161 36 API calls 4306->4308 4308->4309 4309->4304 4317 4019ed 4318 402c39 17 API calls 4317->4318 4319 4019f4 4318->4319 4320 402c39 17 API calls 4319->4320 4321 4019fd 4320->4321 4322 401a04 lstrcmpiA 4321->4322 4323 401a16 lstrcmpA 4321->4323 4324 401a0a 4322->4324 4323->4324 4325 40156f 4326 401586 4325->4326 4327 40157f ShowWindow 4325->4327 4328 401594 ShowWindow 4326->4328 4329 402ac5 4326->4329 4327->4326 4328->4329 4330 404570 4331 404586 4330->4331 4336 404692 4330->4336 4334 404405 18 API calls 4331->4334 4332 404701 4333 4047cb 4332->4333 4335 40470b GetDlgItem 4332->4335 4342 40446c 8 API calls 4333->4342 4337 4045dc 4334->4337 4338 404721 4335->4338 4339 404789 4335->4339 4336->4332 4336->4333 4340 4046d6 GetDlgItem SendMessageA 4336->4340 4341 404405 18 API calls 4337->4341 4338->4339 4343 404747 SendMessageA LoadCursorA SetCursor 4338->4343 4339->4333 4344 40479b 4339->4344 4363 404427 EnableWindow 4340->4363 4346 4045e9 CheckDlgButton 4341->4346 4347 4047c6 4342->4347 4367 404814 4343->4367 4349 4047a1 SendMessageA 4344->4349 4350 4047b2 4344->4350 4361 404427 EnableWindow 4346->4361 4349->4350 4350->4347 4354 4047b8 SendMessageA 4350->4354 4351 4046fc 4364 4047f0 4351->4364 4354->4347 4356 404607 GetDlgItem 4362 40443a SendMessageA 4356->4362 4358 40461d SendMessageA 4359 404644 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4358->4359 4360 40463b GetSysColor 4358->4360 4359->4347 4360->4359 4361->4356 4362->4358 4363->4351 4365 404803 SendMessageA 4364->4365 4366 4047fe 4364->4366 4365->4332 4366->4365 4370 405a64 ShellExecuteExA 4367->4370 4369 40477a LoadCursorA SetCursor 4369->4339 4370->4369 4371 402173 4372 402c39 17 API calls 4371->4372 4373 40217a 4372->4373 4374 402c39 17 API calls 4373->4374 4375 402184 4374->4375 4376 402c39 17 API calls 4375->4376 4377 40218e 4376->4377 4378 402c39 17 API calls 4377->4378 4379 40219b 4378->4379 4380 402c39 17 API calls 4379->4380 4381 4021a5 4380->4381 4382 4021e7 CoCreateInstance 4381->4382 4383 402c39 17 API calls 4381->4383 4386 402206 4382->4386 4388 4022b4 4382->4388 4383->4382 4384 401423 24 API calls 4385 4022ea 4384->4385 4387 402294 MultiByteToWideChar 4386->4387 4386->4388 4387->4388 4388->4384 4388->4385 4389 4022f3 4390 402c39 17 API calls 4389->4390 4391 4022f9 4390->4391 4392 402c39 17 API calls 4391->4392 4393 402302 4392->4393 4394 402c39 17 API calls 4393->4394 4395 40230b 4394->4395 4396 4066ff 2 API calls 4395->4396 4397 402314 4396->4397 4398 402325 lstrlenA lstrlenA 4397->4398 4399 402318 4397->4399 4401 4054a9 24 API calls 4398->4401 4400 4054a9 24 API calls 4399->4400 4402 402320 4399->4402 4400->4402 4403 402361 SHFileOperationA 4401->4403 4403->4399 4403->4402 4404 4014f4 SetForegroundWindow 4405 402ac5 4404->4405 4406 402375 4407 40237c 4406->4407 4411 40238f 4406->4411 4408 40641b 17 API calls 4407->4408 4409 402389 4408->4409 4410 405a9e MessageBoxIndirectA 4409->4410 4410->4411 4412 402675 4413 402c17 17 API calls 4412->4413 4414 40267f 4413->4414 4415 405f93 ReadFile 4414->4415 4416 4026ef 4414->4416 4419 4026ff 4414->4419 4420 4026ed 4414->4420 4415->4414 4421 4062e6 wsprintfA 4416->4421 4418 402715 SetFilePointer 4418->4420 4419->4418 4419->4420 4421->4420 4422 4029f6 4423 402a49 4422->4423 4424 4029fd 4422->4424 4425 406794 5 API calls 4423->4425 4426 402c17 17 API calls 4424->4426 4432 402a47 4424->4432 4427 402a50 4425->4427 4428 402a0b 4426->4428 4429 402c39 17 API calls 4427->4429 4430 402c17 17 API calls 4428->4430 4431 402a59 4429->4431 4434 402a1a 4430->4434 4431->4432 4440 4063db 4431->4440 4439 4062e6 wsprintfA 4434->4439 4436 402a67 4436->4432 4444 4063c5 4436->4444 4439->4432 4442 4063e6 4440->4442 4441 406409 IIDFromString 4441->4436 4442->4441 4443 406402 4442->4443 4443->4436 4447 4063aa WideCharToMultiByte 4444->4447 4446 402a88 CoTaskMemFree 4446->4432 4447->4446 4448 401ef9 4449 402c39 17 API calls 4448->4449 4450 401eff 4449->4450 4451 402c39 17 API calls 4450->4451 4452 401f08 4451->4452 4453 402c39 17 API calls 4452->4453 4454 401f11 4453->4454 4455 402c39 17 API calls 4454->4455 4456 401f1a 4455->4456 4457 401423 24 API calls 4456->4457 4458 401f21 4457->4458 4465 405a64 ShellExecuteExA 4458->4465 4460 401f5c 4461 406809 5 API calls 4460->4461 4462 4027c8 4460->4462 4463 401f76 CloseHandle 4461->4463 4463->4462 4465->4460 3937 401f7b 3938 402c39 17 API calls 3937->3938 3939 401f81 3938->3939 3940 4054a9 24 API calls 3939->3940 3941 401f8b 3940->3941 3942 405a21 2 API calls 3941->3942 3943 401f91 3942->3943 3946 4027c8 3943->3946 3951 401fb2 CloseHandle 3943->3951 3952 406809 WaitForSingleObject 3943->3952 3947 401fa6 3948 401fb4 3947->3948 3949 401fab 3947->3949 3948->3951 3957 4062e6 wsprintfA 3949->3957 3951->3946 3953 406823 3952->3953 3954 406835 GetExitCodeProcess 3953->3954 3955 4067d0 2 API calls 3953->3955 3954->3947 3956 40682a WaitForSingleObject 3955->3956 3956->3953 3957->3951 4473 401ffb 4474 402c39 17 API calls 4473->4474 4475 402002 4474->4475 4476 406794 5 API calls 4475->4476 4477 402011 4476->4477 4478 402099 4477->4478 4479 402029 GlobalAlloc 4477->4479 4479->4478 4480 40203d 4479->4480 4481 406794 5 API calls 4480->4481 4482 402044 4481->4482 4483 406794 5 API calls 4482->4483 4484 40204e 4483->4484 4484->4478 4488 4062e6 wsprintfA 4484->4488 4486 402089 4489 4062e6 wsprintfA 4486->4489 4488->4486 4489->4478 3979 403a7c 3980 403a97 3979->3980 3981 403a8d CloseHandle 3979->3981 3982 403aa1 CloseHandle 3980->3982 3983 403aab 3980->3983 3981->3980 3982->3983 3988 403ad9 3983->3988 3986 405b4a 67 API calls 3987 403abc 3986->3987 3989 403ae7 3988->3989 3990 403ab0 3989->3990 3991 403aec FreeLibrary GlobalFree 3989->3991 3990->3986 3991->3990 3991->3991 4490 4018fd 4491 401934 4490->4491 4492 402c39 17 API calls 4491->4492 4493 401939 4492->4493 4494 405b4a 67 API calls 4493->4494 4495 401942 4494->4495 3992 40247e 3993 402c39 17 API calls 3992->3993 3994 402490 3993->3994 3995 402c39 17 API calls 3994->3995 3996 40249a 3995->3996 4009 402cc9 3996->4009 3999 402ac5 4000 4024cf 4002 4024db 4000->4002 4013 402c17 4000->4013 4001 402c39 17 API calls 4003 4024c8 lstrlenA 4001->4003 4005 4024fd RegSetValueExA 4002->4005 4006 4031fd 44 API calls 4002->4006 4003->4000 4007 402513 RegCloseKey 4005->4007 4006->4005 4007->3999 4010 402ce4 4009->4010 4016 40623c 4010->4016 4014 40641b 17 API calls 4013->4014 4015 402c2c 4014->4015 4015->4002 4017 40624b 4016->4017 4018 4024aa 4017->4018 4019 406256 RegCreateKeyExA 4017->4019 4018->3999 4018->4000 4018->4001 4019->4018 4496 401cfe 4497 402c17 17 API calls 4496->4497 4498 401d04 IsWindow 4497->4498 4499 401a0e 4498->4499 4500 401000 4501 401037 BeginPaint GetClientRect 4500->4501 4502 40100c DefWindowProcA 4500->4502 4504 4010f3 4501->4504 4505 401179 4502->4505 4506 401073 CreateBrushIndirect FillRect DeleteObject 4504->4506 4507 4010fc 4504->4507 4506->4504 4508 401102 CreateFontIndirectA 4507->4508 4509 401167 EndPaint 4507->4509 4508->4509 4510 401112 6 API calls 4508->4510 4509->4505 4510->4509 4511 401900 4512 402c39 17 API calls 4511->4512 4513 401907 4512->4513 4514 405a9e MessageBoxIndirectA 4513->4514 4515 401910 4514->4515 4516 402780 4517 402786 4516->4517 4518 40278a FindNextFileA 4517->4518 4519 40279c 4517->4519 4518->4519 4520 4027db 4518->4520 4522 406388 lstrcpynA 4520->4522 4522->4519 4523 401502 4524 40150a 4523->4524 4526 40151d 4523->4526 4525 402c17 17 API calls 4524->4525 4525->4526 3381 401b87 3382 401bd8 3381->3382 3387 401b94 3381->3387 3383 401c01 GlobalAlloc 3382->3383 3384 401bdc 3382->3384 3386 40641b 17 API calls 3383->3386 3395 40238f 3384->3395 3402 406388 lstrcpynA 3384->3402 3385 40641b 17 API calls 3388 402389 3385->3388 3390 401c1c 3386->3390 3387->3390 3391 401bab 3387->3391 3403 405a9e 3388->3403 3390->3385 3390->3395 3400 406388 lstrcpynA 3391->3400 3392 401bee GlobalFree 3392->3395 3396 401bba 3401 406388 lstrcpynA 3396->3401 3398 401bc9 3407 406388 lstrcpynA 3398->3407 3400->3396 3401->3398 3402->3392 3404 405ab3 3403->3404 3405 405aff 3404->3405 3406 405ac7 MessageBoxIndirectA 3404->3406 3405->3395 3406->3405 3407->3395 4527 406a88 4531 40690c 4527->4531 4528 407277 4529 406996 GlobalAlloc 4529->4528 4529->4531 4530 40698d GlobalFree 4530->4529 4531->4528 4531->4529 4531->4530 4532 406a04 GlobalFree 4531->4532 4533 406a0d GlobalAlloc 4531->4533 4532->4533 4533->4528 4533->4531 3408 401389 3410 401390 3408->3410 3409 4013fe 3410->3409 3411 4013cb MulDiv SendMessageA 3410->3411 3411->3410 4534 404e0a GetDlgItem GetDlgItem 4535 404e60 7 API calls 4534->4535 4542 405087 4534->4542 4536 404f08 DeleteObject 4535->4536 4537 404efc SendMessageA 4535->4537 4538 404f13 4536->4538 4537->4536 4540 404f4a 4538->4540 4543 40641b 17 API calls 4538->4543 4539 405169 4541 405215 4539->4541 4545 40507a 4539->4545 4551 4051c2 SendMessageA 4539->4551 4544 404405 18 API calls 4540->4544 4546 405227 4541->4546 4547 40521f SendMessageA 4541->4547 4542->4539 4566 4050f6 4542->4566 4588 404d58 SendMessageA 4542->4588 4548 404f2c SendMessageA SendMessageA 4543->4548 4549 404f5e 4544->4549 4553 40446c 8 API calls 4545->4553 4558 405240 4546->4558 4559 405239 ImageList_Destroy 4546->4559 4563 405250 4546->4563 4547->4546 4548->4538 4550 404405 18 API calls 4549->4550 4567 404f6f 4550->4567 4551->4545 4556 4051d7 SendMessageA 4551->4556 4552 40515b SendMessageA 4552->4539 4557 405416 4553->4557 4555 4053ca 4555->4545 4564 4053dc ShowWindow GetDlgItem ShowWindow 4555->4564 4561 4051ea 4556->4561 4562 405249 GlobalFree 4558->4562 4558->4563 4559->4558 4560 405049 GetWindowLongA SetWindowLongA 4565 405062 4560->4565 4573 4051fb SendMessageA 4561->4573 4562->4563 4563->4555 4568 40528b 4563->4568 4593 404dd8 4563->4593 4564->4545 4569 405067 ShowWindow 4565->4569 4570 40507f 4565->4570 4566->4539 4566->4552 4567->4560 4572 404fc1 SendMessageA 4567->4572 4574 405044 4567->4574 4576 405013 SendMessageA 4567->4576 4577 404fff SendMessageA 4567->4577 4581 4052b9 SendMessageA 4568->4581 4585 4052cf 4568->4585 4586 40443a SendMessageA 4569->4586 4587 40443a SendMessageA 4570->4587 4572->4567 4573->4541 4574->4560 4574->4565 4576->4567 4577->4567 4579 405395 4580 4053a0 InvalidateRect 4579->4580 4582 4053ac 4579->4582 4580->4582 4581->4585 4582->4555 4602 404d13 4582->4602 4584 405343 SendMessageA SendMessageA 4584->4585 4585->4579 4585->4584 4586->4545 4587->4542 4589 404db7 SendMessageA 4588->4589 4590 404d7b GetMessagePos ScreenToClient SendMessageA 4588->4590 4592 404daf 4589->4592 4591 404db4 4590->4591 4590->4592 4591->4589 4592->4566 4605 406388 lstrcpynA 4593->4605 4595 404deb 4606 4062e6 wsprintfA 4595->4606 4597 404df5 4598 40140b 2 API calls 4597->4598 4599 404dfe 4598->4599 4607 406388 lstrcpynA 4599->4607 4601 404e05 4601->4568 4608 404c4e 4602->4608 4604 404d28 4604->4555 4605->4595 4606->4597 4607->4601 4609 404c64 4608->4609 4610 40641b 17 API calls 4609->4610 4611 404cc8 4610->4611 4612 40641b 17 API calls 4611->4612 4613 404cd3 4612->4613 4614 40641b 17 API calls 4613->4614 4615 404ce9 lstrlenA wsprintfA SetDlgItemTextA 4614->4615 4615->4604 4616 40298a 4617 402c17 17 API calls 4616->4617 4619 402990 4617->4619 4618 40641b 17 API calls 4620 4027c8 4618->4620 4619->4618 4619->4620 4621 403f0b 4622 403f23 4621->4622 4623 404084 4621->4623 4622->4623 4624 403f2f 4622->4624 4625 4040d5 4623->4625 4626 404095 GetDlgItem GetDlgItem 4623->4626 4627 403f3a SetWindowPos 4624->4627 4628 403f4d 4624->4628 4630 40412f 4625->4630 4641 401389 2 API calls 4625->4641 4629 404405 18 API calls 4626->4629 4627->4628 4632 403f56 ShowWindow 4628->4632 4633 403f98 4628->4633 4634 4040bf SetClassLongA 4629->4634 4631 404451 SendMessageA 4630->4631 4635 40407f 4630->4635 4662 404141 4631->4662 4636 404042 4632->4636 4637 403f76 GetWindowLongA 4632->4637 4638 403fa0 DestroyWindow 4633->4638 4639 403fb7 4633->4639 4640 40140b 2 API calls 4634->4640 4642 40446c 8 API calls 4636->4642 4637->4636 4643 403f8f ShowWindow 4637->4643 4691 40438e 4638->4691 4644 403fbc SetWindowLongA 4639->4644 4645 403fcd 4639->4645 4640->4625 4646 404107 4641->4646 4642->4635 4643->4633 4644->4635 4645->4636 4650 403fd9 GetDlgItem 4645->4650 4646->4630 4647 40410b SendMessageA 4646->4647 4647->4635 4648 40140b 2 API calls 4648->4662 4649 404390 DestroyWindow EndDialog 4649->4691 4652 404007 4650->4652 4653 403fea SendMessageA IsWindowEnabled 4650->4653 4651 4043bf ShowWindow 4651->4635 4655 404014 4652->4655 4656 40405b SendMessageA 4652->4656 4657 404027 4652->4657 4665 40400c 4652->4665 4653->4635 4653->4652 4654 40641b 17 API calls 4654->4662 4655->4656 4655->4665 4656->4636 4660 404044 4657->4660 4661 40402f 4657->4661 4658 4043de SendMessageA 4658->4636 4659 404405 18 API calls 4659->4662 4664 40140b 2 API calls 4660->4664 4663 40140b 2 API calls 4661->4663 4662->4635 4662->4648 4662->4649 4662->4654 4662->4659 4666 404405 18 API calls 4662->4666 4682 4042d0 DestroyWindow 4662->4682 4663->4665 4664->4665 4665->4636 4665->4658 4667 4041bc GetDlgItem 4666->4667 4668 4041d1 4667->4668 4669 4041d9 ShowWindow EnableWindow 4667->4669 4668->4669 4692 404427 EnableWindow 4669->4692 4671 404203 EnableWindow 4676 404217 4671->4676 4672 40421c GetSystemMenu EnableMenuItem SendMessageA 4673 40424c SendMessageA 4672->4673 4672->4676 4673->4676 4675 403eec 18 API calls 4675->4676 4676->4672 4676->4675 4693 40443a SendMessageA 4676->4693 4694 406388 lstrcpynA 4676->4694 4678 40427b lstrlenA 4679 40641b 17 API calls 4678->4679 4680 40428c SetWindowTextA 4679->4680 4681 401389 2 API calls 4680->4681 4681->4662 4683 4042ea CreateDialogParamA 4682->4683 4682->4691 4684 40431d 4683->4684 4683->4691 4685 404405 18 API calls 4684->4685 4686 404328 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4685->4686 4687 401389 2 API calls 4686->4687 4688 40436e 4687->4688 4688->4635 4689 404376 ShowWindow 4688->4689 4690 404451 SendMessageA 4689->4690 4690->4691 4691->4635 4691->4651 4692->4671 4693->4676 4694->4678 4695 40260c 4696 402c39 17 API calls 4695->4696 4697 402613 4696->4697 4700 405f1b GetFileAttributesA CreateFileA 4697->4700 4699 40261f 4700->4699 3801 100010d0 GetVersionExA 3802 10001106 3801->3802 3803 100010fc 3801->3803 3804 10001122 LoadLibraryW 3802->3804 3805 1000110e 3802->3805 3807 100011a5 3804->3807 3808 1000113b GetProcAddress 3804->3808 3805->3803 3806 10001225 LoadLibraryA 3805->3806 3806->3803 3811 1000123d GetProcAddress GetProcAddress GetProcAddress 3806->3811 3807->3803 3816 100011c1 WideCharToMultiByte lstrcmpiA 3807->3816 3818 10001217 LocalFree 3807->3818 3820 100011f7 3807->3820 3809 1000118e 3808->3809 3810 1000114e LocalAlloc 3808->3810 3813 1000119a FreeLibrary 3809->3813 3812 10001189 3810->3812 3814 10001323 FreeLibrary 3811->3814 3825 1000126b 3811->3825 3812->3809 3815 1000115c NtQuerySystemInformation 3812->3815 3813->3807 3814->3803 3815->3813 3817 1000116f LocalFree 3815->3817 3816->3807 3817->3809 3819 10001180 LocalAlloc 3817->3819 3818->3803 3819->3812 3820->3807 3827 1000103f OpenProcess 3820->3827 3822 100012a2 lstrlenA 3822->3825 3823 1000131c CloseHandle 3823->3814 3824 100012c4 lstrcpynA lstrcmpiA 3824->3825 3825->3814 3825->3822 3825->3823 3825->3824 3826 1000103f 8 API calls 3825->3826 3826->3825 3828 10001060 3827->3828 3829 100010cb 3827->3829 3830 1000106b EnumWindows 3828->3830 3831 100010ac TerminateProcess 3828->3831 3829->3820 3830->3831 3832 1000107f GetExitCodeProcess 3830->3832 3837 10001007 GetWindowThreadProcessId 3830->3837 3833 100010be CloseHandle 3831->3833 3834 100010a7 3831->3834 3832->3834 3835 1000108e 3832->3835 3833->3829 3834->3833 3835->3834 3836 10001097 WaitForSingleObject 3835->3836 3836->3831 3836->3834 3838 10001024 PostMessageA 3837->3838 3839 10001036 3837->3839 3838->3839 4701 401490 4702 4054a9 24 API calls 4701->4702 4703 401497 4702->4703 4704 402590 4705 402c79 17 API calls 4704->4705 4706 40259a 4705->4706 4707 402c17 17 API calls 4706->4707 4708 4025a3 4707->4708 4709 4025ca RegEnumValueA 4708->4709 4710 4025be RegEnumKeyA 4708->4710 4712 4027c8 4708->4712 4711 4025df RegCloseKey 4709->4711 4710->4711 4711->4712 4714 406d91 4716 40690c 4714->4716 4715 407277 4716->4715 4716->4716 4717 406996 GlobalAlloc 4716->4717 4718 40698d GlobalFree 4716->4718 4719 406a04 GlobalFree 4716->4719 4720 406a0d GlobalAlloc 4716->4720 4717->4715 4717->4716 4718->4717 4719->4720 4720->4715 4720->4716 4721 404897 4722 4048c3 4721->4722 4723 4048d4 4721->4723 4782 405a82 GetDlgItemTextA 4722->4782 4725 4048e0 GetDlgItem 4723->4725 4726 40493f 4723->4726 4728 4048f4 4725->4728 4733 40641b 17 API calls 4726->4733 4742 404a23 4726->4742 4780 404bcd 4726->4780 4727 4048ce 4729 406666 5 API calls 4727->4729 4731 404908 SetWindowTextA 4728->4731 4732 405db3 4 API calls 4728->4732 4729->4723 4735 404405 18 API calls 4731->4735 4737 4048fe 4732->4737 4738 4049b3 SHBrowseForFolderA 4733->4738 4734 404a53 4739 405e08 18 API calls 4734->4739 4740 404924 4735->4740 4736 40446c 8 API calls 4741 404be1 4736->4741 4737->4731 4746 405d1a 3 API calls 4737->4746 4738->4742 4743 4049cb CoTaskMemFree 4738->4743 4744 404a59 4739->4744 4745 404405 18 API calls 4740->4745 4742->4780 4784 405a82 GetDlgItemTextA 4742->4784 4747 405d1a 3 API calls 4743->4747 4785 406388 lstrcpynA 4744->4785 4748 404932 4745->4748 4746->4731 4749 4049d8 4747->4749 4783 40443a SendMessageA 4748->4783 4752 404a0f SetDlgItemTextA 4749->4752 4757 40641b 17 API calls 4749->4757 4752->4742 4753 404938 4755 406794 5 API calls 4753->4755 4754 404a70 4756 406794 5 API calls 4754->4756 4755->4726 4763 404a77 4756->4763 4758 4049f7 lstrcmpiA 4757->4758 4758->4752 4761 404a08 lstrcatA 4758->4761 4759 404ab3 4786 406388 lstrcpynA 4759->4786 4761->4752 4762 404aba 4764 405db3 4 API calls 4762->4764 4763->4759 4767 405d61 2 API calls 4763->4767 4769 404b0b 4763->4769 4765 404ac0 GetDiskFreeSpaceA 4764->4765 4768 404ae4 MulDiv 4765->4768 4765->4769 4767->4763 4768->4769 4770 404b7c 4769->4770 4772 404d13 20 API calls 4769->4772 4771 404b9f 4770->4771 4773 40140b 2 API calls 4770->4773 4787 404427 EnableWindow 4771->4787 4774 404b69 4772->4774 4773->4771 4776 404b7e SetDlgItemTextA 4774->4776 4777 404b6e 4774->4777 4776->4770 4779 404c4e 20 API calls 4777->4779 4778 404bbb 4778->4780 4781 4047f0 SendMessageA 4778->4781 4779->4770 4780->4736 4781->4780 4782->4727 4783->4753 4784->4734 4785->4754 4786->4762 4787->4778 4788 40541d 4789 405441 4788->4789 4790 40542d 4788->4790 4793 405449 IsWindowVisible 4789->4793 4799 405460 4789->4799 4791 405433 4790->4791 4792 40548a 4790->4792 4794 404451 SendMessageA 4791->4794 4796 40548f CallWindowProcA 4792->4796 4793->4792 4795 405456 4793->4795 4797 40543d 4794->4797 4798 404d58 5 API calls 4795->4798 4796->4797 4798->4799 4799->4796 4800 404dd8 4 API calls 4799->4800 4800->4792 4801 40149d 4802 4014ab PostQuitMessage 4801->4802 4803 40238f 4801->4803 4802->4803 4804 40159d 4805 402c39 17 API calls 4804->4805 4806 4015a4 SetFileAttributesA 4805->4806 4807 4015b6 4806->4807 4020 40251e 4031 402c79 4020->4031 4023 402c39 17 API calls 4024 402531 4023->4024 4025 40253b RegQueryValueExA 4024->4025 4029 4027c8 4024->4029 4026 402561 RegCloseKey 4025->4026 4027 40255b 4025->4027 4026->4029 4027->4026 4036 4062e6 wsprintfA 4027->4036 4032 402c39 17 API calls 4031->4032 4033 402c90 4032->4033 4034 40620e RegOpenKeyExA 4033->4034 4035 402528 4034->4035 4035->4023 4036->4026 4808 401a1e 4809 402c39 17 API calls 4808->4809 4810 401a27 ExpandEnvironmentStringsA 4809->4810 4811 401a3b 4810->4811 4813 401a4e 4810->4813 4812 401a40 lstrcmpA 4811->4812 4811->4813 4812->4813 4819 40171f 4820 402c39 17 API calls 4819->4820 4821 401726 SearchPathA 4820->4821 4822 401741 4821->4822 4823 401d1f 4824 402c17 17 API calls 4823->4824 4825 401d26 4824->4825 4826 402c17 17 API calls 4825->4826 4827 401d32 GetDlgItem 4826->4827 4828 402628 4827->4828 4829 402aa0 SendMessageA 4830 402ac5 4829->4830 4831 402aba InvalidateRect 4829->4831 4831->4830 4832 10001363 4833 10001426 2 API calls 4832->4833 4834 1000138f 4833->4834 4835 100010d0 28 API calls 4834->4835 4836 10001399 4835->4836 4837 100014ba 3 API calls 4836->4837 4838 100013a2 4837->4838 4839 4023a4 4840 4023b2 4839->4840 4841 4023ac 4839->4841 4843 4023c2 4840->4843 4845 402c39 17 API calls 4840->4845 4842 402c39 17 API calls 4841->4842 4842->4840 4844 4023d0 4843->4844 4846 402c39 17 API calls 4843->4846 4847 402c39 17 API calls 4844->4847 4845->4843 4846->4844 4848 4023d9 WritePrivateProfileStringA 4847->4848 3286 4020a5 3287 4020b7 3286->3287 3297 402165 3286->3297 3304 402c39 3287->3304 3289 401423 24 API calls 3292 4022ea 3289->3292 3291 402c39 17 API calls 3293 4020c7 3291->3293 3294 4020dc LoadLibraryExA 3293->3294 3295 4020cf GetModuleHandleA 3293->3295 3296 4020ec GetProcAddress 3294->3296 3294->3297 3295->3294 3295->3296 3298 402138 3296->3298 3299 4020fb 3296->3299 3297->3289 3313 4054a9 3298->3313 3302 40210b 3299->3302 3310 401423 3299->3310 3302->3292 3303 402159 FreeLibrary 3302->3303 3303->3292 3305 402c45 3304->3305 3324 40641b 3305->3324 3307 4020be 3307->3291 3311 4054a9 24 API calls 3310->3311 3312 401431 3311->3312 3312->3302 3314 4054c4 3313->3314 3323 405567 3313->3323 3315 4054e1 lstrlenA 3314->3315 3316 40641b 17 API calls 3314->3316 3317 40550a 3315->3317 3318 4054ef lstrlenA 3315->3318 3316->3315 3320 405510 SetWindowTextA 3317->3320 3321 40551d 3317->3321 3319 405501 lstrcatA 3318->3319 3318->3323 3319->3317 3320->3321 3322 405523 SendMessageA SendMessageA SendMessageA 3321->3322 3321->3323 3322->3323 3323->3302 3325 406428 3324->3325 3326 40664d 3325->3326 3329 406627 lstrlenA 3325->3329 3330 40641b 10 API calls 3325->3330 3334 406543 GetSystemDirectoryA 3325->3334 3335 406556 GetWindowsDirectoryA 3325->3335 3336 406666 5 API calls 3325->3336 3337 40641b 10 API calls 3325->3337 3338 4065d0 lstrcatA 3325->3338 3339 40658a SHGetSpecialFolderLocation 3325->3339 3350 40626f 3325->3350 3355 4062e6 wsprintfA 3325->3355 3356 406388 lstrcpynA 3325->3356 3327 402c66 3326->3327 3357 406388 lstrcpynA 3326->3357 3327->3307 3341 406666 3327->3341 3329->3325 3330->3329 3334->3325 3335->3325 3336->3325 3337->3325 3338->3325 3339->3325 3340 4065a2 SHGetPathFromIDListA CoTaskMemFree 3339->3340 3340->3325 3347 406672 3341->3347 3342 4066da 3343 4066de CharPrevA 3342->3343 3346 4066f9 3342->3346 3343->3342 3344 4066cf CharNextA 3344->3342 3344->3347 3346->3307 3347->3342 3347->3344 3348 4066bd CharNextA 3347->3348 3349 4066ca CharNextA 3347->3349 3362 405d45 3347->3362 3348->3347 3349->3344 3358 40620e 3350->3358 3353 4062a3 RegQueryValueExA RegCloseKey 3354 4062d2 3353->3354 3354->3325 3355->3325 3356->3325 3357->3327 3359 40621d 3358->3359 3360 406221 3359->3360 3361 406226 RegOpenKeyExA 3359->3361 3360->3353 3360->3354 3361->3360 3363 405d4b 3362->3363 3364 405d5e 3363->3364 3365 405d51 CharNextA 3363->3365 3364->3347 3365->3363 4849 402e25 4850 402e34 SetTimer 4849->4850 4851 402e4d 4849->4851 4850->4851 4852 402e9b 4851->4852 4853 402ea1 MulDiv 4851->4853 4854 402e5b wsprintfA SetWindowTextA SetDlgItemTextA 4853->4854 4854->4852 4870 402429 4871 402430 4870->4871 4872 40245b 4870->4872 4873 402c79 17 API calls 4871->4873 4874 402c39 17 API calls 4872->4874 4875 402437 4873->4875 4876 402462 4874->4876 4878 402c39 17 API calls 4875->4878 4879 40246f 4875->4879 4881 402cf7 4876->4881 4880 402448 RegDeleteValueA RegCloseKey 4878->4880 4880->4879 4882 402d03 4881->4882 4883 402d0a 4881->4883 4882->4879 4883->4882 4885 402d3b 4883->4885 4886 40620e RegOpenKeyExA 4885->4886 4887 402d69 4886->4887 4888 402d79 RegEnumValueA 4887->4888 4889 402d9c 4887->4889 4896 402e13 4887->4896 4888->4889 4890 402e03 RegCloseKey 4888->4890 4889->4890 4891 402dd8 RegEnumKeyA 4889->4891 4892 402de1 RegCloseKey 4889->4892 4895 402d3b 6 API calls 4889->4895 4890->4896 4891->4889 4891->4892 4893 406794 5 API calls 4892->4893 4894 402df1 4893->4894 4894->4896 4897 402df5 RegDeleteKeyA 4894->4897 4895->4889 4896->4882 4897->4896 4898 4027aa 4899 402c39 17 API calls 4898->4899 4900 4027b1 FindFirstFileA 4899->4900 4901 4027d4 4900->4901 4902 4027c4 4900->4902 4903 4027db 4901->4903 4906 4062e6 wsprintfA 4901->4906 4907 406388 lstrcpynA 4903->4907 4906->4903 4907->4902 4908 403b2c 4909 403b37 4908->4909 4910 403b3b 4909->4910 4911 403b3e GlobalAlloc 4909->4911 4911->4910 4912 401c2e 4913 402c17 17 API calls 4912->4913 4914 401c35 4913->4914 4915 402c17 17 API calls 4914->4915 4916 401c42 4915->4916 4917 402c39 17 API calls 4916->4917 4918 401c57 4916->4918 4917->4918 4919 401c67 4918->4919 4920 402c39 17 API calls 4918->4920 4921 401c72 4919->4921 4922 401cbe 4919->4922 4920->4919 4924 402c17 17 API calls 4921->4924 4923 402c39 17 API calls 4922->4923 4925 401cc3 4923->4925 4926 401c77 4924->4926 4927 402c39 17 API calls 4925->4927 4928 402c17 17 API calls 4926->4928 4929 401ccc FindWindowExA 4927->4929 4930 401c83 4928->4930 4933 401cea 4929->4933 4931 401c90 SendMessageTimeoutA 4930->4931 4932 401cae SendMessageA 4930->4932 4931->4933 4932->4933 4934 40262e 4935 402633 4934->4935 4936 402647 4934->4936 4937 402c17 17 API calls 4935->4937 4938 402c39 17 API calls 4936->4938 4940 40263c 4937->4940 4939 40264e lstrlenA 4938->4939 4939->4940 4941 402670 4940->4941 4942 405fc2 WriteFile 4940->4942 4942->4941 3840 401932 3841 401934 3840->3841 3842 402c39 17 API calls 3841->3842 3843 401939 3842->3843 3846 405b4a 3843->3846 3847 405e08 18 API calls 3846->3847 3848 405b6a 3847->3848 3849 405b72 DeleteFileA 3848->3849 3850 405b89 3848->3850 3879 401942 3849->3879 3851 405cb7 3850->3851 3883 406388 lstrcpynA 3850->3883 3856 4066ff 2 API calls 3851->3856 3851->3879 3853 405baf 3854 405bc2 3853->3854 3855 405bb5 lstrcatA 3853->3855 3858 405d61 2 API calls 3854->3858 3857 405bc8 3855->3857 3859 405cdb 3856->3859 3860 405bd6 lstrcatA 3857->3860 3861 405be1 lstrlenA FindFirstFileA 3857->3861 3858->3857 3862 405d1a 3 API calls 3859->3862 3859->3879 3860->3861 3861->3851 3870 405c05 3861->3870 3864 405ce5 3862->3864 3863 405d45 CharNextA 3863->3870 3865 405b02 5 API calls 3864->3865 3866 405cf1 3865->3866 3867 405cf5 3866->3867 3868 405d0b 3866->3868 3874 4054a9 24 API calls 3867->3874 3867->3879 3869 4054a9 24 API calls 3868->3869 3869->3879 3870->3863 3871 405c96 FindNextFileA 3870->3871 3878 405b4a 60 API calls 3870->3878 3880 4054a9 24 API calls 3870->3880 3881 4054a9 24 API calls 3870->3881 3882 406161 36 API calls 3870->3882 3884 406388 lstrcpynA 3870->3884 3885 405b02 3870->3885 3871->3870 3873 405cae FindClose 3871->3873 3873->3851 3875 405d02 3874->3875 3876 406161 36 API calls 3875->3876 3876->3879 3878->3870 3880->3871 3881->3870 3882->3870 3883->3853 3884->3870 3893 405ef6 GetFileAttributesA 3885->3893 3888 405b2f 3888->3870 3889 405b25 DeleteFileA 3891 405b2b 3889->3891 3890 405b1d RemoveDirectoryA 3890->3891 3891->3888 3892 405b3b SetFileAttributesA 3891->3892 3892->3888 3894 405b0e 3893->3894 3895 405f08 SetFileAttributesA 3893->3895 3894->3888 3894->3889 3894->3890 3895->3894 4943 402733 4944 40273a 4943->4944 4946 402a47 4943->4946 4945 402c17 17 API calls 4944->4945 4947 402741 4945->4947 4948 402750 SetFilePointer 4947->4948 4948->4946 4949 402760 4948->4949 4951 4062e6 wsprintfA 4949->4951 4951->4946 4952 401e35 GetDC 4953 402c17 17 API calls 4952->4953 4954 401e47 GetDeviceCaps MulDiv ReleaseDC 4953->4954 4955 402c17 17 API calls 4954->4955 4956 401e78 4955->4956 4957 40641b 17 API calls 4956->4957 4958 401eb5 CreateFontIndirectA 4957->4958 4959 402628 4958->4959 4960 4014b7 4961 4014bd 4960->4961 4962 401389 2 API calls 4961->4962 4963 4014c5 4962->4963 3958 4015bb 3959 402c39 17 API calls 3958->3959 3960 4015c2 3959->3960 3961 405db3 4 API calls 3960->3961 3971 4015ca 3961->3971 3962 401624 3964 401652 3962->3964 3965 401629 3962->3965 3963 405d45 CharNextA 3963->3971 3967 401423 24 API calls 3964->3967 3966 401423 24 API calls 3965->3966 3968 401630 3966->3968 3974 40164a 3967->3974 3978 406388 lstrcpynA 3968->3978 3969 4059ec 2 API calls 3969->3971 3971->3962 3971->3963 3971->3969 3972 405a09 5 API calls 3971->3972 3975 40160c GetFileAttributesA 3971->3975 3977 4015f3 3971->3977 3972->3971 3973 40163b SetCurrentDirectoryA 3973->3974 3975->3971 3976 40596f 4 API calls 3976->3977 3977->3971 3977->3976 3978->3973 4964 40453b lstrcpynA lstrlenA 4965 4016bb 4966 402c39 17 API calls 4965->4966 4967 4016c1 GetFullPathNameA 4966->4967 4968 4016d8 4967->4968 4974 4016f9 4967->4974 4971 4066ff 2 API calls 4968->4971 4968->4974 4969 402ac5 4970 40170d GetShortPathNameA 4970->4969 4972 4016e9 4971->4972 4972->4974 4975 406388 lstrcpynA 4972->4975 4974->4969 4974->4970 4975->4974

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4034cc-40351c SetErrorMode GetVersionExA 1 40355d 0->1 2 40351e-403538 GetVersionExA 0->2 3 403564 1->3 2->3 4 40353a-403559 2->4 5 403566-403571 3->5 6 403588-40358f 3->6 4->1 7 403573-403582 5->7 8 403584 5->8 9 403591 6->9 10 403599-4035d9 6->10 7->6 8->6 9->10 11 4035db-4035e3 call 406794 10->11 12 4035ec 10->12 11->12 18 4035e5 11->18 14 4035f1-403605 call 406726 lstrlenA 12->14 19 403607-403623 call 406794 * 3 14->19 18->12 26 403634-403694 #17 OleInitialize SHGetFileInfoA call 406388 GetCommandLineA call 406388 19->26 27 403625-40362b 19->27 34 403696-40369a 26->34 35 40369f-4036b2 call 405d45 CharNextA 26->35 27->26 32 40362d 27->32 32->26 34->35 38 403773-403777 35->38 39 4036b7-4036ba 38->39 40 40377d 38->40 41 4036c2-4036c9 39->41 42 4036bc-4036c0 39->42 43 403791-4037ab GetTempPathA call 40349b 40->43 44 4036d0-4036d3 41->44 45 4036cb-4036cc 41->45 42->41 42->42 53 403803-40381b DeleteFileA call 402f5c 43->53 54 4037ad-4037cb GetWindowsDirectoryA lstrcatA call 40349b 43->54 47 403764-403770 call 405d45 44->47 48 4036d9-4036dd 44->48 45->44 47->38 66 403772 47->66 51 4036f5-403722 48->51 52 4036df-4036e5 48->52 55 403734-403762 51->55 56 403724-40372a 51->56 60 4036e7-4036e9 52->60 61 4036eb 52->61 69 403821-403827 53->69 70 4038ae-4038bf ExitProcess OleUninitialize 53->70 54->53 68 4037cd-4037fd GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40349b 54->68 55->47 65 40377f-40378c call 406388 55->65 62 403730 56->62 63 40372c-40372e 56->63 60->51 60->61 61->51 62->55 63->55 63->62 65->43 66->38 68->53 68->70 73 403829-403834 call 405d45 69->73 74 40389f-4038a6 call 403b6e 69->74 75 4038c5-4038d4 call 405a9e ExitProcess 70->75 76 4039e8-4039ee 70->76 91 403836-40385f 73->91 92 40386a-403873 73->92 85 4038ab 74->85 77 4039f0-403a05 GetCurrentProcess OpenProcessToken 76->77 78 403a66-403a6e 76->78 83 403a36-403a44 call 406794 77->83 84 403a07-403a30 LookupPrivilegeValueA AdjustTokenPrivileges 77->84 87 403a70 78->87 88 403a73-403a76 ExitProcess 78->88 99 403a52-403a5d ExitWindowsEx 83->99 100 403a46-403a50 83->100 84->83 85->70 87->88 96 403861-403863 91->96 93 403875-403883 call 405e08 92->93 94 4038da-4038ee call 405a09 lstrcatA 92->94 93->70 107 403885-40389b call 406388 * 2 93->107 105 4038f0-4038f6 lstrcatA 94->105 106 4038fb-403915 lstrcatA lstrcmpiA 94->106 96->92 101 403865-403868 96->101 99->78 104 403a5f-403a61 call 40140b 99->104 100->99 100->104 101->92 101->96 104->78 105->106 106->70 110 403917-40391a 106->110 107->74 112 403923 call 4059ec 110->112 113 40391c-403921 call 40596f 110->113 120 403928-403936 SetCurrentDirectoryA 112->120 113->120 121 403943-40396e call 406388 120->121 122 403938-40393e call 406388 120->122 126 403974-403991 call 40641b DeleteFileA 121->126 122->121 129 4039d1-4039da 126->129 130 403993-4039a3 CopyFileA 126->130 129->126 132 4039dc-4039e3 call 406161 129->132 130->129 131 4039a5-4039c5 call 406161 call 40641b call 405a21 130->131 131->129 141 4039c7-4039ce CloseHandle 131->141 132->70 141->129
                    APIs
                    • SetErrorMode.KERNEL32(00008001), ref: 004034EF
                    • GetVersionExA.KERNEL32(?), ref: 00403518
                    • GetVersionExA.KERNEL32(0000009C), ref: 0040352F
                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F8
                    • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403635
                    • OleInitialize.OLE32(00000000), ref: 0040363C
                    • SHGetFileInfoA.SHELL32(0041FD10,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 0040365A
                    • GetCommandLineA.KERNEL32(00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 0040366F
                    • CharNextA.USER32(00000000,C:\Users\user\AppData\Local\Temp\45DE.exe,00000020,C:\Users\user\AppData\Local\Temp\45DE.exe,00000000,?,00000007,00000009,0000000B), ref: 004036A9
                    • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 004037A2
                    • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004037B3
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037BF
                    • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037D3
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037DB
                    • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037EC
                    • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004037F4
                    • DeleteFileA.KERNEL32(1033,?,00000007,00000009,0000000B), ref: 00403808
                    • ExitProcess.KERNEL32(?,?,00000007,00000009,0000000B), ref: 004038AE
                    • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 004038B3
                    • ExitProcess.KERNEL32 ref: 004038D4
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\45DE.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038E7
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A1B0,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\45DE.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038F6
                    • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\45DE.exe,00000000,?,?,00000007,00000009,0000000B), ref: 00403901
                    • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp), ref: 0040390D
                    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403929
                    • DeleteFileA.KERNEL32(0041F910,0041F910,?,00425000,?,?,00000007,00000009,0000000B), ref: 00403986
                    • CopyFileA.KERNEL32 ref: 0040399B
                    • CloseHandle.KERNEL32(00000000,0041F910,0041F910,?,0041F910,00000000,?,00000007,00000009,0000000B), ref: 004039C8
                    • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004039F6
                    • OpenProcessToken.ADVAPI32 ref: 004039FD
                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A11
                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403A30
                    • ExitWindowsEx.USER32 ref: 00403A55
                    • ExitProcess.KERNEL32 ref: 00403A76
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Processlstrcat$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                    • String ID: "$.tmp$1033$A$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\45DE.exe$C:\Users\user\AppData\Local\Temp\45DE.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Users\user\AppData\Roaming\GamePall\update$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                    • API String ID: 2882342585-4289831836
                    • Opcode ID: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                    • Instruction ID: 1a4863036e4e50ed5e1acae1e6299f6db15da00d6e87979e5214c03ba8a99dba
                    • Opcode Fuzzy Hash: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                    • Instruction Fuzzy Hash: 99E1D270A04354AADB21AF659D49B6F7EB89F86306F0540BFF441B61D2CB7C4A05CB2E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 216 100010d0-100010fa GetVersionExA 217 10001106-1000110c 216->217 218 100010fc-10001101 216->218 219 10001122-10001139 LoadLibraryW 217->219 220 1000110e-10001112 217->220 221 1000135d-10001362 218->221 224 100011a5 219->224 225 1000113b-1000114c GetProcAddress 219->225 222 10001225-10001237 LoadLibraryA 220->222 223 10001118-1000111d 220->223 229 10001332-10001337 222->229 230 1000123d-10001265 GetProcAddress * 3 222->230 226 1000135b-1000135c 223->226 231 100011aa-100011ae 224->231 227 10001195 225->227 228 1000114e-1000115a LocalAlloc 225->228 226->221 233 1000119a-100011a3 FreeLibrary 227->233 232 10001189-1000118c 228->232 229->226 234 10001323-10001326 FreeLibrary 230->234 235 1000126b-1000126d 230->235 236 100011b0-100011b2 231->236 237 100011b7 231->237 240 1000115c-1000116d NtQuerySystemInformation 232->240 241 1000118e-10001193 232->241 233->231 239 1000132c-10001330 234->239 235->234 242 10001273-10001275 235->242 236->226 238 100011ba-100011bf 237->238 243 100011c1-100011ec WideCharToMultiByte lstrcmpiA 238->243 244 1000120d-10001211 238->244 239->229 245 10001339-1000133d 239->245 240->233 246 1000116f-1000117e LocalFree 240->246 241->233 242->234 247 1000127b-10001286 242->247 243->244 248 100011ee-100011f5 243->248 251 10001213-10001215 244->251 252 10001217-10001220 LocalFree 244->252 249 10001359 245->249 250 1000133f-10001343 245->250 246->241 253 10001180-10001187 LocalAlloc 246->253 247->234 258 1000128c-100012a0 247->258 248->252 254 100011f7-1000120a call 1000103f 248->254 249->226 255 10001345-1000134a 250->255 256 1000134c-10001350 250->256 251->238 252->239 253->232 254->244 255->226 256->249 260 10001352-10001357 256->260 263 10001318-1000131a 258->263 260->226 264 100012a2-100012b6 lstrlenA 263->264 265 1000131c-1000131d CloseHandle 263->265 266 100012bd-100012c2 264->266 265->234 267 100012c4-100012ea lstrcpynA lstrcmpiA 266->267 268 100012b8-100012ba 266->268 270 100012ec-100012f3 267->270 271 1000130e-10001315 267->271 268->267 269 100012bc 268->269 269->266 270->265 272 100012f5-1000130b call 1000103f 270->272 271->263 272->271
                    APIs
                    • GetVersionExA.KERNEL32(?), ref: 100010F2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3973835454.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 0000000A.00000002.3973795784.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973910220.0000000010002000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973963382.0000000010004000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_10000000_45DE.jbxd
                    Similarity
                    • API ID: Version
                    • String ID: CreateToolhelp32Snapshot$KERNEL32.DLL$NTDLL.DLL$NtQuerySystemInformation$Process32First$Process32Next
                    • API String ID: 1889659487-877962304
                    • Opcode ID: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                    • Instruction ID: 3df706415bff85d1043f51983ae3f68c733976b3404a17f8fb4488dcc6387507
                    • Opcode Fuzzy Hash: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                    • Instruction Fuzzy Hash: 19715871900659EFFB11DFA4CC88ADE3BEAEB483C4F250026FA19D2159E6358E49CB50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 446 405b4a-405b70 call 405e08 449 405b72-405b84 DeleteFileA 446->449 450 405b89-405b90 446->450 451 405d13-405d17 449->451 452 405b92-405b94 450->452 453 405ba3-405bb3 call 406388 450->453 454 405cc1-405cc6 452->454 455 405b9a-405b9d 452->455 461 405bc2-405bc3 call 405d61 453->461 462 405bb5-405bc0 lstrcatA 453->462 454->451 457 405cc8-405ccb 454->457 455->453 455->454 459 405cd5-405cdd call 4066ff 457->459 460 405ccd-405cd3 457->460 459->451 470 405cdf-405cf3 call 405d1a call 405b02 459->470 460->451 464 405bc8-405bcb 461->464 462->464 467 405bd6-405bdc lstrcatA 464->467 468 405bcd-405bd4 464->468 469 405be1-405bff lstrlenA FindFirstFileA 467->469 468->467 468->469 471 405c05-405c1c call 405d45 469->471 472 405cb7-405cbb 469->472 485 405cf5-405cf8 470->485 486 405d0b-405d0e call 4054a9 470->486 479 405c27-405c2a 471->479 480 405c1e-405c22 471->480 472->454 474 405cbd 472->474 474->454 483 405c2c-405c31 479->483 484 405c3d-405c4b call 406388 479->484 480->479 482 405c24 480->482 482->479 488 405c33-405c35 483->488 489 405c96-405ca8 FindNextFileA 483->489 497 405c62-405c6d call 405b02 484->497 498 405c4d-405c55 484->498 485->460 491 405cfa-405d09 call 4054a9 call 406161 485->491 486->451 488->484 492 405c37-405c3b 488->492 489->471 494 405cae-405cb1 FindClose 489->494 491->451 492->484 492->489 494->472 506 405c8e-405c91 call 4054a9 497->506 507 405c6f-405c72 497->507 498->489 501 405c57-405c60 call 405b4a 498->501 501->489 506->489 508 405c74-405c84 call 4054a9 call 406161 507->508 509 405c86-405c8c 507->509 508->489 509->489
                    APIs
                    • DeleteFileA.KERNEL32(?,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405B73
                    • lstrcatA.KERNEL32(00421D58,\*.*,00421D58,?,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405BBB
                    • lstrcatA.KERNEL32(?,0040A014,?,00421D58,?,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405BDC
                    • lstrlenA.KERNEL32(?,?,0040A014,?,00421D58,?,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405BE2
                    • FindFirstFileA.KERNEL32(00421D58,?,?,?,0040A014,?,00421D58,?,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405BF3
                    • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405CA0
                    • FindClose.KERNEL32(00000000), ref: 00405CB1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\45DE.exe$\*.*
                    • API String ID: 2035342205-1405503959
                    • Opcode ID: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                    • Instruction ID: 9e5d3321e74a3647b1fb2cdcf4bec0a51507e3563529971eb59e862f6dba24c5
                    • Opcode Fuzzy Hash: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                    • Instruction Fuzzy Hash: 2B519130908B04AAEB316B61CC49BAF7AB8DF82755F14813FF851B51D2C73C5982DE69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 713 406a88-406a8d 714 406afe-406b1c 713->714 715 406a8f-406abe 713->715 716 4070f4-407109 714->716 717 406ac0-406ac3 715->717 718 406ac5-406ac9 715->718 719 407123-407139 716->719 720 40710b-407121 716->720 721 406ad5-406ad8 717->721 722 406ad1 718->722 723 406acb-406acf 718->723 724 40713c-407143 719->724 720->724 725 406af6-406af9 721->725 726 406ada-406ae3 721->726 722->721 723->721 728 407145-407149 724->728 729 40716a-407176 724->729 727 406ccb-406ce9 725->727 730 406ae5 726->730 731 406ae8-406af4 726->731 732 406d01-406d13 727->732 733 406ceb-406cff 727->733 734 4072f8-407302 728->734 735 40714f-407167 728->735 742 40690c-406915 729->742 730->731 737 406b5e-406b8c 731->737 741 406d16-406d20 732->741 733->741 740 40730e-407321 734->740 735->729 738 406ba8-406bc2 737->738 739 406b8e-406ba6 737->739 743 406bc5-406bcf 738->743 739->743 748 407326-40732a 740->748 746 406d22 741->746 747 406cc3-406cc9 741->747 744 407323 742->744 745 40691b 742->745 750 406bd5 743->750 751 406b46-406b4c 743->751 744->748 752 406922-406926 745->752 753 406a62-406a83 745->753 754 4069c7-4069cb 745->754 755 406a37-406a3b 745->755 756 406e33-406e40 746->756 757 406c9e-406ca2 746->757 747->727 749 406c67-406c71 747->749 758 4072b6-4072c0 749->758 759 406c77-406c99 749->759 771 407292-40729c 750->771 772 406b2b-406b43 750->772 760 406b52-406b58 751->760 761 406bff-406c05 751->761 752->740 768 40692c-406939 752->768 753->716 762 4069d1-4069ea 754->762 763 407277-407281 754->763 769 406a41-406a55 755->769 770 407286-407290 755->770 756->742 767 406e8f-406e9e 756->767 764 406ca8-406cc0 757->764 765 4072aa-4072b4 757->765 758->740 759->756 760->737 773 406c63 760->773 761->773 775 406c07-406c25 761->775 776 4069ed-4069f1 762->776 763->740 764->747 765->740 767->716 768->744 774 40693f-406985 768->774 777 406a58-406a60 769->777 770->740 771->740 772->751 773->749 779 406987-40698b 774->779 780 4069ad-4069af 774->780 781 406c27-406c3b 775->781 782 406c3d-406c4f 775->782 776->754 778 4069f3-4069f9 776->778 777->753 777->755 788 406a23-406a35 778->788 789 4069fb-406a02 778->789 783 406996-4069a4 GlobalAlloc 779->783 784 40698d-406990 GlobalFree 779->784 786 4069b1-4069bb 780->786 787 4069bd-4069c5 780->787 785 406c52-406c5c 781->785 782->785 783->744 790 4069aa 783->790 784->783 785->761 791 406c5e 785->791 786->786 786->787 787->776 788->777 792 406a04-406a07 GlobalFree 789->792 793 406a0d-406a1d GlobalAlloc 789->793 790->780 795 406be4-406bfc 791->795 796 40729e-4072a8 791->796 792->793 793->744 793->788 795->761 796->740
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                    • Instruction ID: c2ee61ea0ab5e5811791f69f03c7ffba3fbd093a674906ee4b434ab4c587e2e9
                    • Opcode Fuzzy Hash: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                    • Instruction Fuzzy Hash: 0FF18A70D04269CBDF28CF98C8946ADBBB0FF44305F24816ED856BB281D7786A86DF45
                    APIs
                    • FindFirstFileA.KERNEL32(76233410,004225A0,C:\,00405E4B,C:\,C:\,00000000,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0), ref: 0040670A
                    • FindClose.KERNEL32(00000000), ref: 00406716
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID: C:\
                    • API String ID: 2295610775-3404278061
                    • Opcode ID: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                    • Instruction ID: 083b1303d1f5dd1ba3b50291930e0491dd498af142a60d7bee4daa0eb941c193
                    • Opcode Fuzzy Hash: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                    • Instruction Fuzzy Hash: B3D01231515120BBC3405B38AE0C95B7E589F093747618A36F066F22E4DB74CC6286AC

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 142 403b6e-403b86 call 406794 145 403b88-403b98 call 4062e6 142->145 146 403b9a-403bcb call 40626f 142->146 155 403bee-403c17 call 403e33 call 405e08 145->155 150 403be3-403be9 lstrcatA 146->150 151 403bcd-403bde call 40626f 146->151 150->155 151->150 160 403c1d-403c22 155->160 161 403c9e-403ca6 call 405e08 155->161 160->161 162 403c24-403c48 call 40626f 160->162 166 403cb4-403cd9 LoadImageA 161->166 167 403ca8-403caf call 40641b 161->167 162->161 169 403c4a-403c4c 162->169 171 403d5a-403d62 call 40140b 166->171 172 403cdb-403d0b RegisterClassA 166->172 167->166 173 403c5d-403c69 lstrlenA 169->173 174 403c4e-403c5b call 405d45 169->174 185 403d64-403d67 171->185 186 403d6c-403d77 call 403e33 171->186 175 403d11-403d55 SystemParametersInfoA CreateWindowExA 172->175 176 403e29 172->176 180 403c91-403c99 call 405d1a call 406388 173->180 181 403c6b-403c79 lstrcmpiA 173->181 174->173 175->171 179 403e2b-403e32 176->179 180->161 181->180 184 403c7b-403c85 GetFileAttributesA 181->184 188 403c87-403c89 184->188 189 403c8b-403c8c call 405d61 184->189 185->179 195 403e00-403e08 call 40557b 186->195 196 403d7d-403d97 ShowWindow call 406726 186->196 188->180 188->189 189->180 203 403e22-403e24 call 40140b 195->203 204 403e0a-403e10 195->204 201 403da3-403db5 GetClassInfoA 196->201 202 403d99-403d9e call 406726 196->202 207 403db7-403dc7 GetClassInfoA RegisterClassA 201->207 208 403dcd-403dfe DialogBoxParamA call 40140b call 403abe 201->208 202->201 203->176 204->185 209 403e16-403e1d call 40140b 204->209 207->208 208->179 209->185
                    APIs
                      • Part of subcall function 00406794: GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                      • Part of subcall function 00406794: GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                    • lstrcatA.KERNEL32(1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,76233410,C:\Users\user\AppData\Local\Temp\,?,C:\Users\user\AppData\Local\Temp\45DE.exe,00000009,0000000B), ref: 00403BE9
                    • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,?,?,C:\Windows\wininit.ini,00000000,C:\Users\user\AppData\Roaming\GamePall,1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,76233410), ref: 00403C5E
                    • lstrcmpiA.KERNEL32(?,.exe), ref: 00403C71
                    • GetFileAttributesA.KERNEL32(C:\Windows\wininit.ini,?,C:\Users\user\AppData\Local\Temp\45DE.exe,00000009,0000000B), ref: 00403C7C
                    • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\GamePall), ref: 00403CC5
                      • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                    • RegisterClassA.USER32(00423EE0), ref: 00403D02
                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403D1A
                    • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403D4F
                    • ShowWindow.USER32(00000005,00000000,?,C:\Users\user\AppData\Local\Temp\45DE.exe,00000009,0000000B), ref: 00403D85
                    • GetClassInfoA.USER32(00000000,RichEdit20A,00423EE0), ref: 00403DB1
                    • GetClassInfoA.USER32(00000000,RichEdit,00423EE0), ref: 00403DBE
                    • RegisterClassA.USER32(00423EE0), ref: 00403DC7
                    • DialogBoxParamA.USER32(?,00000000,00403F0B,00000000), ref: 00403DE6
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                    • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\45DE.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$Control Panel\Desktop\ResourceLocale$PB$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$>B
                    • API String ID: 1975747703-760376780
                    • Opcode ID: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                    • Instruction ID: 5836c5bb6a6ef8c4ff0aed12ec42ff3eebf2d58129c507535c8ab2622d1094a3
                    • Opcode Fuzzy Hash: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                    • Instruction Fuzzy Hash: 4F61D670204200AED620AF65AD45F3B3A7CEB8574AF41453FF951B62E2CB7D9D028B6D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 275 402f5c-402faa GetTickCount GetModuleFileNameA call 405f1b 278 402fb6-402fe4 call 406388 call 405d61 call 406388 GetFileSize 275->278 279 402fac-402fb1 275->279 287 402fea 278->287 288 4030cf-4030dd call 402ebd 278->288 280 4031f6-4031fa 279->280 290 402fef-403006 287->290 295 4030e3-4030e6 288->295 296 4031ae-4031b3 288->296 292 403008 290->292 293 40300a-403013 call 40346e 290->293 292->293 300 403019-403020 293->300 301 40316a-403172 call 402ebd 293->301 298 403112-40315e GlobalAlloc call 4068b9 call 405f4a CreateFileA 295->298 299 4030e8-403100 call 403484 call 40346e 295->299 296->280 326 403160-403165 298->326 327 403174-4031a4 call 403484 call 4031fd 298->327 299->296 321 403106-40310c 299->321 305 403022-403036 call 405ed6 300->305 306 40309c-4030a0 300->306 301->296 311 4030aa-4030b0 305->311 324 403038-40303f 305->324 310 4030a2-4030a9 call 402ebd 306->310 306->311 310->311 317 4030b2-4030bc call 40684b 311->317 318 4030bf-4030c7 311->318 317->318 318->290 325 4030cd 318->325 321->296 321->298 324->311 329 403041-403048 324->329 325->288 326->280 335 4031a9-4031ac 327->335 329->311 331 40304a-403051 329->331 331->311 334 403053-40305a 331->334 334->311 336 40305c-40307c 334->336 335->296 337 4031b5-4031c6 335->337 336->296 338 403082-403086 336->338 339 4031c8 337->339 340 4031ce-4031d3 337->340 341 403088-40308c 338->341 342 40308e-403096 338->342 339->340 343 4031d4-4031da 340->343 341->325 341->342 342->311 344 403098-40309a 342->344 343->343 345 4031dc-4031f4 call 405ed6 343->345 344->311 345->280
                    APIs
                    • GetTickCount.KERNEL32 ref: 00402F70
                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\45DE.exe,00000400), ref: 00402F8C
                      • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00405F1F
                      • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\45DE.exe,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00402FD5
                    • GlobalAlloc.KERNEL32(00000040,00000009), ref: 00403117
                    Strings
                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403160
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F66, 0040312F
                    • Inst, xrefs: 00403041
                    • C:\Users\user\AppData\Local\Temp\45DE.exe, xrefs: 00402F76, 00402F85, 00402F99, 00402FB6
                    • soft, xrefs: 0040304A
                    • Error launching installer, xrefs: 00402FAC
                    • Null, xrefs: 00403053
                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 004031AE
                    • C:\Users\user\AppData\Local\Temp, xrefs: 00402FB7, 00402FBC, 00402FC2
                    • C:\Users\user\AppData\Local\Temp\45DE.exe, xrefs: 00402F65
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                    • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\45DE.exe$C:\Users\user\AppData\Local\Temp\45DE.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                    • API String ID: 2803837635-2606226891
                    • Opcode ID: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                    • Instruction ID: 8a05da1d373fd2b3e089436e62a275652004ed3b6aa6cfe031be989f12afac8e
                    • Opcode Fuzzy Hash: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                    • Instruction Fuzzy Hash: 0771E231A01218ABDB20EF65DD85B9E7BACEB44356F10813BF910BA2C1D77C9E458B5C

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 348 405ff1-406015 349 406017-40602f call 405f1b CloseHandle GetShortPathNameA 348->349 350 40603d-40604c GetShortPathNameA 348->350 353 40615c-406160 349->353 357 406035-406037 349->357 352 406052-406054 350->352 350->353 352->353 355 40605a-406098 wsprintfA call 40641b call 405f1b 352->355 355->353 361 40609e-4060ba GetFileSize GlobalAlloc 355->361 357->350 357->353 362 4060c0-4060ca call 405f93 361->362 363 406155-406156 CloseHandle 361->363 362->363 366 4060d0-4060dd call 405e80 362->366 363->353 369 4060f3-406105 call 405e80 366->369 370 4060df-4060f1 lstrcpyA 366->370 376 406124 369->376 377 406107-40610d 369->377 371 406128 370->371 373 40612a-40614f call 405ed6 SetFilePointer call 405fc2 GlobalFree 371->373 373->363 376->371 378 406115-406117 377->378 380 406119-406122 378->380 381 40610f-406114 378->381 380->373 381->378
                    APIs
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                    • GetShortPathNameA.KERNEL32 ref: 0040602B
                      • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                      • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                    • GetShortPathNameA.KERNEL32 ref: 00406048
                    • wsprintfA.USER32 ref: 00406066
                    • GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                    • SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                    • GlobalFree.KERNEL32(00000000), ref: 0040614F
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406156
                      • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00405F1F
                      • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                    • String ID: %s=%s$C:\Windows\wininit.ini$NUL$NUL=C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\$[Rename]
                    • API String ID: 2171350718-3701067152
                    • Opcode ID: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                    • Instruction ID: 7566a5a9e9d08134d14435fb5d3e1561ad96112206bac95af022f508aac3f812
                    • Opcode Fuzzy Hash: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                    • Instruction Fuzzy Hash: 68310531200715BBC2207B659D49F6B3A5DDF85754F15003EFE42BA2C3EA7CD8228AAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 384 40641b-406426 385 406428-406437 384->385 386 406439-40644f 384->386 385->386 387 406643-406647 386->387 388 406455-406460 386->388 390 406472-40647c 387->390 391 40664d-406657 387->391 388->387 389 406466-40646d 388->389 389->387 390->391 392 406482-406489 390->392 393 406662-406663 391->393 394 406659-40665d call 406388 391->394 395 406636 392->395 396 40648f-4064c3 392->396 394->393 398 406640-406642 395->398 399 406638-40663e 395->399 400 4065e3-4065e6 396->400 401 4064c9-4064d3 396->401 398->387 399->387 404 406616-406619 400->404 405 4065e8-4065eb 400->405 402 4064f0 401->402 403 4064d5-4064de 401->403 411 4064f7-4064fe 402->411 403->402 408 4064e0-4064e3 403->408 406 406627-406634 lstrlenA 404->406 407 40661b-406622 call 40641b 404->407 409 4065fb-406607 call 406388 405->409 410 4065ed-4065f9 call 4062e6 405->410 406->387 407->406 408->402 413 4064e5-4064e8 408->413 422 40660c-406612 409->422 410->422 415 406500-406502 411->415 416 406503-406505 411->416 413->402 418 4064ea-4064ee 413->418 415->416 420 406507-40652a call 40626f 416->420 421 40653e-406541 416->421 418->411 432 406530-406539 call 40641b 420->432 433 4065ca-4065ce 420->433 425 406551-406554 421->425 426 406543-40654f GetSystemDirectoryA 421->426 422->406 424 406614 422->424 428 4065db-4065e1 call 406666 424->428 430 4065c1-4065c3 425->430 431 406556-406564 GetWindowsDirectoryA 425->431 429 4065c5-4065c8 426->429 428->406 429->428 429->433 430->429 434 406566-406570 430->434 431->430 432->429 433->428 437 4065d0-4065d6 lstrcatA 433->437 439 406572-406575 434->439 440 40658a-4065a0 SHGetSpecialFolderLocation 434->440 437->428 439->440 442 406577-40657e 439->442 443 4065a2-4065bc SHGetPathFromIDListA CoTaskMemFree 440->443 444 4065be 440->444 445 406586-406588 442->445 443->429 443->444 444->430 445->429 445->440
                    APIs
                    • GetSystemDirectoryA.KERNEL32 ref: 00406549
                    • GetWindowsDirectoryA.KERNEL32(C:\Windows\wininit.ini,00000400,?,00420530,00000000,004054E1,00420530,00000000), ref: 0040655C
                    • SHGetSpecialFolderLocation.SHELL32(004054E1,00000000,?,00420530,00000000,004054E1,00420530,00000000), ref: 00406598
                    • SHGetPathFromIDListA.SHELL32(00000000,C:\Windows\wininit.ini), ref: 004065A6
                    • CoTaskMemFree.OLE32(00000000), ref: 004065B2
                    • lstrcatA.KERNEL32(C:\Windows\wininit.ini,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D6
                    • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,00420530,00000000,004054E1,00420530,00000000,00000000,00000000,00000000), ref: 00406628
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                    • String ID: C:\Windows\wininit.ini$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                    • API String ID: 717251189-1428620962
                    • Opcode ID: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                    • Instruction ID: f38e20b3a3e0c1a2470d5ac0c6d90f06be75126661b475aa23e0086d5b044b98
                    • Opcode Fuzzy Hash: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                    • Instruction Fuzzy Hash: 9F612370900114AEDF205F24EC90BBA3BA4EB52314F52403FE913B62D1D37D8A62DB4E

                    Control-flow Graph

                    APIs
                    • lstrcatA.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 00401798
                    • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Local\Temp\setup.exe,00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 004017C2
                      • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405565
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                    • String ID: C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\INetC.dll$C:\Users\user\AppData\Local\Temp\setup.exe$C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 1941528284-3987043384
                    • Opcode ID: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                    • Instruction ID: 0d76be79c55a0237b493b10f9ec5be6125ba7ce9be49b25e4c886387d44134cc
                    • Opcode Fuzzy Hash: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                    • Instruction Fuzzy Hash: E141B731900615BBCB107BB5CC45DAF3668EF45329B61833BF422F10E1D67C8A529AAE

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 582 406726-406746 GetSystemDirectoryA 583 406748 582->583 584 40674a-40674c 582->584 583->584 585 40675c-40675e 584->585 586 40674e-406756 584->586 588 40675f-406791 wsprintfA LoadLibraryExA 585->588 586->585 587 406758-40675a 586->587 587->588
                    APIs
                    • GetSystemDirectoryA.KERNEL32 ref: 0040673D
                    • wsprintfA.USER32 ref: 00406776
                    • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: DirectoryLibraryLoadSystemwsprintf
                    • String ID: %s%s.dll$UXTHEME$\
                    • API String ID: 2200240437-4240819195
                    • Opcode ID: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                    • Instruction ID: 0c3db372634d2cfba6f48721b0c795b31ebca02323a8b7d7371d162bf0ec7b9a
                    • Opcode Fuzzy Hash: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                    • Instruction Fuzzy Hash: FBF0FC7050021966DB15A764DD0DFEA365CAB08309F1404BEA586E20C1D6B8D5258B69

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 589 4068d9-4068fc 590 406906-406909 589->590 591 4068fe-406901 589->591 593 40690c-406915 590->593 592 407326-40732a 591->592 594 407323 593->594 595 40691b 593->595 594->592 596 406922-406926 595->596 597 406a62-407109 595->597 598 4069c7-4069cb 595->598 599 406a37-406a3b 595->599 603 40692c-406939 596->603 604 40730e-407321 596->604 608 407123-407139 597->608 609 40710b-407121 597->609 601 4069d1-4069ea 598->601 602 407277-407281 598->602 605 406a41-406a55 599->605 606 407286-407290 599->606 607 4069ed-4069f1 601->607 602->604 603->594 610 40693f-406985 603->610 604->592 611 406a58-406a60 605->611 606->604 607->598 613 4069f3-4069f9 607->613 612 40713c-407143 608->612 609->612 614 406987-40698b 610->614 615 4069ad-4069af 610->615 611->597 611->599 620 407145-407149 612->620 621 40716a-407176 612->621 618 406a23-406a35 613->618 619 4069fb-406a02 613->619 622 406996-4069a4 GlobalAlloc 614->622 623 40698d-406990 GlobalFree 614->623 616 4069b1-4069bb 615->616 617 4069bd-4069c5 615->617 616->616 616->617 617->607 618->611 625 406a04-406a07 GlobalFree 619->625 626 406a0d-406a1d GlobalAlloc 619->626 627 4072f8-407302 620->627 628 40714f-407167 620->628 621->593 622->594 624 4069aa 622->624 623->622 624->615 625->626 626->594 626->618 627->604 628->621
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 004068E3
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 0-292220189
                    • Opcode ID: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                    • Instruction ID: 8182d74baebb800b0d472bca2432a1a472ea96a2662ae7b36db949844af6c4d7
                    • Opcode Fuzzy Hash: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                    • Instruction Fuzzy Hash: DF815971E04228DBEF24CFA8C844BADBBB1FF44305F10816AD956BB281C7786986DF45

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 630 403305-40332d GetTickCount 631 403333-40335e call 403484 SetFilePointer 630->631 632 40345d-403465 call 402ebd 630->632 638 403363-403375 631->638 637 403467-40346b 632->637 639 403377 638->639 640 403379-403387 call 40346e 638->640 639->640 643 40338d-403399 640->643 644 40344f-403452 640->644 645 40339f-4033a5 643->645 644->637 646 4033d0-4033ec call 4068d9 645->646 647 4033a7-4033ad 645->647 653 403458 646->653 654 4033ee-4033f6 646->654 647->646 648 4033af-4033cf call 402ebd 647->648 648->646 655 40345a-40345b 653->655 656 4033f8-403400 call 405fc2 654->656 657 403419-40341f 654->657 655->637 661 403405-403407 656->661 657->653 659 403421-403423 657->659 659->653 660 403425-403438 659->660 660->638 662 40343e-40344d SetFilePointer 660->662 663 403454-403456 661->663 664 403409-403415 661->664 662->632 663->655 664->645 665 403417 664->665 665->660
                    APIs
                    • GetTickCount.KERNEL32 ref: 00403319
                      • Part of subcall function 00403484: SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                    • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 0040334C
                    • SetFilePointer.KERNEL32(?,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000), ref: 00403447
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403379, 0040337F
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FilePointer$CountTick
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 1092082344-292220189
                    • Opcode ID: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                    • Instruction ID: 5f41a1ef9683aad456499e8308d87ccfcfa217f8aa92108fcff4f05b83e24891
                    • Opcode Fuzzy Hash: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                    • Instruction Fuzzy Hash: 1F319F72A002059FC711BF2AFE849663BACE741356710C13BE814B62F0CB3859458FAD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 666 405f4a-405f54 667 405f55-405f80 GetTickCount GetTempFileNameA 666->667 668 405f82-405f84 667->668 669 405f8f-405f91 667->669 668->667 671 405f86 668->671 670 405f89-405f8c 669->670 671->670
                    APIs
                    • GetTickCount.KERNEL32 ref: 00405F5E
                    • GetTempFileNameA.KERNEL32(0000000B,?,00000000,?,?,004034CA,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007), ref: 00405F78
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CountFileNameTempTick
                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                    • API String ID: 1716503409-1857211195
                    • Opcode ID: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                    • Instruction ID: 05c77450f8afc2c62a5a11a921c51d956a1ea51751b09822177720344b0c8500
                    • Opcode Fuzzy Hash: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                    • Instruction Fuzzy Hash: 02F082363042087BDB109F55DD44BAB7B9CDF91750F14C03BFE48DA180D6B4D9988798

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 672 4020a5-4020b1 673 4020b7-4020cd call 402c39 * 2 672->673 674 40216c-40216e 672->674 684 4020dc-4020ea LoadLibraryExA 673->684 685 4020cf-4020da GetModuleHandleA 673->685 676 4022e5-4022ea call 401423 674->676 681 402ac5-402ad4 676->681 687 4020ec-4020f9 GetProcAddress 684->687 688 402165-402167 684->688 685->684 685->687 689 402138-40213d call 4054a9 687->689 690 4020fb-402101 687->690 688->676 694 402142-402145 689->694 692 402103-40210f call 401423 690->692 693 40211a-402136 690->693 692->694 703 402111-402118 692->703 693->694 694->681 697 40214b-402153 call 403b0e 694->697 697->681 702 402159-402160 FreeLibrary 697->702 702->681 703->694
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 004020D0
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405565
                    • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004020E0
                    • GetProcAddress.KERNEL32(00000000,?), ref: 004020F0
                    • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040215A
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                    • String ID:
                    • API String ID: 2987980305-0
                    • Opcode ID: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                    • Instruction ID: efc1da79dccaef9ffb2761d2644f5cd4432d5c2edc08e83b6cf0327c91c21bf2
                    • Opcode Fuzzy Hash: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                    • Instruction Fuzzy Hash: 2B210832904214E7CF207FA58E4DAAE3A60AF44358F60413FF601B61E0DBBD49819A6E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 704 403a7c-403a8b 705 403a97-403a9f 704->705 706 403a8d-403a90 CloseHandle 704->706 707 403aa1-403aa4 CloseHandle 705->707 708 403aab-403ab7 call 403ad9 call 405b4a 705->708 706->705 707->708 712 403abc-403abd 708->712
                    APIs
                    • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403A8E
                    • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403AA2
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A81
                    • C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\, xrefs: 00403AB2
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\
                    • API String ID: 2962429428-314030296
                    • Opcode ID: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                    • Instruction ID: f2bf129958ed6937e4157d035670f95a6da1e01cb45a681b65e96f9405f647bf
                    • Opcode Fuzzy Hash: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                    • Instruction Fuzzy Hash: F4E08631640B1896C130EF7CAD4D8853B189B413357204726F1B9F20F0C738A9574EE9
                    APIs
                    • SetFilePointer.KERNEL32(00000009,00000000,00000000,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 00403222
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403277, 0040328E, 004032A4
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 973152223-292220189
                    • Opcode ID: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                    • Instruction ID: 301e065564a74905a78554ad982773151ad037ba2d6e6f8d8cd401a7b941de18
                    • Opcode Fuzzy Hash: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                    • Instruction Fuzzy Hash: E2318D30200219FFDB109F95ED45A9A3FA8EB05755B20847EB914E61D0D738DB509FA9
                    APIs
                      • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405DC1
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                    • GetFileAttributesA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                      • Part of subcall function 0040596F: CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                    • SetCurrentDirectoryA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,000000F0), ref: 0040163C
                    Strings
                    • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00401631
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                    • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 1892508949-1348220699
                    • Opcode ID: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                    • Instruction ID: f3b3600b6319d637c5497ea1020ed17c5aedac6227b62b2eaa768bc98e31f113
                    • Opcode Fuzzy Hash: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                    • Instruction Fuzzy Hash: 09115731508140EBCF306FA54D405BF23B09E96324B28453FF8D1B22E2DA3D0C42AA3E
                    APIs
                      • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                      • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405DC1
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                      • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                    • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405E5B
                    • GetFileAttributesA.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0), ref: 00405E6B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                    • String ID: C:\
                    • API String ID: 3248276644-3404278061
                    • Opcode ID: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                    • Instruction ID: eca821d8ca18e415d707ee210574ba5bb9731226a542ad11e9256983d04766a4
                    • Opcode Fuzzy Hash: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                    • Instruction Fuzzy Hash: F7F02831105D5116C6223336AD09AAF1644CE9732471A453FFCE1B52D2DB3C8A539CEE
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                    • Instruction ID: 14484b0326c8a5630d33184448731c7578348ec986130544f859662fecd3ad08
                    • Opcode Fuzzy Hash: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                    • Instruction Fuzzy Hash: 04A12471E04229CBDF28CFA8C844BADBBB1FF44305F14816AD956BB281C7786986DF45
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                    • Instruction ID: 16a3963220edad981734dfbd86db7ae4535d0e52bcc7a87e0ef86c627c8cfaa4
                    • Opcode Fuzzy Hash: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                    • Instruction Fuzzy Hash: 2D912370D04268CBDF28CF98C854BADBBB1FF44305F14816AD956BB281C7786986DF45
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                    • Instruction ID: e981be8a744509f315cfd76b32476d9c10b76e0a4aa84739a8d113cb33934a41
                    • Opcode Fuzzy Hash: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                    • Instruction Fuzzy Hash: 37812471E04228CBDF24CFA8C844BADBBB1FF45305F24816AD856BB291C7789986DF45
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                    • Instruction ID: 516ab04208dd2bc2fd7cdea6c41d3130492ff38fa800e35acf718bd73fbf6333
                    • Opcode Fuzzy Hash: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                    • Instruction Fuzzy Hash: A4712271E04228CBDF24CF98C844BADBBB1FF48305F14806AD856BB281C778A986DF45
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                    • Instruction ID: 835baf8de871759411e2c74e4a47f0112f02d54065241c3c7dcda5dc236b3f46
                    • Opcode Fuzzy Hash: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                    • Instruction Fuzzy Hash: 92712571E04228CBEF28CF98C844BADBBB1FF44305F15816AD856BB281C7786996DF45
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                    • Instruction ID: ccec74d0ee3a806077926e8984c2e201e8b1f3d886c73ab216be699138b2bca7
                    • Opcode Fuzzy Hash: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                    • Instruction Fuzzy Hash: 39715771E04228CBEF28CF98C844BADBBB1FF44305F14806AD956BB281C778A946DF45
                    APIs
                    • GlobalFree.KERNEL32(00000000), ref: 00401BF6
                    • GlobalAlloc.KERNEL32(00000040,00000404), ref: 00401C08
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Global$AllocFree
                    • String ID: C:\Users\user\AppData\Local\Temp\setup.exe
                    • API String ID: 3394109436-3080675856
                    • Opcode ID: 1742c790c76e1204b36b83cb8595e4f796a64baec2cc559805630d203923ff3a
                    • Instruction ID: d16732292a7d53aa36264d1983316191a85a40c43d81ca2894a5c6bdb3dae948
                    • Opcode Fuzzy Hash: 1742c790c76e1204b36b83cb8595e4f796a64baec2cc559805630d203923ff3a
                    • Instruction Fuzzy Hash: 6921A872600208ABC720EB65CEC495E73E8EB89314765493BF502F72E1DB7CA8518B9D
                    APIs
                    • lstrlenA.KERNEL32(0040AC20,00000023,00000011,00000002), ref: 004024C9
                    • RegSetValueExA.KERNEL32(?,?,?,?,0040AC20,00000000), ref: 00402509
                    • RegCloseKey.KERNEL32(00000000,?,?,?,?), ref: 004025ED
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseValuelstrlen
                    • String ID:
                    • API String ID: 2655323295-0
                    • Opcode ID: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                    • Instruction ID: e1e6ae2a7b536448810537a1ffa9a52b32d6c636ce9630cd27147c6707bb0a71
                    • Opcode Fuzzy Hash: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                    • Instruction Fuzzy Hash: 04116371E04208AFEB10AFA5DE49AAEBA74EB84714F21443BF504F71C1DAB94D409B68
                    APIs
                    • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025C2
                    • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025D5
                    • RegCloseKey.KERNEL32(00000000,?,?,?,?), ref: 004025ED
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Enum$CloseValue
                    • String ID:
                    • API String ID: 397863658-0
                    • Opcode ID: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                    • Instruction ID: 33ff3e85e785963e302667c06a3cb1355a7acd8bf142a31c2560ef5bcfc7d759
                    • Opcode Fuzzy Hash: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                    • Instruction Fuzzy Hash: 2C017571904104FFE7158F54DE88ABF7BACEF81358F20443EF101A61C0DAB44E449679
                    APIs
                      • Part of subcall function 00405EF6: GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                      • Part of subcall function 00405EF6: SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                    • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B1D
                    • DeleteFileA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B25
                    • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B3D
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: File$Attributes$DeleteDirectoryRemove
                    • String ID:
                    • API String ID: 1655745494-0
                    • Opcode ID: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                    • Instruction ID: eeb49a2f717892c2e0964ab94aaac89db2a73fdd151ed94c70539e0cf44bba43
                    • Opcode Fuzzy Hash: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                    • Instruction Fuzzy Hash: 6CE0E531109A9097C62067349908A5B7AF8EF86314F094D3AF9A1F20D0DB38B9468EBD
                    APIs
                    • WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 0040682F
                    • GetExitCodeProcess.KERNEL32 ref: 0040683C
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: ObjectSingleWait$CodeExitProcess
                    • String ID:
                    • API String ID: 2567322000-0
                    • Opcode ID: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                    • Instruction ID: abee92fc01d0549169be82d64ea8a54f8020188e09ec540bf7ef67874f21f581
                    • Opcode Fuzzy Hash: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                    • Instruction Fuzzy Hash: 9DE0D832600118FBDB00AB54DD05E9E7F6EEB44704F114033F601B6190C7B59E21DB98
                    APIs
                    • ReadFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,0040B8F8,00403481,00000009,00000009,00403385,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F), ref: 00405FA7
                    Strings
                    • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00405F96
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                    • API String ID: 2738559852-292220189
                    • Opcode ID: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                    • Instruction ID: 61a6516da629700e98a59d605e8380186fb5f41ecf47873683bd74a9a2ef61d4
                    • Opcode Fuzzy Hash: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                    • Instruction Fuzzy Hash: 8BE08C3220161EEBEF119E508C00AEBBB6CEB00360F004433FD25E3140E234E9218BA8
                    APIs
                    • RegQueryValueExA.KERNEL32 ref: 0040254E
                    • RegCloseKey.KERNEL32(00000000,?,?,?,?), ref: 004025ED
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID:
                    • API String ID: 3356406503-0
                    • Opcode ID: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                    • Instruction ID: 7c766f3f1fb2abd04e903467a79d83897fdaad9d0bba0580308fe752c8381985
                    • Opcode Fuzzy Hash: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                    • Instruction Fuzzy Hash: 1B11BF71905205EFDB25CF64DA985AE7BB4AF11355F20483FE042B72C0D6B88A85DA1D
                    APIs
                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                    • SendMessageA.USER32 ref: 004013F4
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                    • Instruction ID: c6e23866af321c238b4b59365f681da1ab702c54c00e726fca3ee5b0521d1f72
                    • Opcode Fuzzy Hash: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                    • Instruction Fuzzy Hash: 5201D131B242109BE7194B38AE04B2A36A8E754315F51813AF851F61F1DB78CC129B4D
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseCreateHandleProcess
                    • String ID:
                    • API String ID: 3712363035-0
                    • Opcode ID: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                    • Instruction ID: 70dcd79ab4e1e9e84cc9ba673cd08f466e07e48f17d85ed3475224309c024e1a
                    • Opcode Fuzzy Hash: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                    • Instruction Fuzzy Hash: A5E04FB4600209BFEB009B64ED09F7B77ACFB04244F808421BE40F2150D67899658A78
                    APIs
                    • GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                    • GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                      • Part of subcall function 00406726: GetSystemDirectoryA.KERNEL32 ref: 0040673D
                      • Part of subcall function 00406726: wsprintfA.USER32 ref: 00406776
                      • Part of subcall function 00406726: LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                    • String ID:
                    • API String ID: 2547128583-0
                    • Opcode ID: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                    • Instruction ID: 2a593beb9babc16b4b5ae8275dbdfb46ef4ebf17ea7291b62b5d373670c31446
                    • Opcode Fuzzy Hash: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                    • Instruction Fuzzy Hash: B6E0863260421157D21067705E4897773ACAF94B54302043EF546F3144D7389C76966D
                    APIs
                    • GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00405F1F
                    • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: File$AttributesCreate
                    • String ID:
                    • API String ID: 415043291-0
                    • Opcode ID: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                    • Instruction ID: c1cd633b288b309c16b37b55694bd397a2d2f3fd27c3ea135bedd35eac3c4d3c
                    • Opcode Fuzzy Hash: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                    • Instruction Fuzzy Hash: D9D09E31254602AFEF0D8F20DE16F2E7AA2EB84B00F11952CB682944E2DA715819AB19
                    APIs
                    • GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                    • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                    • Instruction ID: 2a9487917742c73a52daa6fa2dda6e447083e2efb983b62a69771bacbdb33add
                    • Opcode Fuzzy Hash: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                    • Instruction Fuzzy Hash: E3D0C972504422ABD2102728AE0889BBB55DB94271702CA35FDA5A26F1DB304C569A9C
                    APIs
                    • CreateDirectoryA.KERNEL32(?,00000000,004034BF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004059F2
                    • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405A00
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CreateDirectoryErrorLast
                    • String ID:
                    • API String ID: 1375471231-0
                    • Opcode ID: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                    • Instruction ID: 42ce2bd36b25b14d2ed8d631edf33fc643f4c4eb5ed9af5e51ab4a49ffb09bba
                    • Opcode Fuzzy Hash: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                    • Instruction Fuzzy Hash: 9BC04C303145419AD6505B309F4DB177A54AB50741F51553A638AE01A0DA348465DD2D
                    APIs
                    • lstrcpynA.KERNEL32(?,10003024,?,10003020,1000138F,10003020,00000400), ref: 10001454
                    • GlobalFree.KERNELBASE(10003020), ref: 10001464
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3973835454.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 0000000A.00000002.3973795784.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973910220.0000000010002000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973963382.0000000010004000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_10000000_45DE.jbxd
                    Similarity
                    • API ID: FreeGloballstrcpyn
                    • String ID:
                    • API String ID: 1459762280-0
                    • Opcode ID: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                    • Instruction ID: 61cff6a9ed434c6726c3e265b98623322506fe6e864b2b4fb358a1092e6d6a6c
                    • Opcode Fuzzy Hash: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                    • Instruction Fuzzy Hash: 8DF0F8312152209FE315DF24CC94B9777E9FB0A385F018429E691C7278D770E804CB22
                    APIs
                    • RegCreateKeyExA.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00406265
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                    • Instruction ID: 57b18be241489d6c3509c0f1b2cb500900bdd64e2c84313365475615acd8ae2e
                    • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                    • Instruction Fuzzy Hash: 16E0E672010109BEDF196F50DD0AD7B371DEB04341F01492EF916D4091E6B5A9309734
                    APIs
                    • WriteFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,004114F7,0040B8F8,00403405,0040B8F8,004114F7,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004), ref: 00405FD6
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FileWrite
                    • String ID:
                    • API String ID: 3934441357-0
                    • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction ID: d5187e51ab0d96a1766449b5dbb93cac2cdd9e80b7d20ab2fc0b5d8c8d5322e8
                    • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction Fuzzy Hash: 4AE0EC3221065BABDF109E659C04EEB7B6CEB05360F004437FA55E3150D675E8219BA4
                    APIs
                    • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?), ref: 00406232
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                    • Instruction ID: e678259d492eddc69303d735af6c58fa5eb03465f078c5ba6a1a088e01eebb4c
                    • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                    • Instruction Fuzzy Hash: 64D0123244020DBBDF116F90ED01FAB3B1DEB18350F014826FE06A80A1D775D530A725
                    APIs
                    • MoveFileExA.KERNEL32(?,?,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040616B
                      • Part of subcall function 00405FF1: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                      • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32 ref: 0040602B
                      • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32 ref: 00406048
                      • Part of subcall function 00405FF1: wsprintfA.USER32 ref: 00406066
                      • Part of subcall function 00405FF1: GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                      • Part of subcall function 00405FF1: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                      • Part of subcall function 00405FF1: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                      • Part of subcall function 00405FF1: SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsm46E8.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                      • Part of subcall function 00405FF1: GlobalFree.KERNEL32(00000000), ref: 0040614F
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: File$GlobalNamePathShort$AllocCloseFreeHandleMovePointerSizelstrcpywsprintf
                    • String ID:
                    • API String ID: 299535525-0
                    • Opcode ID: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                    • Instruction ID: 0556bd0dd0e376f9d1944fcc72f0db357db156cd0d89a75f2f72d3c973fa690a
                    • Opcode Fuzzy Hash: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                    • Instruction Fuzzy Hash: F0D0C731108602FFDB111B10ED0591B7BA5FF90355F11943EF599940B1DB368461DF09
                    APIs
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                    • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                    • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                    • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                    APIs
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405565
                      • Part of subcall function 00405A21: CreateProcessA.KERNEL32 ref: 00405A4A
                      • Part of subcall function 00405A21: CloseHandle.KERNEL32(?), ref: 00405A57
                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                      • Part of subcall function 00406809: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                      • Part of subcall function 00406809: GetExitCodeProcess.KERNEL32 ref: 0040683C
                      • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                    • String ID:
                    • API String ID: 2972824698-0
                    • Opcode ID: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                    • Instruction ID: dce1314ccbc215d7d9c334b017be086f7c4cc40ba0f87dfe0d8145fd67a5eb82
                    • Opcode Fuzzy Hash: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                    • Instruction Fuzzy Hash: 2DF0B432A05121DBDB20BFA59EC49EEB2A4DF41318B25463FF502B21D1CB7C4D418A6E
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                    • String ID: PB
                    • API String ID: 590372296-3196168531
                    • Opcode ID: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                    • Instruction ID: 44a2cb424ceca129f1c721a27905a8e57bc1109532c064cce4e419f7e60c3497
                    • Opcode Fuzzy Hash: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                    • Instruction Fuzzy Hash: 18A13971900608FFDB11AF64DE85AAE7BB9FB48355F00403AFA41BA1A0CB754E51DF58
                    APIs
                    • GetDlgItem.USER32 ref: 004048E6
                    • SetWindowTextA.USER32(00000000,?), ref: 00404910
                    • SHBrowseForFolderA.SHELL32(?,00420128,?), ref: 004049C1
                    • CoTaskMemFree.OLE32(00000000), ref: 004049CC
                    • lstrcmpiA.KERNEL32(C:\Windows\wininit.ini,00420D50), ref: 004049FE
                    • lstrcatA.KERNEL32(?,C:\Windows\wininit.ini), ref: 00404A0A
                    • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404A1C
                      • Part of subcall function 00405A82: GetDlgItemTextA.USER32 ref: 00405A95
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,*?|<>/":,00000000,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                      • Part of subcall function 00406666: CharNextA.USER32(0000000B,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                      • Part of subcall function 00406666: CharPrevA.USER32(0000000B,0000000B,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                    • GetDiskFreeSpaceA.KERNEL32(0041FD20,?,?,0000040F,?,0041FD20,0041FD20,?,00000001,0041FD20,?,?,000003FB,?), ref: 00404ADA
                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AF5
                      • Part of subcall function 00404C4E: lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                      • Part of subcall function 00404C4E: wsprintfA.USER32 ref: 00404CF4
                      • Part of subcall function 00404C4E: SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                    • String ID: A$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$PB
                    • API String ID: 2624150263-2436417975
                    • Opcode ID: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                    • Instruction ID: 03633cdec68ae3b48ba4c7d33c4768738bfb21d85bfcf2e4b9185cba9ee35c0f
                    • Opcode Fuzzy Hash: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                    • Instruction Fuzzy Hash: 7DA150B1A00208AADB11EFA5DD45BAFB6B8EF84315F10803BF601B62D1D77C99418F6D
                    APIs
                    • CoCreateInstance.OLE32(00408418,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F8
                    • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022AA
                    Strings
                    • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00402238
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: ByteCharCreateInstanceMultiWide
                    • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                    • API String ID: 123533781-1348220699
                    • Opcode ID: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                    • Instruction ID: 4a55140eb955682c0845ac661669d1effe53c60cfc8a987c49de3bb9103baba8
                    • Opcode Fuzzy Hash: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                    • Instruction Fuzzy Hash: B2513575A00208AFDF10DFE4CA88A9D7BB5EF48314F2045BAF505EB2D1DA799981CB54
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027B9
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID:
                    • API String ID: 1974802433-0
                    • Opcode ID: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                    • Instruction ID: 9767438fe71d1176ff9aac627a01f72906af616df08219c0cc944b63bddc0547
                    • Opcode Fuzzy Hash: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                    • Instruction Fuzzy Hash: CCF0A0726082049AD710EBA49A49AEEB7689F51324F60057BF142F20C1D6B889459B2A
                    APIs
                    • GetDlgItem.USER32 ref: 00404E21
                    • GetDlgItem.USER32 ref: 00404E2E
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E7D
                    • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E94
                    • SetWindowLongA.USER32 ref: 00404EAE
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404EC0
                    • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404ED4
                    • SendMessageA.USER32 ref: 00404EEA
                    • SendMessageA.USER32 ref: 00404EF6
                    • SendMessageA.USER32 ref: 00404F06
                    • DeleteObject.GDI32 ref: 00404F0B
                    • SendMessageA.USER32 ref: 00404F36
                    • SendMessageA.USER32 ref: 00404F42
                    • SendMessageA.USER32 ref: 00404FDC
                    • SendMessageA.USER32 ref: 0040500C
                      • Part of subcall function 0040443A: SendMessageA.USER32 ref: 00404448
                    • SendMessageA.USER32 ref: 00405020
                    • GetWindowLongA.USER32(?,000000F0), ref: 0040504E
                    • SetWindowLongA.USER32 ref: 0040505C
                    • ShowWindow.USER32(?,00000005), ref: 0040506C
                    • SendMessageA.USER32 ref: 00405167
                    • SendMessageA.USER32 ref: 004051CC
                    • SendMessageA.USER32 ref: 004051E1
                    • SendMessageA.USER32 ref: 00405205
                    • SendMessageA.USER32 ref: 00405225
                    • ImageList_Destroy.COMCTL32(?), ref: 0040523A
                    • GlobalFree.KERNEL32(?), ref: 0040524A
                    • SendMessageA.USER32 ref: 004052C3
                    • SendMessageA.USER32 ref: 0040536C
                    • SendMessageA.USER32 ref: 0040537B
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004053A6
                    • ShowWindow.USER32(?,00000000), ref: 004053F4
                    • GetDlgItem.USER32 ref: 004053FF
                    • ShowWindow.USER32(00000000), ref: 00405406
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                    • String ID: $M$N
                    • API String ID: 2564846305-813528018
                    • Opcode ID: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                    • Instruction ID: c306c4130ea67d8582adb4b0d0e706bf782d7aff15223233fd0d43401108afdf
                    • Opcode Fuzzy Hash: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                    • Instruction Fuzzy Hash: 6C025CB0A00609AFDB209F94DD45AAE7BB5FB84354F10817AF610BA2E1D7789D42CF58
                    APIs
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403F47
                    • ShowWindow.USER32(?), ref: 00403F67
                    • GetWindowLongA.USER32(?,000000F0), ref: 00403F79
                    • ShowWindow.USER32(?,00000004), ref: 00403F92
                    • DestroyWindow.USER32 ref: 00403FA6
                    • SetWindowLongA.USER32 ref: 00403FBF
                    • GetDlgItem.USER32 ref: 00403FDE
                    • SendMessageA.USER32 ref: 00403FF2
                    • IsWindowEnabled.USER32(00000000), ref: 00403FF9
                    • GetDlgItem.USER32 ref: 004040A4
                    • GetDlgItem.USER32 ref: 004040AE
                    • SetClassLongA.USER32(?,000000F2,?), ref: 004040C8
                    • SendMessageA.USER32 ref: 00404119
                    • GetDlgItem.USER32 ref: 004041BF
                    • ShowWindow.USER32(00000000,?), ref: 004041E0
                    • EnableWindow.USER32(?,?), ref: 004041F2
                    • EnableWindow.USER32(?,?), ref: 0040420D
                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404223
                    • EnableMenuItem.USER32 ref: 0040422A
                    • SendMessageA.USER32 ref: 00404242
                    • SendMessageA.USER32 ref: 00404255
                    • lstrlenA.KERNEL32(00420D50,?,00420D50,00000000), ref: 0040427F
                    • SetWindowTextA.USER32(?,00420D50), ref: 0040428E
                    • ShowWindow.USER32(?,0000000A), ref: 004043C2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                    • String ID: PB
                    • API String ID: 1860320154-3196168531
                    • Opcode ID: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                    • Instruction ID: 6b3c419a8b2de2434844e8cd53afab52d63163afb5b1bd925d395a768d9dd0e6
                    • Opcode Fuzzy Hash: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                    • Instruction Fuzzy Hash: ECC1D2B1A00204BBCB206F61EE45E2B3A78EB85745F41053EF781B61F1CB3998929B5D
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                    • String ID: N$6B
                    • API String ID: 3103080414-649610290
                    • Opcode ID: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                    • Instruction ID: 424ea1d81b5f8fd67bb79b8421ee67f108f717641e3cc5fc4ea293435da972af
                    • Opcode Fuzzy Hash: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                    • Instruction Fuzzy Hash: CE6190B1A40208BFDB109F61DD45B6A7B69FB84715F10843AFB01BB2D1C7B8A951CF98
                    APIs
                    • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                    • BeginPaint.USER32(?,?), ref: 00401047
                    • GetClientRect.USER32 ref: 0040105B
                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                    • FillRect.USER32 ref: 004010E4
                    • DeleteObject.GDI32 ref: 004010ED
                    • CreateFontIndirectA.GDI32 ref: 00401105
                    • SetBkMode.GDI32 ref: 00401126
                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                    • SelectObject.GDI32(00000000,?), ref: 00401140
                    • DrawTextA.USER32(00000000,00423F40,000000FF,00000010,00000820), ref: 00401156
                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                    • DeleteObject.GDI32 ref: 00401165
                    • EndPaint.USER32(?,?), ref: 0040116E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                    • String ID: F
                    • API String ID: 941294808-1304234792
                    • Opcode ID: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                    • Instruction ID: bc851ab26da2bb863bf3a2ee07eb2f950de800ada4cbee7b2d64f78586a04119
                    • Opcode Fuzzy Hash: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                    • Instruction Fuzzy Hash: 2C419D71800249AFCF058FA5DE459AF7FB9FF45314F00802AF991AA1A0C734DA55DFA4
                    APIs
                    • lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                    • lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                    • lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                    • SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                    • SendMessageA.USER32 ref: 0040553D
                    • SendMessageA.USER32 ref: 00405557
                    • SendMessageA.USER32 ref: 00405565
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                    • String ID: 4/@
                    • API String ID: 2531174081-3101945251
                    • Opcode ID: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                    • Instruction ID: 7ab3267fb946cf8e7efc5916356ec1270af3577e2396c2c3629ce5ef3fcb69de
                    • Opcode Fuzzy Hash: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                    • Instruction Fuzzy Hash: 0F217A71E00118BBCF119FA5DD8099EBFB9EF09354F04807AF944A6291C7788A90CFA8
                    APIs
                    • CharNextA.USER32(0000000B,*?|<>/":,00000000,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                    • CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                    • CharNextA.USER32(0000000B,?,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                    • CharPrevA.USER32(0000000B,0000000B,76233410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\45DE.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406667
                    • *?|<>/":, xrefs: 004066AE
                    • C:\Users\user\AppData\Local\Temp\45DE.exe, xrefs: 00406666
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Char$Next$Prev
                    • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\45DE.exe
                    • API String ID: 589700163-89572299
                    • Opcode ID: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                    • Instruction ID: 80d428334b402c3338f843ea799862c1973996ffb1638880579f4ae0c72fc655
                    • Opcode Fuzzy Hash: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                    • Instruction Fuzzy Hash: 7E1108518047902DEB3206340C04B7B7F894F977A0F2A087FD8C6722C2D67E5C62967D
                    APIs
                    • DestroyWindow.USER32(?,00000000), ref: 00402ED5
                    • GetTickCount.KERNEL32 ref: 00402EF3
                    • wsprintfA.USER32 ref: 00402F21
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                      • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                      • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                      • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 0040553D
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405557
                      • Part of subcall function 004054A9: SendMessageA.USER32 ref: 00405565
                    • CreateDialogParamA.USER32(0000006F,00000000,00402E25,00000000), ref: 00402F45
                    • ShowWindow.USER32(00000000,00000005), ref: 00402F53
                      • Part of subcall function 00402EA1: MulDiv.KERNEL32(?,00000064,?), ref: 00402EB6
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                    • String ID: ... %d%%$#Vh%.@
                    • API String ID: 722711167-1706192003
                    • Opcode ID: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                    • Instruction ID: ac0ca11ee9366edb0cc6a28cc5aeb329eacd7d00ab00b3c3670f6d564c8935e4
                    • Opcode Fuzzy Hash: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                    • Instruction Fuzzy Hash: 3F01A170542225EBCB21BB50EF0CBAB3778EB40744B04443BF505B21D0C7F894469AEE
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                    • String ID:
                    • API String ID: 2320649405-0
                    • Opcode ID: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                    • Instruction ID: 76b6fc4927f6120469f5ffa52701fcd3ddd76896e52d32ad6f55637f73cee333
                    • Opcode Fuzzy Hash: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                    • Instruction Fuzzy Hash: 9E2147B1501704AFCB31DF68ED08B5BBBF8AF41715B04892EEA96A26E0D734E904CB54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Message$Send$ClientScreen
                    • String ID: f
                    • API String ID: 41195575-1993550816
                    • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                    • Instruction ID: de178be9688f757f82ef56a4cbeb6693d0582b60b2ea90e1a00f6814b48fd044
                    • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                    • Instruction Fuzzy Hash: BB014871900219BADB01DBA4DD85BFEBBF8AF95B11F10016ABA40B61C0C6B499058BA4
                    APIs
                    • CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                    • GetLastError.KERNEL32 ref: 004059C6
                    • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004059DB
                    • GetLastError.KERNEL32 ref: 004059E5
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                    • String ID: !9@$C:\Users\user\AppData\Local\Temp\
                    • API String ID: 3449924974-3408088068
                    • Opcode ID: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                    • Instruction ID: 4cd508ff09270142ca7a6984d66ae253fefa4e1f6983b248f3af4f59f5a14231
                    • Opcode Fuzzy Hash: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                    • Instruction Fuzzy Hash: 610108B1D00259DAEF109BA0CA45BEFBBB8EB04354F00403AD645B6290D7789648CF99
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Text$ItemTimerWindowwsprintf
                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                    • API String ID: 1451636040-1158693248
                    • Opcode ID: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                    • Instruction ID: 7ad4584a5e884be7344c254f70e0401137e7e46ce86c3cf658bb2ab9d23be74a
                    • Opcode Fuzzy Hash: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                    • Instruction Fuzzy Hash: 1DF01D7054020DBAEF219F60DE0ABAE3769EB44344F00803AFA16B91D0DBB899558F99
                    APIs
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402849
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402865
                    • GlobalFree.KERNEL32(?), ref: 004028A4
                    • GlobalFree.KERNEL32(00000000), ref: 004028B7
                    • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028D3
                    • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028E6
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                    • String ID:
                    • API String ID: 2667972263-0
                    • Opcode ID: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                    • Instruction ID: cd924008ac91bdcd896aacfcc8aadc4f9c7de1b4393fc14a433ce499bdbf1d56
                    • Opcode Fuzzy Hash: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                    • Instruction Fuzzy Hash: D931AC32800128ABDF216FA5DE49D9E7A75FF08364F24423AF450B62D0CB7949419F68
                    APIs
                    • OpenProcess.KERNEL32(00100401,00000000,?,0000025E,?,00000000,?), ref: 10001054
                    • EnumWindows.USER32(10001007,?), ref: 10001074
                    • GetExitCodeProcess.KERNEL32 ref: 10001084
                    • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 1000109D
                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 100010AE
                    • CloseHandle.KERNEL32(00000000), ref: 100010C5
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3973835454.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 0000000A.00000002.3973795784.0000000010000000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973910220.0000000010002000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    • Associated: 0000000A.00000002.3973963382.0000000010004000.00000002.00000001.01000000.0000000A.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_10000000_45DE.jbxd
                    Similarity
                    • API ID: Process$CloseCodeEnumExitHandleObjectOpenSingleTerminateWaitWindows
                    • String ID:
                    • API String ID: 3465249596-0
                    • Opcode ID: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                    • Instruction ID: 6b4dcd5717a232181223c093e4f4244ae1ce1555a3c8e15b92772d9ea2fb9ae7
                    • Opcode Fuzzy Hash: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                    • Instruction Fuzzy Hash: 5211E235A00299EFFB00DFA5CCC8AEE77BCEB456C5F014069FA4192149D7B49981CB62
                    APIs
                    • lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                    • wsprintfA.USER32 ref: 00404CF4
                    • SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: ItemTextlstrlenwsprintf
                    • String ID: %u.%u%s%s$PB
                    • API String ID: 3540041739-838025833
                    • Opcode ID: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                    • Instruction ID: 635705270cf82d3fa6c033b13715314544988666452c3f341a93ad76d23c3d90
                    • Opcode Fuzzy Hash: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                    • Instruction Fuzzy Hash: 5F11E77360512837EB00656D9D45EAE3298DB85374F26423BFE26F71D1E978CC1286E8
                    APIs
                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402D8F
                    • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402DDB
                    • RegCloseKey.ADVAPI32 ref: 00402DE4
                    • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402DFB
                    • RegCloseKey.ADVAPI32 ref: 00402E06
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseEnum$DeleteValue
                    • String ID:
                    • API String ID: 1354259210-0
                    • Opcode ID: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                    • Instruction ID: 1f7d8097ab2fb743d310579a2b4365e3e31c1a4ec17ce584dda370d325fd3950
                    • Opcode Fuzzy Hash: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                    • Instruction Fuzzy Hash: 1D214B7150010CBBDF129F90CE89EEB7B7DEF44344F11007AF955B11A0D7B49EA49AA8
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                    • String ID:
                    • API String ID: 1849352358-0
                    • Opcode ID: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                    • Instruction ID: cb7cd4706ec086029cb46641885d9617bace417a5341e65c45b3777010ef1041
                    • Opcode Fuzzy Hash: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                    • Instruction Fuzzy Hash: 35212A72E00109AFDF15DFA4DD85AAEBBB5EB88300F24417EF911F62A0DB389941DB14
                    APIs
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CapsCreateDeviceFontIndirectRelease
                    • String ID:
                    • API String ID: 3808545654-0
                    • Opcode ID: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                    • Instruction ID: bfe7ce59390996d5b2ac71ca67757b7c78ff13e1b53bdd881068f9c0e557254e
                    • Opcode Fuzzy Hash: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                    • Instruction Fuzzy Hash: 66018072504340AEE7007BB0AF8AA9A7FE8E755701F109439F241B61E2CB790449CB6C
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: MessageSend$Timeout
                    • String ID: !
                    • API String ID: 1777923405-2657877971
                    • Opcode ID: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                    • Instruction ID: a12cfbdd51ff26f17676da16b1bc06906883597644a76ef85f46b7bf1251d8d3
                    • Opcode Fuzzy Hash: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                    • Instruction Fuzzy Hash: 2A218271948208BEEB059FF5DA8AAAD7FB4EF84304F20447EF101B61D1D7B989819B18
                    APIs
                    • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D20
                    • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D29
                    • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405D3A
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405D1A
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharPrevlstrcatlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 2659869361-3936084776
                    • Opcode ID: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                    • Instruction ID: 6a6775ee8fa4d5d8d60a890cb1840bbff54d6a4bc9e312217f61a2b57c53a4e0
                    • Opcode Fuzzy Hash: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                    • Instruction Fuzzy Hash: 82D0A7625015307AD20167154C09DDF29488F523017094027F501B7191C67C5C1187FD
                    APIs
                    • CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,76233410,?,76232EE0,00405B6A,?,76233410,76232EE0,C:\Users\user\AppData\Local\Temp\45DE.exe), ref: 00405DC1
                    • CharNextA.USER32(00000000), ref: 00405DC6
                    • CharNextA.USER32(00000000), ref: 00405DDA
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharNext
                    • String ID: C:\
                    • API String ID: 3213498283-3404278061
                    • Opcode ID: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                    • Instruction ID: a81d310af092f64b8c374c4571b8fed5a60269d48026fa3bbeeaae68e06855d2
                    • Opcode Fuzzy Hash: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                    • Instruction Fuzzy Hash: 71F09661904F542BFB3293648C4CB776B8DCF55351F28947BE6807A6C1C27C59808FEA
                    APIs
                    • IsWindowVisible.USER32(?), ref: 0040544C
                    • CallWindowProcA.USER32 ref: 0040549D
                      • Part of subcall function 00404451: SendMessageA.USER32 ref: 00404463
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: Window$CallMessageProcSendVisible
                    • String ID:
                    • API String ID: 3748168415-3916222277
                    • Opcode ID: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                    • Instruction ID: ce4d6245f7a5538c18ae28323cba1b5bdda0ccdff68052f186ad3da5f1ae13b7
                    • Opcode Fuzzy Hash: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                    • Instruction Fuzzy Hash: 2A015E31200608AFDF216F51DD80BAF3A66EB84716F104537FA05761D2C7799CD29F6A
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID: C:\Windows\wininit.ini
                    • API String ID: 3356406503-2725141966
                    • Opcode ID: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                    • Instruction ID: 5c8aa4f59809ec7c4ed175be077f356401e74c3ba082423fbe1b6bbc42bea5f4
                    • Opcode Fuzzy Hash: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                    • Instruction Fuzzy Hash: 8101BC72100209ABDF229F60CC09FDB3FA8EF45364F01407AFD56A6190D638C974CBA8
                    APIs
                    • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\45DE.exe,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00405D67
                    • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\45DE.exe,C:\Users\user\AppData\Local\Temp\45DE.exe,80000000,00000003), ref: 00405D75
                    Strings
                    • C:\Users\user\AppData\Local\Temp, xrefs: 00405D61
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: CharPrevlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp
                    • API String ID: 2709904686-1104044542
                    • Opcode ID: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                    • Instruction ID: 27c40c0738421aba4af956c8f0f705930dfe744a77a65273bf6dbb66402e0641
                    • Opcode Fuzzy Hash: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                    • Instruction Fuzzy Hash: CBD0A772409D706EE31353208C04B8F6A48CF13300F0D4063E481A6190C2785C424BFD
                    APIs
                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405EA8
                    • CharNextA.USER32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EB9
                    • lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                    Memory Dump Source
                    • Source File: 0000000A.00000002.3970611896.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 0000000A.00000002.3970568383.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970654457.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970703843.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                    • Associated: 0000000A.00000002.3970949061.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_10_2_400000_45DE.jbxd
                    Similarity
                    • API ID: lstrlen$CharNextlstrcmpi
                    • String ID:
                    • API String ID: 190613189-0
                    • Opcode ID: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                    • Instruction ID: 98ea32bb50e75ca8be10b873c57fc005eda9f523d07111d413316ed06cfa332a
                    • Opcode Fuzzy Hash: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                    • Instruction Fuzzy Hash: 5FF06235104918AFCB129BA5DD4099EBFA8EF55350B2540B9E880F7211D674DF019BA9

                    Execution Graph

                    Execution Coverage:1.2%
                    Dynamic/Decrypted Code Coverage:22.9%
                    Signature Coverage:3.5%
                    Total number of Nodes:1456
                    Total number of Limit Nodes:102
                    execution_graph 145429 223052 145430 223061 145429->145430 145431 22306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 145430->145431 145432 2230ce 145430->145432 145431->145432 145433 32421f5 InitializeCriticalSectionAndSpinCount 145431->145433 145434 3242219 CreateMutexA 145433->145434 145435 3242214 145433->145435 145436 3242235 GetLastError 145434->145436 145437 3242678 ExitProcess 145434->145437 145436->145437 145438 3242246 145436->145438 145511 3243bd2 145438->145511 145440 324264f DeleteCriticalSection 145440->145437 145441 3242251 145441->145440 145515 32447e6 145441->145515 145444 3242647 145445 3243536 2 API calls 145444->145445 145445->145440 145451 32422e0 145538 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145451->145538 145453 32422ef 145539 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145453->145539 145455 32425df 145604 3243d76 EnterCriticalSection 145455->145604 145457 32425f8 145617 3243536 145457->145617 145458 32422fe 145458->145455 145540 32446d4 GetModuleHandleA 145458->145540 145462 3242360 145462->145455 145543 3241f2d GetUserDefaultUILanguage 145462->145543 145463 3243536 2 API calls 145465 3242610 145463->145465 145467 3243536 2 API calls 145465->145467 145469 324261b 145467->145469 145468 32423b4 145468->145435 145472 32423dd ExitProcess 145468->145472 145475 32423e5 145468->145475 145471 3243536 2 API calls 145469->145471 145470 32446d4 2 API calls 145470->145468 145473 3242626 145471->145473 145473->145444 145620 324536d 145473->145620 145476 3242412 ExitProcess 145475->145476 145477 324241a 145475->145477 145478 3242447 ExitProcess 145477->145478 145479 324244f 145477->145479 145554 3244ba2 145479->145554 145487 3242532 145632 3245239 145487->145632 145488 324251f 145489 32435db 11 API calls 145488->145489 145489->145487 145491 3242543 145492 3245239 4 API calls 145491->145492 145493 3242551 145492->145493 145494 3245239 4 API calls 145493->145494 145495 3242561 145494->145495 145496 3245239 4 API calls 145495->145496 145497 3242570 145496->145497 145498 3245239 4 API calls 145497->145498 145499 3242580 145498->145499 145500 3245239 4 API calls 145499->145500 145501 324258f 145500->145501 145636 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145501->145636 145503 3242599 145504 32425b2 145503->145504 145505 32425a2 GetModuleFileNameW 145503->145505 145506 3245239 4 API calls 145504->145506 145505->145504 145507 32425cc 145506->145507 145508 3245239 4 API calls 145507->145508 145509 32425d7 145508->145509 145510 3243536 2 API calls 145509->145510 145510->145455 145512 3243bda 145511->145512 145637 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145512->145637 145514 3243be5 145514->145441 145516 32446d4 2 API calls 145515->145516 145517 3244812 145516->145517 145518 3242283 145517->145518 145519 3245239 4 API calls 145517->145519 145518->145444 145524 32435db 145518->145524 145520 3244828 145519->145520 145521 3245239 4 API calls 145520->145521 145522 3244833 145521->145522 145523 3245239 4 API calls 145522->145523 145523->145518 145638 3242c08 145524->145638 145527 324484b 145528 3244860 VirtualAlloc 145527->145528 145531 32422c4 145527->145531 145529 324487f 145528->145529 145528->145531 145530 32446d4 2 API calls 145529->145530 145532 32448a1 145530->145532 145531->145444 145537 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145531->145537 145532->145531 145533 32448d0 GetCurrentProcess IsWow64Process 145532->145533 145535 3245239 4 API calls 145533->145535 145536 32448fa 145535->145536 145536->145531 145537->145451 145538->145453 145539->145458 145541 32446f2 LoadLibraryA 145540->145541 145542 32446ff 145540->145542 145541->145542 145542->145462 145544 3241fa0 145543->145544 145545 32435db 11 API calls 145544->145545 145546 3241fd8 145545->145546 145547 32435db 11 API calls 145546->145547 145548 3241fe7 GetKeyboardLayoutList 145547->145548 145549 3242042 145548->145549 145550 3242001 145548->145550 145551 32435db 11 API calls 145549->145551 145550->145549 145553 32435db 11 API calls 145550->145553 145552 324204e 145551->145552 145552->145468 145552->145470 145553->145550 145555 3242468 CreateThread CreateThread WaitForMultipleObjects 145554->145555 145556 3244bb8 145554->145556 145581 32419df 145555->145581 145811 3241d3c 145555->145811 145826 324519f 145555->145826 145557 32446d4 2 API calls 145556->145557 145558 3244be9 145557->145558 145558->145555 145559 32446d4 2 API calls 145558->145559 145560 3244bfe 145559->145560 145560->145555 145561 3244c06 KiUserCallbackDispatcher GetSystemMetrics 145560->145561 145562 3244c2b 145561->145562 145563 3244c51 GetDC 145562->145563 145563->145555 145564 3244c65 GetCurrentObject 145563->145564 145565 3244e17 ReleaseDC 145564->145565 145566 3244c78 GetObjectW 145564->145566 145565->145555 145566->145565 145567 3244c8f 145566->145567 145568 32435db 11 API calls 145567->145568 145569 3244caf DeleteObject CreateCompatibleDC 145568->145569 145569->145565 145570 3244d24 CreateDIBSection 145569->145570 145571 3244d45 SelectObject 145570->145571 145572 3244e10 DeleteDC 145570->145572 145573 3244d55 BitBlt 145571->145573 145574 3244e09 DeleteObject 145571->145574 145572->145565 145573->145574 145575 3244d7a 145573->145575 145574->145572 145653 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145575->145653 145577 3244d85 145577->145574 145578 3243d76 10 API calls 145577->145578 145579 3244dfe 145578->145579 145580 3243536 2 API calls 145579->145580 145580->145574 145582 32419ed 145581->145582 145586 3241a26 145581->145586 145584 3241a09 145582->145584 145654 3241000 145582->145654 145585 3241000 53 API calls 145584->145585 145584->145586 145585->145586 145587 3242054 145586->145587 145806 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145587->145806 145589 3242079 145590 3242103 GetCurrentHwProfileA 145589->145590 145591 3242117 145590->145591 145592 324212d GetSystemInfo 145590->145592 145593 32435db 11 API calls 145591->145593 145594 32435db 11 API calls 145592->145594 145595 324212a 145593->145595 145596 324214f 145594->145596 145595->145592 145597 3243536 2 API calls 145596->145597 145598 3242159 GlobalMemoryStatusEx 145597->145598 145599 32435db 11 API calls 145598->145599 145602 3242188 145599->145602 145600 32421db EnumDisplayDevicesA 145601 32421ee ObtainUserAgentString 145600->145601 145600->145602 145601->145487 145601->145488 145602->145600 145603 32435db 11 API calls 145602->145603 145603->145602 145605 3243ea4 LeaveCriticalSection 145604->145605 145606 3243d98 145604->145606 145605->145457 145606->145605 145807 3243d1c 6 API calls 145606->145807 145608 3243dc1 145608->145605 145808 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145608->145808 145610 3243dec 145809 3246c7f EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145610->145809 145612 3243536 2 API calls 145614 3243e4f 145612->145614 145613 3243df6 145613->145612 145615 3243536 2 API calls 145614->145615 145616 3243e9f 145615->145616 145616->145605 145618 3242605 145617->145618 145619 324353a GetProcessHeap RtlFreeHeap 145617->145619 145618->145463 145619->145618 145621 32446d4 2 API calls 145620->145621 145622 32453f0 145621->145622 145623 324546d socket 145622->145623 145624 32453f8 145622->145624 145623->145624 145625 3245491 145623->145625 145624->145473 145625->145624 145626 32454b1 connect 145625->145626 145627 3245517 Sleep 145626->145627 145628 32454c8 send 145626->145628 145627->145625 145628->145627 145629 32454ea send 145628->145629 145629->145627 145630 3245506 145629->145630 145631 3243536 2 API calls 145630->145631 145631->145624 145633 3245288 145632->145633 145634 324525c 145632->145634 145633->145491 145634->145633 145810 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145634->145810 145636->145503 145637->145514 145639 3242c18 145638->145639 145648 3242c26 145638->145648 145650 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145639->145650 145641 3242c76 145643 32422a9 145641->145643 145652 32451f6 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145641->145652 145643->145527 145644 3243036 145645 3243536 2 API calls 145644->145645 145645->145643 145647 3242e29 WideCharToMultiByte 145647->145648 145648->145641 145648->145647 145649 3242eb1 WideCharToMultiByte 145648->145649 145651 3242991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145648->145651 145649->145648 145650->145648 145651->145648 145652->145644 145653->145577 145655 3241412 145654->145655 145656 324101e 145654->145656 145655->145584 145656->145655 145690 324407d GetFileAttributesW 145656->145690 145658 3241035 145658->145655 145691 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145658->145691 145660 3241049 145692 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145660->145692 145662 3241052 145668 32413d5 145662->145668 145693 3243600 145662->145693 145663 3243536 2 API calls 145665 324140b 145663->145665 145667 3243536 2 API calls 145665->145667 145667->145655 145668->145663 145669 3243600 7 API calls 145683 3241173 145669->145683 145671 3243eb6 41 API calls 145671->145683 145675 3243536 GetProcessHeap RtlFreeHeap 145675->145683 145677 3241662 EnterCriticalSection 145758 3244e27 145677->145758 145681 32440ba 14 API calls 145685 3241389 145681->145685 145682 3243d76 10 API calls 145682->145683 145683->145668 145683->145669 145683->145671 145683->145675 145683->145677 145683->145682 145683->145685 145687 3241000 50 API calls 145683->145687 145696 324446c 145683->145696 145728 324369c 145683->145728 145732 3241a62 145683->145732 145740 3241c94 145683->145740 145747 3241ba5 145683->145747 145783 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145683->145783 145685->145681 145685->145683 145686 3243600 7 API calls 145685->145686 145689 3243efc 42 API calls 145685->145689 145750 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145685->145750 145751 3243eb6 145685->145751 145686->145685 145687->145683 145689->145685 145690->145658 145691->145660 145692->145662 145784 3243084 145693->145784 145793 324407d GetFileAttributesW 145696->145793 145698 324447e 145699 32446cd 145698->145699 145794 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145698->145794 145699->145683 145701 3244494 145702 32446c5 145701->145702 145704 3243600 7 API calls 145701->145704 145703 3243536 2 API calls 145702->145703 145703->145699 145705 32444b1 145704->145705 145706 32444cf EnterCriticalSection 145705->145706 145707 3244539 LeaveCriticalSection 145706->145707 145708 3244552 145707->145708 145709 324459b 145707->145709 145708->145709 145711 324456f 145708->145711 145709->145702 145710 32445be EnterCriticalSection 145709->145710 145713 32445f5 LeaveCriticalSection 145710->145713 145796 32442ec 21 API calls 145711->145796 145715 3244691 EnterCriticalSection 145713->145715 145716 324460d 145713->145716 145714 3244574 145714->145709 145717 3244578 145714->145717 145722 32446ba LeaveCriticalSection 145715->145722 145795 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145716->145795 145719 3243536 2 API calls 145717->145719 145721 3244580 145719->145721 145720 3244617 145720->145715 145725 3244634 EnterCriticalSection 145720->145725 145723 324446c 29 API calls 145721->145723 145722->145702 145724 3244594 145723->145724 145724->145699 145726 3244675 LeaveCriticalSection 145725->145726 145726->145715 145727 3244689 145726->145727 145727->145715 145729 32436b0 145728->145729 145731 32436b4 145729->145731 145797 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145729->145797 145731->145683 145733 3241a7a 145732->145733 145735 3241a7f 145732->145735 145798 3241a2d EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145733->145798 145738 3241a84 145735->145738 145799 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145735->145799 145738->145683 145739 3241ab3 145739->145738 145800 3241a4f GetProcessHeap RtlFreeHeap 145739->145800 145741 32446d4 2 API calls 145740->145741 145743 3241ccd 145741->145743 145742 3241cfa 145742->145683 145743->145742 145744 3241cdd CryptUnprotectData 145743->145744 145744->145742 145745 3241d05 145744->145745 145745->145742 145746 3241d0c CryptProtectData 145745->145746 145746->145742 145801 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145747->145801 145749 3241bcb 145749->145683 145750->145685 145752 324446c 37 API calls 145751->145752 145753 3243ecc 145752->145753 145755 3243d76 10 API calls 145753->145755 145757 3243eeb 145753->145757 145754 3243536 2 API calls 145756 3243ef4 145754->145756 145755->145757 145756->145685 145757->145754 145759 3244e49 145758->145759 145766 3244e8a 145758->145766 145761 3243600 7 API calls 145759->145761 145762 3244e80 145761->145762 145804 324407d GetFileAttributesW 145762->145804 145763 3244eaa 145803 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145763->145803 145768 324167e LeaveCriticalSection 145766->145768 145802 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145766->145802 145767 3244eb4 145769 3243600 7 API calls 145767->145769 145768->145683 145770 3244ec2 FindFirstFileW 145769->145770 145771 3245183 145770->145771 145781 3244edf 145770->145781 145772 3243536 2 API calls 145771->145772 145773 324518a 145772->145773 145774 3243536 2 API calls 145773->145774 145774->145768 145775 3244f84 EnterCriticalSection 145777 3244e27 41 API calls 145775->145777 145778 3244f9f LeaveCriticalSection 145777->145778 145778->145781 145779 3244e27 41 API calls 145779->145781 145780 3243600 7 API calls 145780->145781 145781->145771 145781->145775 145781->145779 145781->145780 145782 3243eb6 41 API calls 145781->145782 145805 324407d GetFileAttributesW 145781->145805 145782->145781 145783->145683 145790 3243090 145784->145790 145785 3241156 FindFirstFileW 145785->145668 145785->145683 145787 324329d IsDBCSLeadByte 145788 32432aa MultiByteToWideChar 145787->145788 145787->145790 145788->145790 145789 3243308 IsDBCSLeadByte 145789->145790 145790->145785 145790->145787 145790->145789 145791 3243329 MultiByteToWideChar 145790->145791 145792 3242991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145790->145792 145791->145790 145792->145790 145793->145698 145794->145701 145795->145720 145796->145714 145797->145731 145798->145735 145799->145739 145800->145738 145801->145749 145802->145763 145803->145767 145804->145766 145805->145781 145806->145589 145807->145608 145808->145610 145809->145613 145810->145634 145812 3241d54 145811->145812 145813 3241f25 145811->145813 145812->145813 145814 3243600 7 API calls 145812->145814 145815 3241d75 FindFirstFileW 145814->145815 145815->145813 145816 3241d94 145815->145816 145834 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145816->145834 145818 3243600 7 API calls 145822 3241d9e 145818->145822 145819 3241f1c 145820 3243536 2 API calls 145819->145820 145820->145813 145822->145818 145822->145819 145823 3243536 2 API calls 145822->145823 145824 3241d3c 41 API calls 145822->145824 145825 3243eb6 41 API calls 145822->145825 145835 324408d 145822->145835 145823->145822 145824->145822 145825->145822 145827 32451ad 145826->145827 145828 32451ee 145826->145828 145841 3243508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145827->145841 145830 32451b7 145831 3244e27 44 API calls 145830->145831 145832 32451e7 145830->145832 145831->145830 145833 3243536 2 API calls 145832->145833 145833->145828 145834->145822 145836 3244095 145835->145836 145837 32440a7 145836->145837 145840 3243657 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145836->145840 145837->145822 145839 32440b7 145839->145822 145840->145839 145841->145830 145842 26fca5 145844 26fcb9 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 145842->145844 145843 26fcbf 145844->145843 145845 26fd40 145844->145845 145873 27762e 39 API calls 4 library calls 145844->145873 145864 2705aa 145845->145864 145850 26fd4e 145851 26fd5b 145850->145851 145874 2705e0 GetModuleHandleW 145851->145874 145853 26fd62 145854 26fd66 145853->145854 145855 26fdd0 145853->145855 145857 26fd6f 145854->145857 145875 27816c 21 API calls _unexpected 145854->145875 145877 2781b7 21 API calls _unexpected 145855->145877 145876 26ffd0 75 API calls ___scrt_uninitialize_crt 145857->145876 145860 26fdd6 145878 27817b 21 API calls _unexpected 145860->145878 145861 26fd77 145861->145843 145863 26fdde 145879 270e90 145864->145879 145866 2705bd GetStartupInfoW 145867 26fd46 145866->145867 145868 277e0a 145867->145868 145880 282f03 145868->145880 145870 277e13 145871 277e4d 145870->145871 145886 2831b6 39 API calls 145870->145886 145871->145850 145873->145845 145874->145853 145875->145857 145876->145861 145877->145860 145878->145863 145879->145866 145881 282f3e 145880->145881 145882 282f0c 145880->145882 145881->145870 145887 27a9ab 145882->145887 145886->145870 145888 27a9b6 145887->145888 145893 27a9bc 145887->145893 145938 27e015 6 API calls std::_Lockit::_Lockit 145888->145938 145891 27a9d6 145892 27a9c2 145891->145892 145894 27a9da 145891->145894 145896 27a9c7 145892->145896 145947 277134 39 API calls _unexpected 145892->145947 145893->145892 145939 27e054 6 API calls std::_Lockit::_Lockit 145893->145939 145940 27db5d 14 API calls 2 library calls 145894->145940 145915 282d0e 145896->145915 145899 27a9e6 145900 27aa03 145899->145900 145901 27a9ee 145899->145901 145943 27e054 6 API calls std::_Lockit::_Lockit 145900->145943 145941 27e054 6 API calls std::_Lockit::_Lockit 145901->145941 145904 27a9fa 145942 27abdb 14 API calls 2 library calls 145904->145942 145905 27aa0f 145906 27aa13 145905->145906 145907 27aa22 145905->145907 145944 27e054 6 API calls std::_Lockit::_Lockit 145906->145944 145945 27a71e 14 API calls __Wcrtomb 145907->145945 145911 27aa00 145911->145892 145912 27aa2d 145946 27abdb 14 API calls 2 library calls 145912->145946 145914 27aa34 145914->145896 145948 282e63 145915->145948 145920 282d51 145920->145881 145923 282d78 145973 282f61 145923->145973 145924 282d6a 145984 27abdb 14 API calls 2 library calls 145924->145984 145928 282db0 145985 2753de 14 API calls __Wcrtomb 145928->145985 145930 282df7 145937 282e40 145930->145937 145988 282987 39 API calls 2 library calls 145930->145988 145931 282db5 145986 27abdb 14 API calls 2 library calls 145931->145986 145932 282dcb 145932->145930 145987 27abdb 14 API calls 2 library calls 145932->145987 145989 27abdb 14 API calls 2 library calls 145937->145989 145938->145893 145939->145891 145940->145899 145941->145904 145942->145911 145943->145905 145944->145904 145945->145912 145946->145914 145949 282e6f ___scrt_is_nonwritable_in_current_image 145948->145949 145955 282e89 145949->145955 145990 2749ca EnterCriticalSection 145949->145990 145951 282ec5 145992 282ee2 LeaveCriticalSection std::_Lockit::~_Lockit 145951->145992 145954 282d38 145959 282a95 145954->145959 145955->145954 145993 277134 39 API calls _unexpected 145955->145993 145957 282e99 145957->145951 145991 27abdb 14 API calls 2 library calls 145957->145991 145994 277178 145959->145994 145961 282aa7 145962 282ac8 145961->145962 145963 282ab6 GetOEMCP 145961->145963 145964 282adf 145962->145964 145965 282acd GetACP 145962->145965 145963->145964 145964->145920 145966 27ac15 145964->145966 145965->145964 145967 27ac53 145966->145967 145968 27ac23 __Wcrtomb 145966->145968 146005 2753de 14 API calls __Wcrtomb 145967->146005 145968->145967 145969 27ac3e RtlAllocateHeap 145968->145969 146004 277694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 145968->146004 145969->145968 145971 27ac51 145969->145971 145971->145923 145971->145924 145974 282a95 41 API calls 145973->145974 145976 282f81 145974->145976 145975 283086 146017 27003d 145975->146017 145976->145975 145978 282fbe IsValidCodePage 145976->145978 145982 282fd9 __fread_nolock 145976->145982 145978->145975 145979 282fd0 145978->145979 145981 282ff9 GetCPInfo 145979->145981 145979->145982 145980 282da5 145980->145928 145980->145932 145981->145975 145981->145982 146006 282b69 145982->146006 145984->145920 145985->145931 145986->145920 145987->145930 145988->145937 145989->145920 145990->145957 145991->145951 145992->145955 145995 277196 145994->145995 146001 27a8f0 39 API calls 3 library calls 145995->146001 145997 2771b7 146002 27ac63 39 API calls __Getctype 145997->146002 145999 2771cd 146003 27acc1 39 API calls ctype 145999->146003 146001->145997 146002->145999 146004->145968 146005->145971 146007 282b91 GetCPInfo 146006->146007 146008 282c5a 146006->146008 146007->146008 146014 282ba9 146007->146014 146009 27003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146008->146009 146011 282d0c 146009->146011 146011->145975 146024 27ece1 146014->146024 146016 27efd1 44 API calls 146016->146008 146018 270046 IsProcessorFeaturePresent 146017->146018 146019 270045 146017->146019 146021 27072d 146018->146021 146019->145980 146102 2706f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 146021->146102 146023 270810 146023->145980 146025 277178 ctype 39 API calls 146024->146025 146026 27ed01 146025->146026 146044 281e03 146026->146044 146028 27edbd 146030 27003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146028->146030 146029 27edb5 146047 26faaa 14 API calls ___vcrt_freefls@4 146029->146047 146032 27ede0 146030->146032 146031 27ed2e 146031->146028 146031->146029 146034 27ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 146031->146034 146035 27ed53 __fread_nolock ctype 146031->146035 146039 27efd1 146032->146039 146034->146035 146035->146029 146036 281e03 __fread_nolock MultiByteToWideChar 146035->146036 146037 27ed9c 146036->146037 146037->146029 146038 27eda3 GetStringTypeW 146037->146038 146038->146029 146040 277178 ctype 39 API calls 146039->146040 146041 27efe4 146040->146041 146050 27ede2 146041->146050 146048 281d6b 146044->146048 146047->146028 146049 281d7c MultiByteToWideChar 146048->146049 146049->146031 146051 27edfd ctype 146050->146051 146052 281e03 __fread_nolock MultiByteToWideChar 146051->146052 146056 27ee41 146052->146056 146053 27003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146054 27efcf 146053->146054 146054->146016 146055 27ee67 ctype 146060 281e03 __fread_nolock MultiByteToWideChar 146055->146060 146070 27ef0f 146055->146070 146056->146055 146057 27ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 146056->146057 146059 27efbc 146056->146059 146056->146070 146057->146055 146059->146053 146061 27eeb0 146060->146061 146061->146070 146078 27e1d3 146061->146078 146064 27eee6 146069 27e1d3 std::_Locinfo::_Locinfo_ctor 7 API calls 146064->146069 146064->146070 146065 27ef1e 146066 27efa7 146065->146066 146067 27ac15 std::_Locinfo::_Locinfo_ctor 15 API calls 146065->146067 146071 27ef30 ctype 146065->146071 146089 26faaa 14 API calls ___vcrt_freefls@4 146066->146089 146067->146071 146069->146070 146090 26faaa 14 API calls ___vcrt_freefls@4 146070->146090 146071->146066 146072 27e1d3 std::_Locinfo::_Locinfo_ctor 7 API calls 146071->146072 146073 27ef73 146072->146073 146073->146066 146087 281ebd WideCharToMultiByte _Fputc 146073->146087 146075 27ef8d 146075->146066 146076 27ef96 146075->146076 146088 26faaa 14 API calls ___vcrt_freefls@4 146076->146088 146091 27dd60 146078->146091 146081 27e1e4 LCMapStringEx 146086 27e22b 146081->146086 146082 27e20b 146094 27e230 5 API calls std::_Locinfo::_Locinfo_ctor 146082->146094 146085 27e224 LCMapStringW 146085->146086 146086->146064 146086->146065 146086->146070 146087->146075 146088->146070 146089->146070 146090->146059 146095 27de5f 146091->146095 146094->146085 146096 27de8f 146095->146096 146099 27dd76 146095->146099 146097 27dd94 std::_Lockit::_Lockit LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 146096->146097 146096->146099 146098 27dea3 146097->146098 146098->146099 146100 27dea9 GetProcAddress 146098->146100 146099->146081 146099->146082 146100->146099 146101 27deb9 std::_Lockit::_Lockit 146100->146101 146101->146099 146102->146023 146103 21f3c4 146122 21f3cd 146103->146122 146104 21f698 std::runtime_error::runtime_error _strlen 146105 21f6f6 InternetOpenUrlA 146104->146105 146106 21f782 InternetReadFile 146105->146106 146107 21f734 FreeLibrary 146105->146107 146108 21f7b2 146106->146108 146109 21f7bb 146106->146109 146114 21f75f 146107->146114 146108->146106 146108->146109 146111 21f7df InternetCloseHandle 146108->146111 146127 224c60 146108->146127 146109->146111 146120 21f811 FreeLibrary 146111->146120 146112 21f5c9 146115 21f6a0 146112->146115 146116 21f676 146112->146116 146135 214120 39 API calls task 146114->146135 146134 274870 15 API calls 146115->146134 146133 274870 15 API calls 146116->146133 146124 21f82a std::ios_base::failure::failure 146120->146124 146122->146104 146122->146112 146131 211d90 15 API calls 146122->146131 146132 211de0 20 API calls 146122->146132 146136 214120 39 API calls task 146124->146136 146125 21f77a 146128 224ccd 146127->146128 146130 224c80 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 146127->146130 146128->146130 146137 2119b0 146128->146137 146130->146108 146131->146122 146132->146122 146133->146104 146134->146104 146135->146125 146136->146125 146138 2119d0 Concurrency::task_continuation_context::task_continuation_context 146137->146138 146140 2119dd Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 146138->146140 146148 223fc0 41 API calls std::_Xinvalid_argument 146138->146148 146145 2113d0 146140->146145 146142 211a16 std::ios_base::failure::failure Concurrency::cancellation_token_source::~cancellation_token_source Concurrency::task_continuation_context::task_continuation_context 146143 211a89 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 146142->146143 146149 223410 39 API calls allocator 146142->146149 146143->146130 146150 2113b0 146145->146150 146147 2113f0 allocator Concurrency::task_continuation_context::task_continuation_context 146147->146142 146148->146140 146149->146143 146153 224bc0 146150->146153 146154 224bd0 allocator 146153->146154 146157 211370 146154->146157 146158 211378 allocator 146157->146158 146159 211396 146158->146159 146160 211388 146158->146160 146161 211391 146159->146161 146172 223220 146159->146172 146164 211460 146160->146164 146161->146147 146165 211477 146164->146165 146166 21147c 146164->146166 146175 223d80 RaiseException stdext::threads::lock_error::lock_error std::_Xinvalid_argument 146165->146175 146167 223220 allocator 16 API calls 146166->146167 146169 211485 146167->146169 146171 2114a0 146169->146171 146176 27458f 39 API calls 2 library calls 146169->146176 146171->146161 146177 26fb05 146172->146177 146175->146166 146180 26fb0a 146177->146180 146179 22322c 146179->146161 146180->146179 146182 26fb26 std::_Facet_Register 146180->146182 146187 274a40 146180->146187 146194 277694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 146180->146194 146183 270371 stdext::threads::lock_error::lock_error 146182->146183 146195 27106c RaiseException 146182->146195 146196 27106c RaiseException 146183->146196 146186 27038e 146192 27ac15 __Wcrtomb 146187->146192 146188 27ac53 146198 2753de 14 API calls __Wcrtomb 146188->146198 146189 27ac3e RtlAllocateHeap 146191 27ac51 146189->146191 146189->146192 146191->146180 146192->146188 146192->146189 146197 277694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 146192->146197 146194->146180 146195->146183 146196->146186 146197->146192 146198->146191 146199 215ed9 146210 215ee2 146199->146210 146200 2161ae 146201 2161f5 LoadLibraryA 146200->146201 146202 216205 146201->146202 146227 21621e 146201->146227 146204 2161b6 146618 274870 15 API calls 146204->146618 146205 21618c 146617 274870 15 API calls 146205->146617 146206 2160de 146206->146204 146206->146205 146210->146200 146210->146206 146615 211d90 15 API calls 146210->146615 146616 211de0 20 API calls 146210->146616 146211 21680d 146212 216854 GetProcAddress 146211->146212 146241 216877 146212->146241 146213 21642c 146215 216503 146213->146215 146216 2164d9 146213->146216 146622 274870 15 API calls 146215->146622 146621 274870 15 API calls 146216->146621 146220 21673e 146222 216815 146220->146222 146223 2167eb 146220->146223 146626 274870 15 API calls 146222->146626 146625 274870 15 API calls 146223->146625 146227->146213 146228 2164fb 146227->146228 146619 211d90 15 API calls 146227->146619 146620 211de0 20 API calls 146227->146620 146228->146211 146228->146220 146623 211d90 15 API calls 146228->146623 146624 211de0 20 API calls 146228->146624 146230 216a73 146231 216b21 146230->146231 146232 216b4b 146230->146232 146629 274870 15 API calls 146231->146629 146630 274870 15 API calls 146232->146630 146237 216e34 146633 274870 15 API calls 146237->146633 146238 216e5e 146634 274870 15 API calls 146238->146634 146239 216d86 146239->146237 146239->146238 146241->146230 146249 216b43 146241->146249 146627 211d90 15 API calls 146241->146627 146628 211de0 20 API calls 146241->146628 146244 217099 146246 217171 146244->146246 146247 217147 146244->146247 146638 274870 15 API calls 146246->146638 146637 274870 15 API calls 146247->146637 146249->146239 146256 216e56 146249->146256 146631 211d90 15 API calls 146249->146631 146632 211de0 20 API calls 146249->146632 146253 2173ac 146254 217484 146253->146254 146255 21745a 146253->146255 146642 274870 15 API calls 146254->146642 146641 274870 15 API calls 146255->146641 146256->146244 146267 217169 146256->146267 146635 211d90 15 API calls 146256->146635 146636 211de0 20 API calls 146256->146636 146260 2176bf 146262 217797 146260->146262 146263 21776d 146260->146263 146646 274870 15 API calls 146262->146646 146645 274870 15 API calls 146263->146645 146265 2179d2 146270 217a80 146265->146270 146271 217aaa 146265->146271 146267->146253 146275 21747c 146267->146275 146639 211d90 15 API calls 146267->146639 146640 211de0 20 API calls 146267->146640 146649 274870 15 API calls 146270->146649 146650 274870 15 API calls 146271->146650 146273 217ce5 146278 217d93 146273->146278 146279 217dbd 146273->146279 146275->146260 146282 21778f 146275->146282 146643 211d90 15 API calls 146275->146643 146644 211de0 20 API calls 146275->146644 146653 274870 15 API calls 146278->146653 146654 274870 15 API calls 146279->146654 146280 217ff8 146287 2180d0 146280->146287 146288 2180a6 146280->146288 146282->146265 146290 217aa2 146282->146290 146647 211d90 15 API calls 146282->146647 146648 211de0 20 API calls 146282->146648 146286 2186ee 146289 218735 GetProcAddress 146286->146289 146658 274870 15 API calls 146287->146658 146657 274870 15 API calls 146288->146657 146320 218758 146289->146320 146290->146273 146302 217db5 146290->146302 146651 211d90 15 API calls 146290->146651 146652 211de0 20 API calls 146290->146652 146295 21830b 146296 2183e3 146295->146296 146297 2183b9 146295->146297 146662 274870 15 API calls 146296->146662 146661 274870 15 API calls 146297->146661 146300 21861e 146304 2186f6 146300->146304 146305 2186cc 146300->146305 146302->146280 146307 2180c8 146302->146307 146655 211d90 15 API calls 146302->146655 146656 211de0 20 API calls 146302->146656 146666 274870 15 API calls 146304->146666 146665 274870 15 API calls 146305->146665 146307->146295 146310 2183db 146307->146310 146659 211d90 15 API calls 146307->146659 146660 211de0 20 API calls 146307->146660 146310->146286 146310->146300 146663 211d90 15 API calls 146310->146663 146664 211de0 20 API calls 146310->146664 146312 218a02 146669 274870 15 API calls 146312->146669 146313 218a2c 146670 274870 15 API calls 146313->146670 146314 218954 146314->146312 146314->146313 146315 218c67 146321 218d15 146315->146321 146322 218d3f 146315->146322 146320->146314 146330 218a24 146320->146330 146667 211d90 15 API calls 146320->146667 146668 211de0 20 API calls 146320->146668 146673 274870 15 API calls 146321->146673 146674 274870 15 API calls 146322->146674 146327 219052 146678 274870 15 API calls 146327->146678 146328 219028 146677 274870 15 API calls 146328->146677 146329 218f7a 146329->146327 146329->146328 146330->146315 146343 218d37 146330->146343 146671 211d90 15 API calls 146330->146671 146672 211de0 20 API calls 146330->146672 146334 2199a1 146337 2199e8 GetProcAddress 146334->146337 146335 21928d 146338 219365 146335->146338 146339 21933b 146335->146339 146377 219a14 146337->146377 146682 274870 15 API calls 146338->146682 146681 274870 15 API calls 146339->146681 146341 2195a0 146346 219678 146341->146346 146347 21964e 146341->146347 146343->146329 146350 21904a 146343->146350 146675 211d90 15 API calls 146343->146675 146676 211de0 20 API calls 146343->146676 146686 274870 15 API calls 146346->146686 146685 274870 15 API calls 146347->146685 146350->146335 146357 21935d 146350->146357 146679 211d90 15 API calls 146350->146679 146680 211de0 20 API calls 146350->146680 146353 2198cb 146354 2199a9 146353->146354 146355 21997f 146353->146355 146690 274870 15 API calls 146354->146690 146689 274870 15 API calls 146355->146689 146357->146341 146360 219670 146357->146360 146683 211d90 15 API calls 146357->146683 146684 211de0 20 API calls 146357->146684 146360->146334 146360->146353 146687 211d90 15 API calls 146360->146687 146688 211de0 20 API calls 146360->146688 146362 219c1f 146363 219cd2 146362->146363 146364 219cfc 146362->146364 146693 274870 15 API calls 146363->146693 146694 274870 15 API calls 146364->146694 146368 219f4f 146370 21a002 146368->146370 146371 21a02c 146368->146371 146697 274870 15 API calls 146370->146697 146698 274870 15 API calls 146371->146698 146374 21a27f 146380 21a332 146374->146380 146381 21a35c 146374->146381 146376 21a684 146379 21a9b4 146376->146379 146394 21a8df 146376->146394 146707 211d90 15 API calls 146376->146707 146708 211de0 20 API calls 146376->146708 146377->146362 146386 219cf4 146377->146386 146691 211d90 15 API calls 146377->146691 146692 211de0 20 API calls 146377->146692 146389 21ac0f 146379->146389 146424 21ace4 146379->146424 146711 211d90 15 API calls 146379->146711 146712 211de0 20 API calls 146379->146712 146701 274870 15 API calls 146380->146701 146702 274870 15 API calls 146381->146702 146382 21a024 146382->146374 146390 21a354 146382->146390 146699 211d90 15 API calls 146382->146699 146700 211de0 20 API calls 146382->146700 146385 21a5af 146391 21a662 146385->146391 146392 21a68c 146385->146392 146386->146368 146386->146382 146695 211d90 15 API calls 146386->146695 146696 211de0 20 API calls 146386->146696 146404 21acc2 146389->146404 146405 21acec 146389->146405 146390->146376 146390->146385 146703 211d90 15 API calls 146390->146703 146704 211de0 20 API calls 146390->146704 146705 274870 15 API calls 146391->146705 146706 274870 15 API calls 146392->146706 146398 21a992 146394->146398 146399 21a9bc 146394->146399 146709 274870 15 API calls 146398->146709 146710 274870 15 API calls 146399->146710 146713 274870 15 API calls 146404->146713 146714 274870 15 API calls 146405->146714 146410 21b6bb GetProcAddress 146446 21b6e7 146410->146446 146411 21af3f 146412 21aff2 146411->146412 146413 21b01c 146411->146413 146717 274870 15 API calls 146412->146717 146718 274870 15 API calls 146413->146718 146415 21b26f 146419 21b322 146415->146419 146420 21b34c 146415->146420 146721 274870 15 API calls 146419->146721 146722 274870 15 API calls 146420->146722 146421 21b014 146421->146415 146427 21b344 146421->146427 146719 211d90 15 API calls 146421->146719 146720 211de0 20 API calls 146421->146720 146424->146411 146424->146421 146715 211d90 15 API calls 146424->146715 146716 211de0 20 API calls 146424->146716 146428 21b59f 146427->146428 146434 21b674 146427->146434 146723 211d90 15 API calls 146427->146723 146724 211de0 20 API calls 146427->146724 146429 21b652 146428->146429 146430 21b67c 146428->146430 146725 274870 15 API calls 146429->146725 146726 274870 15 API calls 146430->146726 146434->146410 146436 21b8f2 146437 21b9d0 146436->146437 146438 21b9a6 146436->146438 146730 274870 15 API calls 146437->146730 146729 274870 15 API calls 146438->146729 146439 21c68c 146442 21c6e5 FreeLibrary 146439->146442 146490 21c708 146439->146490 146442->146202 146444 21bc23 146447 21bd01 146444->146447 146448 21bcd7 146444->146448 146446->146436 146458 21b9c8 146446->146458 146727 211d90 15 API calls 146446->146727 146728 211de0 20 API calls 146446->146728 146734 274870 15 API calls 146447->146734 146733 274870 15 API calls 146448->146733 146450 21bf54 146454 21c032 146450->146454 146455 21c008 146450->146455 146738 274870 15 API calls 146454->146738 146737 274870 15 API calls 146455->146737 146458->146444 146466 21bcf9 146458->146466 146731 211d90 15 API calls 146458->146731 146732 211de0 20 API calls 146458->146732 146461 21c285 146462 21c363 146461->146462 146463 21c339 146461->146463 146742 274870 15 API calls 146462->146742 146741 274870 15 API calls 146463->146741 146464 21c5b6 146470 21c694 146464->146470 146471 21c66a 146464->146471 146466->146450 146472 21c02a 146466->146472 146735 211d90 15 API calls 146466->146735 146736 211de0 20 API calls 146466->146736 146746 274870 15 API calls 146470->146746 146745 274870 15 API calls 146471->146745 146472->146461 146476 21c35b 146472->146476 146739 211d90 15 API calls 146472->146739 146740 211de0 20 API calls 146472->146740 146476->146439 146476->146464 146743 211d90 15 API calls 146476->146743 146744 211de0 20 API calls 146476->146744 146478 21c9e1 146749 274870 15 API calls 146478->146749 146479 21ca0b 146750 274870 15 API calls 146479->146750 146480 21c92e 146480->146478 146480->146479 146484 21cc5e 146486 21cd11 146484->146486 146487 21cd3b 146484->146487 146753 274870 15 API calls 146486->146753 146754 274870 15 API calls 146487->146754 146490->146480 146499 21ca03 146490->146499 146747 211d90 15 API calls 146490->146747 146748 211de0 20 API calls 146490->146748 146493 21cf8e 146494 21d041 146493->146494 146495 21d06b 146493->146495 146757 274870 15 API calls 146494->146757 146758 274870 15 API calls 146495->146758 146497 21d2be 146502 21d371 146497->146502 146503 21d39b 146497->146503 146499->146484 146506 21cd33 146499->146506 146751 211d90 15 API calls 146499->146751 146752 211de0 20 API calls 146499->146752 146761 274870 15 API calls 146502->146761 146762 274870 15 API calls 146503->146762 146504 21d5ee 146510 21d6a1 146504->146510 146511 21d6cb 146504->146511 146506->146493 146512 21d063 146506->146512 146755 211d90 15 API calls 146506->146755 146756 211de0 20 API calls 146506->146756 146765 274870 15 API calls 146510->146765 146766 274870 15 API calls 146511->146766 146512->146497 146516 21d393 146512->146516 146759 211d90 15 API calls 146512->146759 146760 211de0 20 API calls 146512->146760 146516->146504 146531 21d6c3 146516->146531 146763 211d90 15 API calls 146516->146763 146764 211de0 20 API calls 146516->146764 146518 21d936 146519 21da13 146518->146519 146520 21d9e9 146518->146520 146770 274870 15 API calls 146519->146770 146769 274870 15 API calls 146520->146769 146523 21dc66 146526 21dd43 146523->146526 146527 21dd19 146523->146527 146774 274870 15 API calls 146526->146774 146773 274870 15 API calls 146527->146773 146529 21df96 146534 21e073 146529->146534 146535 21e049 146529->146535 146531->146518 146537 21da0b 146531->146537 146767 211d90 15 API calls 146531->146767 146768 211de0 20 API calls 146531->146768 146778 274870 15 API calls 146534->146778 146777 274870 15 API calls 146535->146777 146537->146523 146546 21dd3b 146537->146546 146771 211d90 15 API calls 146537->146771 146772 211de0 20 API calls 146537->146772 146541 21e9dd 146545 21ea38 InternetOpenA 146541->146545 146542 21e2c6 146543 21e3a3 146542->146543 146544 21e379 146542->146544 146782 274870 15 API calls 146543->146782 146781 274870 15 API calls 146544->146781 146578 21ea57 146545->146578 146546->146529 146554 21e06b 146546->146554 146775 211d90 15 API calls 146546->146775 146776 211de0 20 API calls 146546->146776 146551 21e6b5 146786 274870 15 API calls 146551->146786 146552 21e68b 146785 274870 15 API calls 146552->146785 146553 21e5de 146553->146551 146553->146552 146554->146542 146565 21e39b 146554->146565 146779 211d90 15 API calls 146554->146779 146780 211de0 20 API calls 146554->146780 146558 21e908 146561 21e9e5 146558->146561 146562 21e9bb 146558->146562 146560 21f036 146564 21f074 FreeLibrary 146560->146564 146601 21f097 146560->146601 146790 274870 15 API calls 146561->146790 146789 274870 15 API calls 146562->146789 146564->146202 146565->146553 146568 21e6ad 146565->146568 146783 211d90 15 API calls 146565->146783 146784 211de0 20 API calls 146565->146784 146568->146541 146568->146558 146787 211d90 15 API calls 146568->146787 146788 211de0 20 API calls 146568->146788 146570 21ec53 146571 21ed01 146570->146571 146572 21ed2b 146570->146572 146793 274870 15 API calls 146571->146793 146794 274870 15 API calls 146572->146794 146574 21ef66 146579 21f014 146574->146579 146580 21f03e 146574->146580 146578->146570 146587 21ed23 146578->146587 146791 211d90 15 API calls 146578->146791 146792 211de0 20 API calls 146578->146792 146797 274870 15 API calls 146579->146797 146798 274870 15 API calls 146580->146798 146584 21f2a5 146589 21f352 146584->146589 146590 21f37c 146584->146590 146585 21f698 std::runtime_error::runtime_error _strlen 146588 21f6f6 InternetOpenUrlA 146585->146588 146587->146560 146587->146574 146795 211d90 15 API calls 146587->146795 146796 211de0 20 API calls 146587->146796 146591 21f782 InternetReadFile 146588->146591 146592 21f734 FreeLibrary 146588->146592 146801 274870 15 API calls 146589->146801 146802 274870 15 API calls 146590->146802 146596 21f7b2 146591->146596 146597 21f7bb 146591->146597 146604 21f75f 146592->146604 146596->146591 146596->146597 146600 21f7df InternetCloseHandle 146596->146600 146605 224c60 std::ios_base::failure::failure 41 API calls 146596->146605 146597->146600 146610 21f811 FreeLibrary 146600->146610 146601->146584 146613 21f374 146601->146613 146799 211d90 15 API calls 146601->146799 146800 211de0 20 API calls 146601->146800 146602 21f6a0 146806 274870 15 API calls 146602->146806 146603 21f676 146805 274870 15 API calls 146603->146805 146807 214120 39 API calls task 146604->146807 146605->146596 146606 21f5c9 146606->146602 146606->146603 146612 21f82a std::ios_base::failure::failure 146610->146612 146808 214120 39 API calls task 146612->146808 146613->146585 146613->146606 146803 211d90 15 API calls 146613->146803 146804 211de0 20 API calls 146613->146804 146615->146210 146616->146210 146617->146200 146618->146200 146619->146227 146620->146227 146621->146228 146622->146228 146623->146228 146624->146228 146625->146211 146626->146211 146627->146241 146628->146241 146629->146249 146630->146249 146631->146249 146632->146249 146633->146256 146634->146256 146635->146256 146636->146256 146637->146267 146638->146267 146639->146267 146640->146267 146641->146275 146642->146275 146643->146275 146644->146275 146645->146282 146646->146282 146647->146282 146648->146282 146649->146290 146650->146290 146651->146290 146652->146290 146653->146302 146654->146302 146655->146302 146656->146302 146657->146307 146658->146307 146659->146307 146660->146307 146661->146310 146662->146310 146663->146310 146664->146310 146665->146286 146666->146286 146667->146320 146668->146320 146669->146330 146670->146330 146671->146330 146672->146330 146673->146343 146674->146343 146675->146343 146676->146343 146677->146350 146678->146350 146679->146350 146680->146350 146681->146357 146682->146357 146683->146357 146684->146357 146685->146360 146686->146360 146687->146360 146688->146360 146689->146334 146690->146334 146691->146377 146692->146377 146693->146386 146694->146386 146695->146386 146696->146386 146697->146382 146698->146382 146699->146382 146700->146382 146701->146390 146702->146390 146703->146390 146704->146390 146705->146376 146706->146376 146707->146376 146708->146376 146709->146379 146710->146379 146711->146379 146712->146379 146713->146424 146714->146424 146715->146424 146716->146424 146717->146421 146718->146421 146719->146421 146720->146421 146721->146427 146722->146427 146723->146427 146724->146427 146725->146434 146726->146434 146727->146446 146728->146446 146729->146458 146730->146458 146731->146458 146732->146458 146733->146466 146734->146466 146735->146466 146736->146466 146737->146472 146738->146472 146739->146472 146740->146472 146741->146476 146742->146476 146743->146476 146744->146476 146745->146439 146746->146439 146747->146490 146748->146490 146749->146499 146750->146499 146751->146499 146752->146499 146753->146506 146754->146506 146755->146506 146756->146506 146757->146512 146758->146512 146759->146512 146760->146512 146761->146516 146762->146516 146763->146516 146764->146516 146765->146531 146766->146531 146767->146531 146768->146531 146769->146537 146770->146537 146771->146537 146772->146537 146773->146546 146774->146546 146775->146546 146776->146546 146777->146554 146778->146554 146779->146554 146780->146554 146781->146565 146782->146565 146783->146565 146784->146565 146785->146568 146786->146568 146787->146568 146788->146568 146789->146541 146790->146541 146791->146578 146792->146578 146793->146587 146794->146587 146795->146587 146796->146587 146797->146560 146798->146560 146799->146601 146800->146601 146801->146613 146802->146613 146803->146613 146804->146613 146805->146585 146806->146585 146807->146202 146808->146202 146809 26fe5f 146810 26fe68 146809->146810 146817 27013c IsProcessorFeaturePresent 146810->146817 146812 26fe74 146818 272f0e 10 API calls 2 library calls 146812->146818 146814 26fe7d 146815 26fe79 146815->146814 146819 272f2d 7 API calls 2 library calls 146815->146819 146817->146812 146818->146815 146819->146814 146820 225d29 146830 225d32 146820->146830 146822 225f2e 146823 226006 146822->146823 146824 225fdc 146822->146824 147095 274870 15 API calls 146823->147095 147094 274870 15 API calls 146824->147094 146829 226250 146831 226327 146829->146831 146832 2262fd 146829->146832 146830->146822 146841 225ffe 146830->146841 147092 211d90 15 API calls 146830->147092 147093 211de0 20 API calls 146830->147093 147099 274870 15 API calls 146831->147099 147098 274870 15 API calls 146832->147098 146833 226562 146838 226639 146833->146838 146839 22660f 146833->146839 147103 274870 15 API calls 146838->147103 147102 274870 15 API calls 146839->147102 146841->146829 146850 22631f 146841->146850 147061 22c4b7 146841->147061 147096 211d90 15 API calls 146841->147096 147097 211de0 20 API calls 146841->147097 146844 226880 146846 226958 146844->146846 146847 22692e 146844->146847 147107 274870 15 API calls 146846->147107 147106 274870 15 API calls 146847->147106 146848 226b93 146854 226c41 146848->146854 146855 226c6b 146848->146855 146850->146833 146856 226631 146850->146856 147100 211d90 15 API calls 146850->147100 147101 211de0 20 API calls 146850->147101 147110 274870 15 API calls 146854->147110 147111 274870 15 API calls 146855->147111 146856->146844 146868 226950 146856->146868 147104 211d90 15 API calls 146856->147104 147105 211de0 20 API calls 146856->147105 146860 226eb7 146862 226f64 146860->146862 146863 226f8e 146860->146863 147114 274870 15 API calls 146862->147114 147115 274870 15 API calls 146863->147115 146866 2271c9 146870 2272a0 146866->146870 146871 227276 146866->146871 146868->146848 146875 226c63 146868->146875 147108 211d90 15 API calls 146868->147108 147109 211de0 20 API calls 146868->147109 147119 274870 15 API calls 146870->147119 147118 274870 15 API calls 146871->147118 146873 2274e7 146878 227595 146873->146878 146879 2275bf 146873->146879 146875->146860 146882 226f86 146875->146882 147112 211d90 15 API calls 146875->147112 147113 211de0 20 API calls 146875->147113 147122 274870 15 API calls 146878->147122 147123 274870 15 API calls 146879->147123 146880 2277fa 146886 2278d2 146880->146886 146887 2278a8 146880->146887 146882->146866 146888 227298 146882->146888 147116 211d90 15 API calls 146882->147116 147117 211de0 20 API calls 146882->147117 147127 274870 15 API calls 146886->147127 147126 274870 15 API calls 146887->147126 146888->146873 146896 2275b7 146888->146896 147120 211d90 15 API calls 146888->147120 147121 211de0 20 API calls 146888->147121 146893 227be5 147131 274870 15 API calls 146893->147131 146894 227bbb 147130 274870 15 API calls 146894->147130 146895 227b0d 146895->146893 146895->146894 146896->146880 146908 2278ca 146896->146908 147124 211d90 15 API calls 146896->147124 147125 211de0 20 API calls 146896->147125 146900 227e20 146903 227ef8 146900->146903 146904 227ece 146900->146904 146902 228b71 VirtualAlloc 146960 228ba8 146902->146960 147135 274870 15 API calls 146903->147135 147134 274870 15 API calls 146904->147134 146906 228133 146911 2281e1 146906->146911 146912 22820b 146906->146912 146908->146895 146916 227bdd 146908->146916 147128 211d90 15 API calls 146908->147128 147129 211de0 20 API calls 146908->147129 147138 274870 15 API calls 146911->147138 147139 274870 15 API calls 146912->147139 146914 228446 146919 2284f4 146914->146919 146920 22851e 146914->146920 146916->146900 146922 227ef0 146916->146922 147132 211d90 15 API calls 146916->147132 147133 211de0 20 API calls 146916->147133 147142 274870 15 API calls 146919->147142 147143 274870 15 API calls 146920->147143 146922->146906 146929 228203 146922->146929 147136 211d90 15 API calls 146922->147136 147137 211de0 20 API calls 146922->147137 146926 228831 147147 274870 15 API calls 146926->147147 146927 228807 147146 274870 15 API calls 146927->147146 146928 228759 146928->146926 146928->146927 146929->146914 146941 228516 146929->146941 147140 211d90 15 API calls 146929->147140 147141 211de0 20 API calls 146929->147141 146933 228a6c 146936 228b44 146933->146936 146937 228b1a 146933->146937 146935 2297c2 146948 229815 VirtualAlloc 146935->146948 146983 22985a 146935->146983 147151 274870 15 API calls 146936->147151 147150 274870 15 API calls 146937->147150 146939 228db3 146944 228e91 146939->146944 146945 228e67 146939->146945 146941->146928 146951 228829 146941->146951 147144 211d90 15 API calls 146941->147144 147145 211de0 20 API calls 146941->147145 147155 274870 15 API calls 146944->147155 147154 274870 15 API calls 146945->147154 146946 228b3c 146946->146902 146954 22983f 146948->146954 146948->146983 146949 2290cc 146955 2291a4 146949->146955 146956 22917a 146949->146956 146951->146902 146951->146933 147148 211d90 15 API calls 146951->147148 147149 211de0 20 API calls 146951->147149 147168 27106c RaiseException 146954->147168 147159 274870 15 API calls 146955->147159 147158 274870 15 API calls 146956->147158 146957 2293df 146964 2294b7 146957->146964 146965 22948d 146957->146965 146960->146939 146966 228e89 146960->146966 147152 211d90 15 API calls 146960->147152 147153 211de0 20 API calls 146960->147153 147163 274870 15 API calls 146964->147163 147162 274870 15 API calls 146965->147162 146966->146949 146975 22919c 146966->146975 147156 211d90 15 API calls 146966->147156 147157 211de0 20 API calls 146966->147157 146970 2296f2 146972 2297a0 146970->146972 146973 2297ca 146970->146973 147166 274870 15 API calls 146972->147166 147167 274870 15 API calls 146973->147167 146975->146957 146978 2294af 146975->146978 147160 211d90 15 API calls 146975->147160 147161 211de0 20 API calls 146975->147161 146978->146935 146978->146970 147164 211d90 15 API calls 146978->147164 147165 211de0 20 API calls 146978->147165 146979 229a68 146984 229b40 146979->146984 146985 229b16 146979->146985 146980 229e4b 146982 22a16a 146980->146982 146999 22a09a 146980->146999 147177 211d90 15 API calls 146980->147177 147178 211de0 20 API calls 146980->147178 147003 22a3ad 146982->147003 147026 22a47d 146982->147026 147181 211d90 15 API calls 146982->147181 147182 211de0 20 API calls 146982->147182 146983->146979 146992 229b38 146983->146992 147169 211d90 15 API calls 146983->147169 147170 211de0 20 API calls 146983->147170 147172 274870 15 API calls 146984->147172 147171 274870 15 API calls 146985->147171 146987 229d7b 146993 229e53 146987->146993 146994 229e29 146987->146994 146991 22a79a 147017 22a9dd 146991->147017 147038 22aaad 146991->147038 147189 211d90 15 API calls 146991->147189 147190 211de0 20 API calls 146991->147190 146992->146980 146992->146987 147173 211d90 15 API calls 146992->147173 147174 211de0 20 API calls 146992->147174 147176 274870 15 API calls 146993->147176 147175 274870 15 API calls 146994->147175 147000 22a172 146999->147000 147001 22a148 146999->147001 147180 274870 15 API calls 147000->147180 147179 274870 15 API calls 147001->147179 147007 22a485 147003->147007 147008 22a45b 147003->147008 147184 274870 15 API calls 147007->147184 147183 274870 15 API calls 147008->147183 147013 22a6ca 147014 22a7a2 147013->147014 147015 22a778 147013->147015 147188 274870 15 API calls 147014->147188 147187 274870 15 API calls 147015->147187 147021 22aab5 147017->147021 147022 22aa8b 147017->147022 147192 274870 15 API calls 147021->147192 147191 274870 15 API calls 147022->147191 147024 22ad04 147029 22adb2 147024->147029 147030 22addc 147024->147030 147026->146991 147026->147013 147185 211d90 15 API calls 147026->147185 147186 211de0 20 API calls 147026->147186 147195 274870 15 API calls 147029->147195 147196 274870 15 API calls 147030->147196 147031 22b017 147036 22b0c5 147031->147036 147037 22b0ef 147031->147037 147199 274870 15 API calls 147036->147199 147200 274870 15 API calls 147037->147200 147038->147024 147049 22add4 147038->147049 147193 211d90 15 API calls 147038->147193 147194 211de0 20 API calls 147038->147194 147042 22b336 147044 22b3e4 147042->147044 147045 22b40e 147042->147045 147203 274870 15 API calls 147044->147203 147204 274870 15 API calls 147045->147204 147047 22b661 147052 22b715 147047->147052 147053 22b73f 147047->147053 147049->147031 147055 22b0e7 147049->147055 147197 211d90 15 API calls 147049->147197 147198 211de0 20 API calls 147049->147198 147207 274870 15 API calls 147052->147207 147208 274870 15 API calls 147053->147208 147055->147042 147060 22b406 147055->147060 147201 211d90 15 API calls 147055->147201 147202 211de0 20 API calls 147055->147202 147059 22b9af 147062 22ba63 147059->147062 147063 22ba8d 147059->147063 147060->147047 147069 22b737 codecvt 147060->147069 147205 211d90 15 API calls 147060->147205 147206 211de0 20 API calls 147060->147206 147211 274870 15 API calls 147062->147211 147212 274870 15 API calls 147063->147212 147064 22bce0 147070 22bd94 147064->147070 147071 22bdbe 147064->147071 147069->147059 147076 22ba85 147069->147076 147209 211d90 15 API calls 147069->147209 147210 211de0 20 API calls 147069->147210 147215 274870 15 API calls 147070->147215 147216 274870 15 API calls 147071->147216 147076->147064 147088 22bdb6 codecvt 147076->147088 147213 211d90 15 API calls 147076->147213 147214 211de0 20 API calls 147076->147214 147077 22c0b2 147078 22c165 147077->147078 147079 22c18f 147077->147079 147219 274870 15 API calls 147078->147219 147220 274870 15 API calls 147079->147220 147083 22c3e2 147085 22c495 147083->147085 147086 22c4bf 147083->147086 147223 274870 15 API calls 147085->147223 147224 274870 15 API calls 147086->147224 147088->147077 147091 22c187 147088->147091 147217 211d90 15 API calls 147088->147217 147218 211de0 20 API calls 147088->147218 147091->147061 147091->147083 147221 211d90 15 API calls 147091->147221 147222 211de0 20 API calls 147091->147222 147092->146830 147093->146830 147094->146841 147095->146841 147096->146841 147097->146841 147098->146850 147099->146850 147100->146850 147101->146850 147102->146856 147103->146856 147104->146856 147105->146856 147106->146868 147107->146868 147108->146868 147109->146868 147110->146875 147111->146875 147112->146875 147113->146875 147114->146882 147115->146882 147116->146882 147117->146882 147118->146888 147119->146888 147120->146888 147121->146888 147122->146896 147123->146896 147124->146896 147125->146896 147126->146908 147127->146908 147128->146908 147129->146908 147130->146916 147131->146916 147132->146916 147133->146916 147134->146922 147135->146922 147136->146922 147137->146922 147138->146929 147139->146929 147140->146929 147141->146929 147142->146941 147143->146941 147144->146941 147145->146941 147146->146951 147147->146951 147148->146951 147149->146951 147150->146946 147151->146946 147152->146960 147153->146960 147154->146966 147155->146966 147156->146966 147157->146966 147158->146975 147159->146975 147160->146975 147161->146975 147162->146978 147163->146978 147164->146978 147165->146978 147166->146935 147167->146935 147168->146983 147169->146983 147170->146983 147171->146992 147172->146992 147173->146992 147174->146992 147175->146980 147176->146980 147177->146980 147178->146980 147179->146982 147180->146982 147181->146982 147182->146982 147183->147026 147184->147026 147185->147026 147186->147026 147187->146991 147188->146991 147189->146991 147190->146991 147191->147038 147192->147038 147193->147038 147194->147038 147195->147049 147196->147049 147197->147049 147198->147049 147199->147055 147200->147055 147201->147055 147202->147055 147203->147060 147204->147060 147205->147060 147206->147060 147207->147069 147208->147069 147209->147069 147210->147069 147211->147076 147212->147076 147213->147076 147214->147076 147215->147088 147216->147088 147217->147088 147218->147088 147219->147091 147220->147091 147221->147091 147222->147091 147223->147061 147224->147061 147225 2214b9 147235 2214c2 147225->147235 147226 221779 147303 223fe0 147226->147303 147228 2216a9 147230 221781 147228->147230 147231 221757 147228->147231 147341 274870 15 API calls 147230->147341 147340 274870 15 API calls 147231->147340 147235->147226 147235->147228 147338 211d90 15 API calls 147235->147338 147339 211de0 20 API calls 147235->147339 147236 2219ac 147238 221a84 147236->147238 147239 221a5a 147236->147239 147345 274870 15 API calls 147238->147345 147344 274870 15 API calls 147239->147344 147243 221cbf 147245 221d97 147243->147245 147246 221d6d 147243->147246 147349 274870 15 API calls 147245->147349 147348 274870 15 API calls 147246->147348 147249 221fd2 147253 222080 147249->147253 147254 2220aa 147249->147254 147252 2217b3 147252->147236 147256 221a7c 147252->147256 147342 211d90 15 API calls 147252->147342 147343 211de0 20 API calls 147252->147343 147352 274870 15 API calls 147253->147352 147353 274870 15 API calls 147254->147353 147256->147243 147263 221d8f 147256->147263 147346 211d90 15 API calls 147256->147346 147347 211de0 20 API calls 147256->147347 147260 2223c4 147357 274870 15 API calls 147260->147357 147261 22239a 147356 274870 15 API calls 147261->147356 147262 2222ed 147262->147260 147262->147261 147263->147249 147273 2220a2 147263->147273 147350 211d90 15 API calls 147263->147350 147351 211de0 20 API calls 147263->147351 147266 2225ff 147269 2226d6 147266->147269 147270 2226ac 147266->147270 147361 274870 15 API calls 147269->147361 147360 274870 15 API calls 147270->147360 147273->147262 147280 2223bc 147273->147280 147354 211d90 15 API calls 147273->147354 147355 211de0 20 API calls 147273->147355 147276 223011 147284 22306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 147276->147284 147285 2230ce 147276->147285 147277 2229e8 147365 274870 15 API calls 147277->147365 147278 2229be 147364 274870 15 API calls 147278->147364 147279 222911 147279->147277 147279->147278 147280->147266 147286 2226ce 147280->147286 147358 211d90 15 API calls 147280->147358 147359 211de0 20 API calls 147280->147359 147284->147285 147390 32421f5 95 API calls 147284->147390 147286->147279 147298 2229e0 147286->147298 147362 211d90 15 API calls 147286->147362 147363 211de0 20 API calls 147286->147363 147288 222c26 147289 222cd3 147288->147289 147290 222cfd 147288->147290 147368 274870 15 API calls 147289->147368 147369 274870 15 API calls 147290->147369 147291 222f42 147296 223019 147291->147296 147297 222fef 147291->147297 147373 274870 15 API calls 147296->147373 147372 274870 15 API calls 147297->147372 147298->147288 147302 222cf5 147298->147302 147366 211d90 15 API calls 147298->147366 147367 211de0 20 API calls 147298->147367 147302->147276 147302->147291 147370 211d90 15 API calls 147302->147370 147371 211de0 20 API calls 147302->147371 147304 22400f 147303->147304 147307 2241c0 147304->147307 147322 22426c 147304->147322 147376 211d90 15 API calls 147304->147376 147377 211de0 20 API calls 147304->147377 147306 224bae 147306->147252 147308 224274 147307->147308 147309 22424a 147307->147309 147379 274870 15 API calls 147308->147379 147378 274870 15 API calls 147309->147378 147313 224473 147315 224527 147313->147315 147316 2244fd 147313->147316 147383 274870 15 API calls 147315->147383 147382 274870 15 API calls 147316->147382 147317 224717 147323 2247a1 147317->147323 147324 2247cb 147317->147324 147322->147313 147332 22451f 147322->147332 147380 211d90 15 API calls 147322->147380 147381 211de0 20 API calls 147322->147381 147386 274870 15 API calls 147323->147386 147387 274870 15 API calls 147324->147387 147328 2249bb 147328->147306 147330 224a6d GetModuleHandleA GetProcAddress 147328->147330 147334 224a9f codecvt 147330->147334 147332->147317 147333 2247c3 147332->147333 147384 211d90 15 API calls 147332->147384 147385 211de0 20 API calls 147332->147385 147333->147328 147388 211d90 15 API calls 147333->147388 147389 211de0 20 API calls 147333->147389 147335 224b3a VirtualProtect VirtualProtect 147334->147335 147374 270910 147335->147374 147338->147235 147339->147235 147340->147226 147341->147226 147342->147252 147343->147252 147344->147256 147345->147256 147346->147256 147347->147256 147348->147263 147349->147263 147350->147263 147351->147263 147352->147273 147353->147273 147354->147273 147355->147273 147356->147280 147357->147280 147358->147280 147359->147280 147360->147286 147361->147286 147362->147286 147363->147286 147364->147298 147365->147298 147366->147298 147367->147298 147368->147302 147369->147302 147370->147302 147371->147302 147372->147276 147373->147276 147375 224b84 VirtualProtect 147374->147375 147375->147306 147376->147304 147377->147304 147378->147322 147379->147322 147380->147322 147381->147322 147382->147332 147383->147332 147384->147332 147385->147332 147386->147333 147387->147333 147388->147333 147389->147333 147391 21e6ee 147404 21e6fd 147391->147404 147392 21e9dd 147393 21ea38 InternetOpenA 147392->147393 147406 21ea57 147393->147406 147395 21e9e5 147454 274870 15 API calls 147395->147454 147396 21e9bb 147453 274870 15 API calls 147396->147453 147397 21e908 147397->147395 147397->147396 147399 21f074 FreeLibrary 147403 21f086 147399->147403 147400 21f097 147421 21f2a5 147400->147421 147449 21f374 147400->147449 147463 211d90 15 API calls 147400->147463 147464 211de0 20 API calls 147400->147464 147404->147392 147404->147397 147451 211d90 15 API calls 147404->147451 147452 211de0 20 API calls 147404->147452 147405 21ed23 147418 21ef66 147405->147418 147423 21f036 147405->147423 147459 211d90 15 API calls 147405->147459 147460 211de0 20 API calls 147405->147460 147406->147405 147407 21ec53 147406->147407 147455 211d90 15 API calls 147406->147455 147456 211de0 20 API calls 147406->147456 147409 21ed01 147407->147409 147410 21ed2b 147407->147410 147457 274870 15 API calls 147409->147457 147458 274870 15 API calls 147410->147458 147415 21f014 147461 274870 15 API calls 147415->147461 147416 21f03e 147462 274870 15 API calls 147416->147462 147418->147415 147418->147416 147425 21f352 147421->147425 147426 21f37c 147421->147426 147423->147399 147423->147400 147424 21f6f6 InternetOpenUrlA 147427 21f782 InternetReadFile 147424->147427 147428 21f734 FreeLibrary 147424->147428 147465 274870 15 API calls 147425->147465 147466 274870 15 API calls 147426->147466 147432 21f7b2 147427->147432 147433 21f7bb 147427->147433 147440 21f75f 147428->147440 147432->147427 147432->147433 147436 21f7df InternetCloseHandle 147432->147436 147441 224c60 std::ios_base::failure::failure 41 API calls 147432->147441 147433->147436 147445 21f811 FreeLibrary 147436->147445 147437 21f5c9 147438 21f6a0 147437->147438 147439 21f676 147437->147439 147470 274870 15 API calls 147438->147470 147469 274870 15 API calls 147439->147469 147471 214120 39 API calls task 147440->147471 147441->147432 147448 21f82a std::ios_base::failure::failure 147445->147448 147446 21f698 std::runtime_error::runtime_error _strlen 147446->147424 147472 214120 39 API calls task 147448->147472 147449->147437 147449->147446 147467 211d90 15 API calls 147449->147467 147468 211de0 20 API calls 147449->147468 147451->147404 147452->147404 147453->147392 147454->147392 147455->147406 147456->147406 147457->147405 147458->147405 147459->147405 147460->147405 147461->147423 147462->147423 147463->147400 147464->147400 147465->147449 147466->147449 147467->147449 147468->147449 147469->147446 147470->147446 147471->147403 147472->147403
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 057c289566f461a59ece415583e8e554ad6ddc7620834a02e9d3089f5f6d47d8
                    • Instruction ID: 3794bc3c426b4cadfcca146c7f4820d5fa111bc341e5a34df3512346650c6505
                    • Opcode Fuzzy Hash: 057c289566f461a59ece415583e8e554ad6ddc7620834a02e9d3089f5f6d47d8
                    • Instruction Fuzzy Hash: 1F144875C24A2DCACB62DF24DC916EEB7B5BF66344F1082C9D40A7A241DB319AE1CF41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2536 3244ba2-3244bb2 2537 3244e23-3244e26 2536->2537 2538 3244bb8-3244beb call 32446d4 2536->2538 2541 3244bf1-3244c00 call 32446d4 2538->2541 2542 3244e22 2538->2542 2541->2542 2545 3244c06-3244c5f KiUserCallbackDispatcher GetSystemMetrics call 3243576 * 4 GetDC 2541->2545 2542->2537 2554 3244c65-3244c72 GetCurrentObject 2545->2554 2555 3244e20-3244e21 2545->2555 2556 3244e17-3244e1a ReleaseDC 2554->2556 2557 3244c78-3244c89 GetObjectW 2554->2557 2555->2542 2556->2555 2557->2556 2558 3244c8f-3244d1e call 32435db DeleteObject CreateCompatibleDC 2557->2558 2558->2556 2561 3244d24-3244d3f CreateDIBSection 2558->2561 2562 3244d45-3244d4f SelectObject 2561->2562 2563 3244e10-3244e11 DeleteDC 2561->2563 2564 3244d55-3244d74 BitBlt 2562->2564 2565 3244e09-3244e0a DeleteObject 2562->2565 2563->2556 2564->2565 2566 3244d7a-3244d8c call 3243508 2564->2566 2565->2563 2566->2565 2569 3244d8e-3244df9 call 324354b * 3 call 3243d76 2566->2569 2577 3244dfe-3244e04 call 3243536 2569->2577 2577->2565
                    APIs
                      • Part of subcall function 032446D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03244812), ref: 032446E6
                      • Part of subcall function 032446D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03244812), ref: 032446F3
                    • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 03244C13
                    • GetSystemMetrics.USER32(0000004D), ref: 03244C1A
                    • GetDC.USER32(00000000), ref: 03244C55
                    • GetCurrentObject.GDI32(00000000,00000007), ref: 03244C68
                    • GetObjectW.GDI32(00000000,00000018,?), ref: 03244C81
                    • DeleteObject.GDI32(00000000), ref: 03244CB3
                    • CreateCompatibleDC.GDI32(00000000), ref: 03244D14
                    • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 03244D35
                    • SelectObject.GDI32(00000000,00000000), ref: 03244D47
                    • BitBlt.GDI32(00000000,00000000,00000000,?,03242468,00000000,?,?,00CC0020), ref: 03244D6C
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                      • Part of subcall function 03243D76: EnterCriticalSection.KERNEL32(032484D4,00000000,00000000,00000000,?,?,?,?,?,03243EEB,00000000,00000000,00000000,00000000,00000000), ref: 03243D88
                      • Part of subcall function 03243536: GetProcessHeap.KERNEL32(00000000,00000000,0324518A), ref: 0324353D
                      • Part of subcall function 03243536: RtlFreeHeap.NTDLL(00000000), ref: 03243544
                    • DeleteObject.GDI32(00000000), ref: 03244E0A
                    • DeleteDC.GDI32(00000000), ref: 03244E11
                    • ReleaseDC.USER32(00000000,00000000), ref: 03244E1A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                    • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                    • API String ID: 1387450592-1028866296
                    • Opcode ID: 26e911593845f41ebd443b649f86d4aae1a9b43da460c4de1558392443aef732
                    • Instruction ID: f6cc0db657d8c642820e66125c3a78cfe31ee2ced4ab6f8daccda92369059186
                    • Opcode Fuzzy Hash: 26e911593845f41ebd443b649f86d4aae1a9b43da460c4de1558392443aef732
                    • Instruction Fuzzy Hash: E671C579E20309ABDB25EFA5DC45BEEBB74EF08700F148059E604FB290DBB15A44CB95

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2579 3241000-3241018 2580 3241412-3241418 2579->2580 2581 324101e-3241028 2579->2581 2581->2580 2582 324102e-3241037 call 324407d 2581->2582 2582->2580 2585 324103d-3241059 call 3243508 * 2 2582->2585 2590 3241404-324140d call 3243536 * 2 2585->2590 2591 324105f-3241061 2585->2591 2590->2580 2591->2590 2592 3241067-324116d call 3243600 FindFirstFileW 2591->2592 2598 32413d5-3241401 call 3243576 * 3 2592->2598 2599 3241173-3241192 call 324363b * 2 2592->2599 2598->2590 2608 3241198-32411b7 call 3243600 2599->2608 2609 32413ba 2599->2609 2615 32411bd-32411cf call 324372b 2608->2615 2616 3241769-3241770 2608->2616 2612 32413bd-32413c4 2609->2612 2617 32413cd-32413cf 2612->2617 2615->2616 2622 32411d5-32411e7 call 324372b 2615->2622 2616->2609 2619 3241776-3241794 call 324363b call 3243b60 2616->2619 2617->2598 2617->2599 2629 3241796-32417e3 call 3243508 call 3243600 call 3243eb6 2619->2629 2630 32417eb-32417f0 2619->2630 2622->2616 2628 32411ed-324120f call 324363b call 3243b60 2622->2628 2650 3241215-324121b 2628->2650 2651 324171e-3241749 call 32440ba 2628->2651 2629->2630 2631 32417f6-32417fb 2630->2631 2632 324199b-32419d2 call 3243600 call 3243eb6 2630->2632 2631->2632 2636 3241801-3241806 2631->2636 2648 32419d7-32419da 2632->2648 2636->2632 2640 324180c-3241811 2636->2640 2640->2632 2644 3241817-324181c 2640->2644 2644->2632 2649 3241822-3241827 2644->2649 2648->2612 2649->2632 2653 324182d-3241832 2649->2653 2650->2651 2655 3241221-3241227 2650->2655 2659 324152d-3241534 call 3243536 2651->2659 2660 324174f-324175a call 324372b 2651->2660 2653->2632 2657 3241838-324183d 2653->2657 2655->2651 2656 324122d-3241233 2655->2656 2656->2651 2661 3241239-324123f 2656->2661 2657->2632 2662 3241843-3241848 2657->2662 2659->2609 2660->2659 2671 3241760-3241762 2660->2671 2661->2651 2664 3241245-324124b 2661->2664 2662->2632 2665 324184e-3241853 2662->2665 2664->2651 2669 3241251-3241257 2664->2669 2665->2632 2670 3241859-324185e 2665->2670 2669->2651 2672 324125d-3241263 2669->2672 2670->2609 2673 3241864-3241878 call 324446c 2670->2673 2671->2616 2672->2651 2674 3241269-324126f 2672->2674 2678 32414b4-32414be call 3243536 2673->2678 2679 324187e-3241883 2673->2679 2674->2651 2677 3241275-324127b 2674->2677 2677->2651 2680 3241281-3241287 2677->2680 2678->2609 2679->2678 2682 3241889-32418a1 call 32436f1 2679->2682 2680->2651 2683 324128d-3241293 2680->2683 2682->2678 2689 32418a7-32418bf call 32436f1 2682->2689 2683->2651 2686 3241299-324129f 2683->2686 2686->2651 2688 32412a5-32412ab 2686->2688 2688->2651 2690 32412b1-32412b7 2688->2690 2689->2678 2695 32418c5-32418db call 324369c 2689->2695 2690->2651 2692 32412bd-32412c3 2690->2692 2692->2651 2694 32412c9-32412cf 2692->2694 2694->2651 2696 32412d5-32412db 2694->2696 2695->2678 2702 32418e1-32418ed call 3243625 2695->2702 2696->2651 2698 32412e1-32412e7 2696->2698 2698->2651 2699 32412ed-32412f3 2698->2699 2699->2651 2701 32412f9-32412ff 2699->2701 2701->2651 2703 3241305-324130b 2701->2703 2708 32418f3-3241906 call 3241a62 2702->2708 2709 32414ad-32414af call 3243536 2702->2709 2703->2651 2705 3241311-3241317 2703->2705 2705->2651 2707 324131d-3241323 2705->2707 2707->2651 2710 3241329-324132f 2707->2710 2708->2709 2715 324190c-3241911 2708->2715 2709->2678 2710->2651 2714 3241335-324133b 2710->2714 2714->2651 2716 3241341-3241347 2714->2716 2715->2709 2717 3241917-3241929 call 3241c94 2715->2717 2718 324168c-32416c1 call 32440ba 2716->2718 2719 324134d-3241353 2716->2719 2726 324198e-3241996 call 3243536 2717->2726 2727 324192b-3241974 call 3241ba5 call 3243600 call 3243d76 2717->2727 2718->2678 2728 32416c7-32416d2 call 324372b 2718->2728 2719->2718 2722 3241359-324135f 2719->2722 2722->2718 2725 3241365-324136b 2722->2725 2729 3241371-3241377 2725->2729 2730 3241662-3241687 EnterCriticalSection call 3244e27 LeaveCriticalSection 2725->2730 2726->2709 2764 3241979-324198b call 3243536 * 2 2727->2764 2728->2678 2745 32416d8-3241719 call 3243efc 2728->2745 2729->2730 2735 324137d-3241383 2729->2735 2730->2609 2740 3241419-324141f 2735->2740 2741 3241389-32413b4 call 3243efc 2735->2741 2742 3241425-3241447 call 32440ba 2740->2742 2743 32414c3-32414c9 2740->2743 2741->2609 2742->2678 2760 3241449-3241454 call 324372b 2742->2760 2748 3241539-324153f 2743->2748 2749 32414cb-32414ed call 32440ba 2743->2749 2745->2678 2753 3241576-324157c 2748->2753 2754 3241541-3241563 call 32440ba 2748->2754 2749->2659 2767 32414ef-32414fa call 324372b 2749->2767 2762 3241582-3241588 2753->2762 2763 324165b 2753->2763 2754->2659 2770 3241565-3241570 call 324372b 2754->2770 2760->2678 2777 3241456-32414a7 call 3243508 call 3243600 call 3243eb6 2760->2777 2762->2763 2768 324158e-3241594 2762->2768 2763->2730 2764->2726 2767->2659 2786 32414fc 2767->2786 2773 3241596-324159d 2768->2773 2774 32415a9-32415af 2768->2774 2770->2659 2789 3241572-3241574 2770->2789 2773->2774 2780 32415b1-32415b7 2774->2780 2781 32415e3-324160b call 32440ba 2774->2781 2777->2709 2780->2781 2782 32415b9-32415bf 2780->2782 2781->2659 2794 3241611-324161c call 324372b 2781->2794 2782->2781 2788 32415c1-32415c7 2782->2788 2792 32414fe-3241527 call 3243efc 2786->2792 2788->2781 2793 32415c9-32415cf 2788->2793 2789->2792 2792->2659 2793->2781 2797 32415d1-32415d8 call 3241000 2793->2797 2794->2659 2805 3241622-3241656 call 3243efc 2794->2805 2804 32415dd-32415de 2797->2804 2804->2609 2805->2659
                    APIs
                    • FindNextFileW.KERNELBASE(?,?), ref: 032413C7
                      • Part of subcall function 0324407D: GetFileAttributesW.KERNELBASE(03245051,0324447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03243ECC), ref: 0324407E
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • FindFirstFileW.KERNELBASE(00000000,?,00963638,?), ref: 03241161
                      • Part of subcall function 03243EFC: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03243F5D
                      • Part of subcall function 03243EFC: FindNextFileW.KERNEL32(03241710,?), ref: 03243FFE
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 03241668
                    • LeaveCriticalSection.KERNEL32(032484D4), ref: 03241681
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                    • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$Telegram$p2#v 2#v
                    • API String ID: 1893179121-2645838998
                    • Opcode ID: d453218943bac0be100473dfdb4ee7fd017984cd37bd79a3c8dc2ed307bd3a5e
                    • Instruction ID: 9e8bb90412f8d52879d4828d13b3716323b223528392b05daccbdc23e5beda36
                    • Opcode Fuzzy Hash: d453218943bac0be100473dfdb4ee7fd017984cd37bd79a3c8dc2ed307bd3a5e
                    • Instruction Fuzzy Hash: 3C324839E3031657DB2DEBA4A884BFDB3B4AF44300F18405AD516EB294EBB49DD4CB91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2857 3242054-32420a5 call 3243508 2860 32420a7-32420c6 2857->2860 2861 3242103-3242115 GetCurrentHwProfileA 2857->2861 2864 32420ce-32420d4 2860->2864 2865 32420c8-32420cc 2860->2865 2862 3242117-324212a call 32435db 2861->2862 2863 324212d-324219e GetSystemInfo call 32435db call 3243536 GlobalMemoryStatusEx call 32435db 2861->2863 2862->2863 2881 32421db-32421ec EnumDisplayDevicesA 2863->2881 2869 32420d6-32420dd 2864->2869 2870 32420df-32420e5 2864->2870 2868 32420ee-32420f9 call 324354b 2865->2868 2874 32420fc-3242101 2868->2874 2869->2868 2873 32420e7-32420eb 2870->2873 2870->2874 2873->2868 2874->2860 2874->2861 2882 32421a0-32421a9 2881->2882 2883 32421ee-32421f4 2881->2883 2884 32421ca-32421da 2882->2884 2885 32421ab-32421c7 call 32435db 2882->2885 2884->2881 2885->2884
                    APIs
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • GetCurrentHwProfileA.ADVAPI32(?), ref: 0324210B
                    • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 03242132
                    • GlobalMemoryStatusEx.KERNELBASE(?), ref: 03242166
                    • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 032421E8
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                    • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                    • API String ID: 330852582-565344305
                    • Opcode ID: 1f163f7cda52138d46cbd927bba1b4bea99757d9ad0309faf671b41169db9de0
                    • Instruction ID: bbeef181dec6c8d97a0699381e41cd4c2b7d73d43ac7eb49866bb52b4aa94256
                    • Opcode Fuzzy Hash: 1f163f7cda52138d46cbd927bba1b4bea99757d9ad0309faf671b41169db9de0
                    • Instruction Fuzzy Hash: 834116756143059BD329DF19DC84BABB7E8EB88310F04491DF9998B241E770D884CBA2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2888 3244e27-3244e47 2889 3244e98-3244ed9 call 3243508 * 2 call 3243600 FindFirstFileW 2888->2889 2890 3244e49-3244e8c call 3243600 call 324407d 2888->2890 2903 3245183-3245192 call 3243536 * 2 2889->2903 2904 3244edf-3244ef9 call 3243600 2889->2904 2899 3244e92 2890->2899 2900 3245198-324519e 2890->2900 2899->2889 2903->2900 2910 3244fb1-3244fc7 call 324363b 2904->2910 2911 3244eff-3244f06 2904->2911 2915 324516b-3245172 2910->2915 2919 3244fcd-32450ab call 3243600 call 3243eb6 call 324363b call 3243600 call 324407d 2910->2919 2914 3244f0c-3244f1e call 324372b 2911->2914 2911->2915 2914->2915 2921 3244f24-3244f36 call 324372b 2914->2921 2920 324517b-324517d 2915->2920 2919->2915 2943 32450b1-3245165 call 324363b call 3243600 call 3243eb6 2919->2943 2920->2903 2920->2904 2921->2915 2927 3244f3c-3244f5b call 324363b call 3243b60 2921->2927 2937 3244f84-3244fac EnterCriticalSection call 3244e27 LeaveCriticalSection 2927->2937 2938 3244f5d-3244f62 2927->2938 2937->2915 2938->2937 2941 3244f64-3244f6b 2938->2941 2941->2915 2945 3244f71-3244f79 call 3244e27 2941->2945 2951 324516a 2943->2951 2949 3244f7e-3244f7f 2945->2949 2949->2951 2951->2915
                    APIs
                    • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000), ref: 03244ECD
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 03244F89
                      • Part of subcall function 03244E27: LeaveCriticalSection.KERNEL32(032484D4), ref: 03244FA6
                    • FindNextFileW.KERNELBASE(?,?), ref: 03245175
                      • Part of subcall function 0324407D: GetFileAttributesW.KERNELBASE(03245051,0324447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03243ECC), ref: 0324407E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                    • String ID: %s\%s$%s\*$Telegram$p2#v 2#v
                    • API String ID: 648860119-2606188985
                    • Opcode ID: cd53b947d88f66c984a5b0a5a50c252ad2dfc7bdcddbf8f2cf32a1f99ad70eaf
                    • Instruction ID: a03eee16d766ae00890bbe4f3594d1c5e8c8ba8447a609bd6349b0edc08f5904
                    • Opcode Fuzzy Hash: cd53b947d88f66c984a5b0a5a50c252ad2dfc7bdcddbf8f2cf32a1f99ad70eaf
                    • Instruction Fuzzy Hash: 80A1A729A34348A9EF14EBE0EC05BFEB375EF44710F20505AE518EF2A0F7B14A858759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4080 3241d3c-3241d4e 4081 3241d54-3241d5e 4080->4081 4082 3241f25-3241f2a 4080->4082 4081->4082 4083 3241d64-3241d8e call 3243600 FindFirstFileW 4081->4083 4083->4082 4086 3241d94-3241dd8 call 3243508 call 324363b 4083->4086 4091 3241ddd-3241e02 call 324363b * 2 4086->4091 4096 3241f01-3241f06 4091->4096 4097 3241e08-3241e21 call 3243600 4091->4097 4100 3241f0d-3241f0f 4096->4100 4101 3241e54-3241e59 4097->4101 4102 3241e23-3241e33 call 324372b 4097->4102 4103 3241f11-3241f17 4100->4103 4104 3241f1c-3241f20 call 3243536 4100->4104 4105 3241ef2-3241efd 4101->4105 4106 3241e5f-3241e69 4101->4106 4102->4101 4112 3241e35-3241e45 call 324372b 4102->4112 4103->4091 4104->4082 4105->4096 4106->4105 4109 3241e6f-3241e7c call 324408d 4106->4109 4115 3241e7e-3241e95 call 324363b call 3243b60 4109->4115 4116 3241eeb-3241eed call 3243536 4109->4116 4112->4101 4120 3241e47-3241e4a call 3241d3c 4112->4120 4126 3241e97-3241e9c 4115->4126 4127 3241eac-3241edc call 3243600 call 3243eb6 4115->4127 4116->4105 4124 3241e4f 4120->4124 4124->4105 4126->4127 4128 3241e9e-3241ea3 4126->4128 4133 3241ee1-3241ee4 4127->4133 4128->4127 4130 3241ea5-3241eaa 4128->4130 4130->4116 4130->4127 4133->4116
                    APIs
                    • FindFirstFileW.KERNELBASE(?), ref: 03241D83
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • FindNextFileW.KERNELBASE(00000000,?), ref: 03241F07
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                    • String ID: %s%s$%s\%s$%s\*$p2#v 2#v
                    • API String ID: 3555643018-2809092782
                    • Opcode ID: 3d9b868dec1efc8e1f2e78e29c376ce8830f4816cc18a5439b8eb2aab33de932
                    • Instruction ID: 5d6c50cfdaffaf7d585af5b90a62313c035f57d2ddf43d819cc5f712b140acc8
                    • Opcode Fuzzy Hash: 3d9b868dec1efc8e1f2e78e29c376ce8830f4816cc18a5439b8eb2aab33de932
                    • Instruction Fuzzy Hash: 2141FB7D6343028BC71CEF24E844A6E77E8AF84700F04491DEA55CB291EB71D9E5C78A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5898 3241c94-3241ccf call 32446d4 5901 3241cd1-3241cf8 call 3243576 CryptUnprotectData 5898->5901 5902 3241d2f-3241d3b 5898->5902 5905 3241d05-3241d0a 5901->5905 5906 3241cfa-3241d03 5901->5906 5905->5902 5907 3241d0c-3241d29 CryptProtectData 5905->5907 5906->5902 5907->5902
                    APIs
                      • Part of subcall function 032446D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03244812), ref: 032446E6
                      • Part of subcall function 032446D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03244812), ref: 032446F3
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 03241CF3
                    • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 03241D29
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                    • String ID: CRYPT32.dll$Poverty is the parent of crime.
                    • API String ID: 3642467563-1885057629
                    • Opcode ID: 317cce44250f73b2e5d9ea2c7977d9ff0e3cd5b931964849fae1f1d7946a5332
                    • Instruction ID: 32dbb16c046834b7e820461ab5920724c2303ce6d6f0d54748efc8ff0ca4b010
                    • Opcode Fuzzy Hash: 317cce44250f73b2e5d9ea2c7977d9ff0e3cd5b931964849fae1f1d7946a5332
                    • Instruction Fuzzy Hash: 7D115EB5D0020DABDF18DF95C880CEEBBBDEB48210F14456AE915B7240E770AE85CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 32421f5-3242212 InitializeCriticalSectionAndSpinCount 1 3242214 0->1 2 3242219-324222f CreateMutexA 0->2 3 3242680 1->3 4 3242235-3242240 GetLastError 2->4 5 3242678-324267a ExitProcess 2->5 4->5 6 3242246-3242255 call 3243bd2 4->6 9 324264f-324266f DeleteCriticalSection 6->9 10 324225b-3242285 call 3243576 call 32447e6 6->10 9->5 15 3242647-324264a call 3243536 10->15 16 324228b-32422d0 call 32435db call 324484b 10->16 15->9 16->15 22 32422d6-324230a call 3243508 * 3 16->22 29 3242310-3242317 22->29 30 32425df-324262e call 3243d76 call 3243536 * 4 call 3243bfb 22->30 29->30 32 324231d-3242324 29->32 60 3242631-3242637 call 324536d 30->60 32->30 34 324232a-3242366 call 32446d4 32->34 34->30 40 324236c-3242381 call 3241f2d 34->40 45 32423c1-32423db 40->45 46 3242383-32423ba call 32446d4 40->46 54 32423e5-3242410 call 324363b 45->54 55 32423dd-32423df ExitProcess 45->55 46->45 53 32423bc 46->53 53->3 65 3242412-3242414 ExitProcess 54->65 66 324241a-3242445 call 324363b 54->66 62 324263c-3242643 60->62 62->15 64 3242645 62->64 64->60 70 3242447-3242449 ExitProcess 66->70 71 324244f-32424bd call 324363b call 3244ba2 CreateThread * 2 WaitForMultipleObjects call 32419df call 3242054 66->71 80 32424c7-32424ce 71->80 81 32424d0-32424d9 80->81 82 3242501-324251d ObtainUserAgentString 80->82 83 32424ff 81->83 84 32424db-32424f5 81->84 85 3242535-32425a0 call 3245239 * 6 call 3243508 82->85 86 324251f-3242532 call 32435db 82->86 83->80 84->83 104 32425b2-32425da call 324363b call 3245239 * 2 call 3243536 85->104 105 32425a2-32425ac GetModuleFileNameW 85->105 86->85 104->30 105->104
                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(032484D4,00000DA3), ref: 0324220A
                    • CreateMutexA.KERNELBASE(00000000,00000000,1e7f31ac-1494-47cc-9633-054c20e7432e), ref: 03242222
                    • GetLastError.KERNEL32 ref: 03242235
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                    • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$1e7f31ac-1494-47cc-9633-054c20e7432e$@$kernel32$p2#v 2#v$shell32$systemd
                    • API String ID: 2005177960-2919912611
                    • Opcode ID: 08a20c7e92cd9876411cc741c7dc65faa8e8b32255166f5faef6ed20e2dc7eed
                    • Instruction ID: 5dabf78e48ef22f12222139b1b01af588f513781272c3b506e43b28e9ae8d879
                    • Opcode Fuzzy Hash: 08a20c7e92cd9876411cc741c7dc65faa8e8b32255166f5faef6ed20e2dc7eed
                    • Instruction Fuzzy Hash: 05C1E138924345EBEB19FBA5FC09BAC7B75AB05700F048059E251AE1D5DBF24AC5CB21

                    Control-flow Graph

                    APIs
                      • Part of subcall function 0324407D: GetFileAttributesW.KERNELBASE(03245051,0324447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03243ECC), ref: 0324407E
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 032444F5
                    • LeaveCriticalSection.KERNEL32(032484D4), ref: 03244541
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 032445C4
                    • LeaveCriticalSection.KERNEL32(032484D4), ref: 032445FD
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 0324463A
                    • LeaveCriticalSection.KERNEL32(032484D4), ref: 0324467D
                    • EnterCriticalSection.KERNEL32(032484D4), ref: 03244696
                    • LeaveCriticalSection.KERNEL32(032484D4), ref: 032446BF
                      • Part of subcall function 032442EC: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03244574), ref: 03244305
                      • Part of subcall function 032442EC: GetProcAddress.KERNEL32(00000000), ref: 0324430E
                      • Part of subcall function 032442EC: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03244574), ref: 0324431F
                      • Part of subcall function 032442EC: GetProcAddress.KERNEL32(00000000), ref: 03244322
                      • Part of subcall function 032442EC: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03244574), ref: 032443A4
                      • Part of subcall function 032442EC: GetCurrentProcess.KERNEL32(03244574,00000000,00000000,00000002,?,?,?,?,03244574), ref: 032443C0
                      • Part of subcall function 032442EC: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03244574), ref: 032443CF
                      • Part of subcall function 032442EC: CloseHandle.KERNEL32(03244574,?,?,?,?,03244574), ref: 032443FF
                      • Part of subcall function 03243536: GetProcessHeap.KERNEL32(00000000,00000000,0324518A), ref: 0324353D
                      • Part of subcall function 03243536: RtlFreeHeap.NTDLL(00000000), ref: 03243544
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                    • String ID: @$\??\%s$\Network\Cookies
                    • API String ID: 330363434-2791195959
                    • Opcode ID: a49b5e2c9a6bf1661978dbf181f16fb77e7f0cff7f39b8cd81e25de8219779b3
                    • Instruction ID: 87eccc2996688256897168b987651bc7107bb2d4c5e2f590cc1456e63cf078c5
                    • Opcode Fuzzy Hash: a49b5e2c9a6bf1661978dbf181f16fb77e7f0cff7f39b8cd81e25de8219779b3
                    • Instruction Fuzzy Hash: 41716179960309AFEB18EF90EC49BEDBBB5FF04705F108015F611AA1D1EBB19A85CB50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2954 324536d-32453f6 call 32446d4 2957 32453ff-3245457 2954->2957 2958 32453f8-32453fa 2954->2958 2961 324545d-324548b call 3245361 socket 2957->2961 2962 324553b 2957->2962 2959 324553e-3245541 2958->2959 2965 3245531-3245534 2961->2965 2966 3245491-32454a8 call 32452cf call 3243576 2961->2966 2962->2959 2965->2962 2971 32454a9-32454af 2966->2971 2972 3245524-324552a 2971->2972 2973 32454b1-32454c6 connect 2971->2973 2972->2965 2974 3245517-3245522 Sleep 2973->2974 2975 32454c8-32454e8 send 2973->2975 2974->2971 2975->2974 2976 32454ea-3245504 send 2975->2976 2976->2974 2977 3245506-3245515 call 3243536 2976->2977 2977->2972
                    APIs
                      • Part of subcall function 032446D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03244812), ref: 032446E6
                      • Part of subcall function 032446D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03244812), ref: 032446F3
                    • socket.WS2_32(?,00000001,00000000), ref: 03245480
                    • connect.WS2_32(000000FF,?,00000010), ref: 032454BF
                    • send.WS2_32(000000FF,00000000,00000000), ref: 032454E1
                    • send.WS2_32(000000FF,000000FF,00000037,00000000), ref: 032454FD
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: send$HandleLibraryLoadModuleconnectsocket
                    • String ID: 146.70.169.164$ws2_32.dll
                    • API String ID: 2781119014-4085977579
                    • Opcode ID: 6c551a26a12c8a00eac4f7f45fa2cffb64648d6a0c2dae3b311918bb806f8c8e
                    • Instruction ID: a45ab27681fbacf1b8d942f0e66ab86dcd6536bf997dd461f948c499a2d1246b
                    • Opcode Fuzzy Hash: 6c551a26a12c8a00eac4f7f45fa2cffb64648d6a0c2dae3b311918bb806f8c8e
                    • Instruction Fuzzy Hash: B051A731C14289EEEB12CBE8D8097EDBFB89F16314F144189E6A0AE1C1D3B54786CB61
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 8e47009f6ed1f15b7d9fd3d890ee81aa9e4db67fc2316bbfd5dbfe35ded864d3
                    • Instruction ID: 876da7062d9be9568e5fa3785f73a15b81a5d6c7483fe1c8a5f81cb8b22e2820
                    • Opcode Fuzzy Hash: 8e47009f6ed1f15b7d9fd3d890ee81aa9e4db67fc2316bbfd5dbfe35ded864d3
                    • Instruction Fuzzy Hash: 26633670C24A2CDACB22DFA4E9916EEF7B5EF56344F1082C5D40A3A241DB719AE1DF41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3854 223fe0-224015 3856 2242a1-2242b9 3854->3856 3857 22401b-224022 3854->3857 3860 224554-22456c 3856->3860 3861 2242bf-2242c9 3856->3861 3859 22402d-224033 3857->3859 3862 2240e4-2240eb 3859->3862 3863 224039-224050 3859->3863 3872 224572-224579 3860->3872 3873 2247f8-224810 3860->3873 3865 2242da-2242e3 3861->3865 3864 2240f6-2240fc 3862->3864 3867 22405b-224061 3863->3867 3868 224102-224109 3864->3868 3869 2241c0-2241c7 3864->3869 3870 224397-22439e 3865->3870 3871 2242e9-224300 3865->3871 3874 224063-2240cb call 211dc0 call 211cc0 3867->3874 3875 2240cd-2240df 3867->3875 3877 224114-22411a 3868->3877 3882 2241d2-2241d8 3869->3882 3876 2243a9-2243af 3870->3876 3878 22430b-224311 3871->3878 3879 224584-22458a 3872->3879 3886 224a36-224a3d 3873->3886 3887 224816-22481d 3873->3887 3874->3867 3875->3859 3888 224473-22447a 3876->3888 3889 2243b5-2243bc 3876->3889 3890 224120-2241b6 call 211d90 call 211de0 call 211d10 3877->3890 3891 2241bb 3877->3891 3894 224313-22437e call 211dc0 call 211cc0 3878->3894 3895 224380-224392 3878->3895 3892 224590-2245a7 3879->3892 3893 22463b-224642 3879->3893 3884 224236-22423f 3882->3884 3885 2241da-2241e1 3882->3885 3902 224241-224245 3884->3902 3903 224246-224248 3884->3903 3898 2241ec-2241f2 3885->3898 3908 224a43-224ba4 call 214c60 call 2145b0 call 214a60 call 214550 GetModuleHandleA GetProcAddress call 214e20 call 214670 call 214ff0 call 214670 call 2151b0 call 214670 call 215370 call 214690 call 215530 call 214690 call 215610 call 2146b0 call 2156f0 call 2146b0 call 270910 VirtualProtect * 2 call 270910 VirtualProtect 3886->3908 3909 224bae-224bb1 3886->3909 3899 224828-22482e 3887->3899 3904 224485-22448b 3888->3904 3900 2243c7-2243cd 3889->3900 3890->3877 3891->3864 3901 2245b2-2245b8 3892->3901 3905 22464d-224653 3893->3905 3894->3878 3895->3865 3913 224234 3898->3913 3914 2241f4-224232 call 211e00 3898->3914 3915 224834-22484b 3899->3915 3916 2248df-2248e6 3899->3916 3917 2243d3-224469 call 211d90 call 211de0 call 211d10 3900->3917 3918 22446e 3900->3918 3919 224624-224636 3901->3919 3920 2245ba-224622 call 211dc0 call 211cc0 3901->3920 3902->3903 3921 224274-224299 call 274870 3903->3921 3922 22424a-224272 call 274870 3903->3922 3923 2244e9-2244f2 3904->3923 3924 22448d-224494 3904->3924 3925 224717-22471e 3905->3925 3926 224659-224660 3905->3926 3908->3909 3913->3882 3914->3898 3934 224856-22485c 3915->3934 3932 2248f1-2248f7 3916->3932 3917->3900 3918->3876 3919->3879 3920->3901 3979 22429c 3921->3979 3922->3979 3945 2244f4-2244f8 3923->3945 3946 2244f9-2244fb 3923->3946 3942 22449f-2244a5 3924->3942 3930 224729-22472f 3925->3930 3943 22466b-224671 3926->3943 3950 224731-224738 3930->3950 3951 22478d-224796 3930->3951 3952 2249bb-2249c2 3932->3952 3953 2248fd-224904 3932->3953 3955 2248c8-2248da 3934->3955 3956 22485e-2248c6 call 211dc0 call 211cc0 3934->3956 3961 2244e7 3942->3961 3962 2244a7-2244e5 call 211e00 3942->3962 3963 224712 3943->3963 3964 224677-22470d call 211d90 call 211de0 call 211d10 3943->3964 3945->3946 3967 224527-22454c call 274870 3946->3967 3968 2244fd-224525 call 274870 3946->3968 3971 224743-224749 3950->3971 3976 224798-22479c 3951->3976 3977 22479d-22479f 3951->3977 3980 2249cd-2249d3 3952->3980 3972 22490f-224915 3953->3972 3955->3899 3956->3934 3961->3904 3962->3942 3963->3905 3964->3943 4006 22454f 3967->4006 3968->4006 3991 22478b 3971->3991 3992 22474b-224789 call 211e00 3971->3992 3993 2249b6 3972->3993 3994 22491b-2249b1 call 211d90 call 211de0 call 211d10 3972->3994 3976->3977 3997 2247a1-2247c9 call 274870 3977->3997 3998 2247cb-2247f0 call 274870 3977->3998 3979->3856 4000 224a31 3980->4000 4001 2249d5-2249dc 3980->4001 3991->3930 3992->3971 3993->3932 3994->3972 4036 2247f3 3997->4036 3998->4036 4000->3886 4017 2249e7-2249ed 4001->4017 4006->3860 4028 224a2f 4017->4028 4029 2249ef-224a2d call 211e00 4017->4029 4028->3980 4029->4017 4036->3873
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 59b7d299ce8a4fa9f752c062122b7906928e1e56f1b8a5d75eb1e23af313be09
                    • Instruction ID: 9cdf42b7cf99a5039d6ec0c574b56157418ebd48237ad3322a0504c27fc1663c
                    • Opcode Fuzzy Hash: 59b7d299ce8a4fa9f752c062122b7906928e1e56f1b8a5d75eb1e23af313be09
                    • Instruction Fuzzy Hash: 98724A70D20A1CDACB15EFA4E8916EEF775FF56344F108289E40A7A241DB719AE1CF41
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID: d
                    • API String ID: 0-2564639436
                    • Opcode ID: 21ab8af1cf0c0c05ea097ffb6e71d6054fd0fb00da674210b903ecbc7ba319ae
                    • Instruction ID: a0aaf8c6e2c9d86aac29b79ededb7b9af5e60c32c9b00eb8dac8652fa5253bc2
                    • Opcode Fuzzy Hash: 21ab8af1cf0c0c05ea097ffb6e71d6054fd0fb00da674210b903ecbc7ba319ae
                    • Instruction Fuzzy Hash: AAD33771C24A2CDACB26DFA4E9916ADF775FF56344F1082C6D40A3A241DB31AAE1CF41

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5786 324484b-324485a 5787 3244b90 5786->5787 5788 3244860-3244879 VirtualAlloc 5786->5788 5790 3244b96-3244b99 5787->5790 5788->5787 5789 324487f-32448a3 call 32446d4 5788->5789 5794 3244b8c-3244b8e 5789->5794 5795 32448a9-32448be call 324354b 5789->5795 5792 3244b9c-3244ba1 5790->5792 5794->5792 5798 32448c0-32448c7 5795->5798 5799 32448d2-32448d5 5798->5799 5800 32448c9-32448ce 5798->5800 5802 32448d9-3244900 GetCurrentProcess IsWow64Process call 3245239 5799->5802 5800->5798 5801 32448d0 5800->5801 5801->5802 5805 3244906-324490b 5802->5805 5806 3244990-3244993 5802->5806 5809 324492c-3244931 5805->5809 5810 324490d-324491d 5805->5810 5807 3244995-3244998 5806->5807 5808 32449e0-32449e3 5806->5808 5816 32449b8-32449bc 5807->5816 5817 324499a-32449b6 5807->5817 5812 3244a8e-3244a94 5808->5812 5813 32449e9-32449ee 5808->5813 5814 3244971-3244974 5809->5814 5815 3244933-3244938 5809->5815 5811 324491f-3244927 5810->5811 5818 3244a32-3244a3f 5811->5818 5824 3244b2f-3244b32 5812->5824 5825 3244a9a-3244aa0 5812->5825 5819 3244a10-3244a12 5813->5819 5820 32449f0-3244a0e 5813->5820 5822 3244976-3244979 5814->5822 5823 324497f-324498e 5814->5823 5815->5810 5821 324493a-324493c 5815->5821 5816->5787 5826 32449c2-32449de 5816->5826 5817->5818 5818->5790 5827 3244a44-3244a47 5819->5827 5828 3244a14-3244a2d 5819->5828 5820->5818 5821->5810 5829 324493e-3244941 5821->5829 5822->5787 5822->5823 5823->5811 5824->5787 5830 3244b34-3244b55 5824->5830 5831 3244ac0-3244ac6 5825->5831 5832 3244aa2-3244abb 5825->5832 5826->5818 5837 3244a67-3244a6a 5827->5837 5838 3244a49-3244a62 5827->5838 5828->5818 5833 3244957-324495a 5829->5833 5834 3244943-3244955 5829->5834 5835 3244b77 5830->5835 5836 3244b57-3244b5d 5830->5836 5839 3244ae6-3244aec 5831->5839 5840 3244ac8-3244ae1 5831->5840 5832->5790 5833->5787 5844 3244960-324496f 5833->5844 5834->5811 5846 3244b7c-3244b83 5835->5846 5836->5835 5843 3244b5f-3244b65 5836->5843 5837->5787 5845 3244a70-3244a89 5837->5845 5838->5790 5841 3244b0c-3244b12 5839->5841 5842 3244aee-3244b07 5839->5842 5840->5790 5841->5830 5847 3244b14-3244b2d 5841->5847 5842->5790 5843->5835 5848 3244b67-3244b6d 5843->5848 5844->5811 5845->5790 5846->5790 5847->5790 5848->5835 5849 3244b6f-3244b75 5848->5849 5849->5835 5850 3244b85-3244b8a 5849->5850 5850->5846
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,032422C4), ref: 0324486C
                      • Part of subcall function 032446D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03244812), ref: 032446E6
                      • Part of subcall function 032446D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03244812), ref: 032446F3
                    • GetCurrentProcess.KERNEL32(032422C4), ref: 032448E0
                    • IsWow64Process.KERNEL32(00000000), ref: 032448E7
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                    • String ID: l$ntdl
                    • API String ID: 1207166019-924918826
                    • Opcode ID: 9e88d1658e4c525c56f4b0592912cc15ccfa57fa69cc254bf67496c311055e75
                    • Instruction ID: 32d761000206224436b6052f45aec0ab478a4dc9bb2239b10fc3a7708409be2a
                    • Opcode Fuzzy Hash: 9e88d1658e4c525c56f4b0592912cc15ccfa57fa69cc254bf67496c311055e75
                    • Instruction Fuzzy Hash: 5C81E435A383119AEB2CFE55F85AB7933A8FB00714F14855AE3099B2C8D7F5C5C4871A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5851 26fca5-26fcbd call 277e88 5854 26fcd0-26fd06 call 277e5d call 26ffb3 call 270489 5851->5854 5855 26fcbf-26fccb 5851->5855 5864 26fd23-26fd2c call 27048f 5854->5864 5865 26fd08-26fd11 call 26ff1f 5854->5865 5856 26fdb9-26fdc8 5855->5856 5871 26fd41-26fd56 call 2705aa call 277e0a call 22cf50 5864->5871 5872 26fd2e-26fd37 call 26ff1f 5864->5872 5865->5864 5870 26fd13-26fd21 5865->5870 5870->5864 5884 26fd5b-26fd64 call 2705e0 5871->5884 5872->5871 5878 26fd39-26fd40 call 278191 5872->5878 5878->5871 5887 26fd66-26fd68 5884->5887 5888 26fdd0-26fdde call 2781b7 call 27817b 5884->5888 5890 26fd6f-26fd82 call 26ffd0 5887->5890 5891 26fd6a call 27816c 5887->5891 5890->5856 5891->5890
                    APIs
                    • ___scrt_release_startup_lock.LIBCMT ref: 0026FCF5
                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0026FD09
                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 0026FD2F
                    • ___scrt_uninitialize_crt.LIBCMT ref: 0026FD72
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ___scrt_is_nonwritable_in_current_image$___scrt_release_startup_lock___scrt_uninitialize_crt
                    • String ID: VPWh
                    • API String ID: 3089971210-353207083
                    • Opcode ID: afd8cb6506bf1c4b357cdf59db4ed1112743906d9021b2f0bc917d27b9d0b67a
                    • Instruction ID: 2f1eaef063c52d62bb88d711c38058bb1d5388bc215f0aaa5caf55136c873810
                    • Opcode Fuzzy Hash: afd8cb6506bf1c4b357cdf59db4ed1112743906d9021b2f0bc917d27b9d0b67a
                    • Instruction Fuzzy Hash: BB213B3657831296CF617F64BD0BA6E67909F42760F20403AF489271C2DF715CF18E94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5908 223052-223068 5910 22306a-2230ca LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 5908->5910 5911 2230ce-2230d1 5908->5911 5910->5911
                    APIs
                    • LoadLibraryA.KERNELBASE(?), ref: 0022307F
                    • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000), ref: 002230A2
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 002230B7
                    • FreeLibrary.KERNEL32(?), ref: 002230C4
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Library$CreateFreeLoadObjectSingleThreadWait
                    • String ID:
                    • API String ID: 2432312608-0
                    • Opcode ID: 0505c67819b4aeebec8a724bff4a336b582ae5a21b918312f96d69f57e5ae315
                    • Instruction ID: 2286858d1944d1e55e42635b7f1be37d2e99645874244d99f15189319f19c0cb
                    • Opcode Fuzzy Hash: 0505c67819b4aeebec8a724bff4a336b582ae5a21b918312f96d69f57e5ae315
                    • Instruction Fuzzy Hash: 76011D749403189BDB24CF54EC8CBA97774FB14715F2406C8E519562A1CBB56AC0CF50

                    Control-flow Graph

                    APIs
                    • EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                    • RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                    • LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                    • String ID:
                    • API String ID: 1367039788-0
                    • Opcode ID: 829902ede51665c77fe033812ab0e3fe30aca0795a4e78b90e3798384c2390e2
                    • Instruction ID: 472de0b5f24a8969c73c60cfaedbaad8d47e62996a89b5258b9140b3f1f240cb
                    • Opcode Fuzzy Hash: 829902ede51665c77fe033812ab0e3fe30aca0795a4e78b90e3798384c2390e2
                    • Instruction Fuzzy Hash: 65D09E3661212067CB5076EDB80C99BAA6CEF95561B06545AF225C3154DBA4884587A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5913 32446d4-32446f0 GetModuleHandleA 5914 3244706-324470e 5913->5914 5915 32446f2-32446fd LoadLibraryA 5913->5915 5917 3244714-324471f 5914->5917 5918 32447dd 5914->5918 5915->5914 5916 32446ff-3244701 5915->5916 5919 32447e0-32447e5 5916->5919 5917->5918 5920 3244725-324472e 5917->5920 5918->5919 5920->5918 5921 3244734-3244739 5920->5921 5921->5918 5922 324473f-3244743 5921->5922 5922->5918 5923 3244749-324476e 5922->5923 5924 3244770-324477b 5923->5924 5925 32447dc 5923->5925 5926 324477d-3244787 5924->5926 5925->5918 5927 32447cc-32447da 5926->5927 5928 3244789-32447a3 call 3243625 call 3243b60 5926->5928 5927->5924 5927->5925 5933 32447a5-32447ad 5928->5933 5934 32447b1-32447c9 5928->5934 5933->5926 5935 32447af 5933->5935 5934->5927 5935->5927
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03244812), ref: 032446E6
                    • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03244812), ref: 032446F3
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: HandleLibraryLoadModule
                    • String ID: ntdl
                    • API String ID: 4133054770-3973061744
                    • Opcode ID: d66374999359455977d5b5c60428678ce70b6fac75a76570af3af8024da4e81b
                    • Instruction ID: 54a234f9a29ea4bc6ffd8d5505cc6aa1938bb5da43760bae7a8a07d151baa806
                    • Opcode Fuzzy Hash: d66374999359455977d5b5c60428678ce70b6fac75a76570af3af8024da4e81b
                    • Instruction Fuzzy Hash: B331D279E106169FCB18EF9DC590ABDF7B5FF46704F084299C411A7381C734A992CBA0
                    APIs
                    • __freea.LIBCMT ref: 0027EF97
                      • Part of subcall function 0027AC15: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,0026FB1F,00000000,?,0022322C,00000000,?,002113A5,00000000), ref: 0027AC47
                    • __freea.LIBCMT ref: 0027EFAA
                    • __freea.LIBCMT ref: 0027EFB7
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: __freea$AllocateHeap
                    • String ID:
                    • API String ID: 2243444508-0
                    • Opcode ID: 3fbe6d94299e5ec35e88a589476f7611fa7d9f107322c044d30c7a2e3a77eae5
                    • Instruction ID: b5fc7f1381790235f582177f84c8457e0c3368f4778271fc7ded702b68ea0e08
                    • Opcode Fuzzy Hash: 3fbe6d94299e5ec35e88a589476f7611fa7d9f107322c044d30c7a2e3a77eae5
                    • Instruction Fuzzy Hash: 5251B572620206AFEF219F65DC41EBB76A9EF48310B1684A9FD0CD6550E770CC708A72
                    APIs
                      • Part of subcall function 00282A95: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 00282AC0
                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00282DA5,?,00000000,?,00000000,?), ref: 00282FC2
                    • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00282DA5,?,00000000,?,00000000,?), ref: 00282FFE
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID:
                    • API String ID: 546120528-0
                    • Opcode ID: 3bd6580b11ef79c7b7acedd337782715a0540b4010d1bea2e033d9b7cfa5ac49
                    • Instruction ID: ede384153bd83b2dbdedb2382e22f6b48c2f8b63394aacd438686d4bceaa9925
                    • Opcode Fuzzy Hash: 3bd6580b11ef79c7b7acedd337782715a0540b4010d1bea2e033d9b7cfa5ac49
                    • Instruction Fuzzy Hash: 18514838A123468EDB20EF75C8856AAFBF5FF40700F14846ED08ACB191E6759659CB51
                    APIs
                    • LCMapStringEx.KERNELBASE(?,0027EED2,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 0027E207
                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,0027EED2,?,?,-00000008,?,00000000), ref: 0027E225
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: String
                    • String ID:
                    • API String ID: 2568140703-0
                    • Opcode ID: d7a6eb294423ee3495e5de8a05fb596ee6f040553e6ff46dda3fe7f38fdb0ddb
                    • Instruction ID: 7ad59e3f8421c83fcc6f1a4baa802f2d723761373e3effa558acf78ee233c9a3
                    • Opcode Fuzzy Hash: d7a6eb294423ee3495e5de8a05fb596ee6f040553e6ff46dda3fe7f38fdb0ddb
                    • Instruction Fuzzy Hash: F7F06D3601011ABBCF125F90DC09DDE3E2AFF4C750F058410FE1825021C632D871ABA0
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000000,0324518A), ref: 0324353D
                    • RtlFreeHeap.NTDLL(00000000), ref: 03243544
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcess
                    • String ID:
                    • API String ID: 3859560861-0
                    • Opcode ID: 292ba1cfcc08e28af1df9d75d611264821c694ca3e96cb196d11ebf42107c1b3
                    • Instruction ID: 21e2e6331a373b2361084136fc12895d68cf3b974c2441bd1623a37efb9d3ebe
                    • Opcode Fuzzy Hash: 292ba1cfcc08e28af1df9d75d611264821c694ca3e96cb196d11ebf42107c1b3
                    • Instruction Fuzzy Hash: ACB092785121016AEF4CA7A4A90DB3A3618AB14613F046498B222E1044C76880008620
                    APIs
                    • GetCPInfo.KERNEL32(FFFFF9B2,?,00000005,00282DA5,?), ref: 00282B9B
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-0
                    • Opcode ID: f1d575792d947d1e34fcb49d9539a6b3c2d895d6269adb56d15429f69d75f839
                    • Instruction ID: 1f142eb723e070fc902bc5d71046a6468e2d88d44f8c948d09843f093847c29c
                    • Opcode Fuzzy Hash: f1d575792d947d1e34fcb49d9539a6b3c2d895d6269adb56d15429f69d75f839
                    • Instruction Fuzzy Hash: E65169B851A159EADB119F28CC84BF9BB6CFB15304F1401EAE489D71C2C375ADA9CF60
                    APIs
                    • stdext::threads::lock_error::lock_error.LIBCPMTD ref: 0027037B
                      • Part of subcall function 0027106C: RaiseException.KERNEL32(E06D7363,00000001,00000003,0027038E,?,?,?,?,0027038E,?,00298484), ref: 002710CC
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ExceptionRaisestdext::threads::lock_error::lock_error
                    • String ID:
                    • API String ID: 3447279179-0
                    • Opcode ID: a5d7235da90ca31cab2ab15da8121e540d0c0951a3757979ffddd13321ca6021
                    • Instruction ID: 94100de47c38dd783ffbb3b544c57d0b17ba4fc36a050cefdafc093b545f70e7
                    • Opcode Fuzzy Hash: a5d7235da90ca31cab2ab15da8121e540d0c0951a3757979ffddd13321ca6021
                    • Instruction Fuzzy Hash: 21F0BB3483420DB6CF04BAB9E85ACAD376C9D05314B548171B96C550D2EF70E6B88995
                    APIs
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00211477
                      • Part of subcall function 00223D80: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00223D89
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                    • String ID:
                    • API String ID: 2103942186-0
                    • Opcode ID: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                    • Instruction ID: f736b1894c8a8fbd6b853ea1b16fc3e944837eb64915b19726b875a8287a1d7d
                    • Opcode Fuzzy Hash: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                    • Instruction Fuzzy Hash: 82F03C74D1110DABCB04EFA8D4816ADB7B5AF58704F1081A9E90597345E630AFB0CB85
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,0026FB1F,00000000,?,0022322C,00000000,?,002113A5,00000000), ref: 0027AC47
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 09b8d7c5ff18b7d1dd6ccbb39f746aae01698837fbb6679de04df1282a681bb2
                    • Instruction ID: dff4685ba0af27ed13fd6902e2cc8d1c64052bc76589c37da5f79ed595746f84
                    • Opcode Fuzzy Hash: 09b8d7c5ff18b7d1dd6ccbb39f746aae01698837fbb6679de04df1282a681bb2
                    • Instruction Fuzzy Hash: D6E0A721124626B7E6232A25AD0475E76489B813B0F14C15AB90C961D0CBB08C208696
                    APIs
                    • VirtualProtect.KERNELBASE(?,00000007,?,?), ref: 00224B9E
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: f5ddc2ff87cd427fdb15349b93f59a17b209d0b9683bef166973e7daa7a70393
                    • Instruction ID: e64eba0e74a51ac8fcd90941add92b28cc14a52369d1a7deb17e869cca5b2447
                    • Opcode Fuzzy Hash: f5ddc2ff87cd427fdb15349b93f59a17b209d0b9683bef166973e7daa7a70393
                    • Instruction Fuzzy Hash: 4CD012B6E2111887CF209B68BD0C3B27778F704716B14118AE95947102DB7245358F40
                    APIs
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: allocator
                    • String ID:
                    • API String ID: 3447690668-0
                    • Opcode ID: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                    • Instruction ID: 65d07993c6d9da72748b29c372d9c9b449a2124691e75d55101cfbbf0c3efe97
                    • Opcode Fuzzy Hash: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                    • Instruction Fuzzy Hash: 2BC09B3011410C6F8704EFC8F491D55739D9B887147004155BC0D4B351CA30FD51CD54
                    APIs
                    • GetFileAttributesW.KERNELBASE(03245051,0324447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03243ECC), ref: 0324407E
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: c2db6fb4e30ce6d7570de28bad723ab2aa04a4bb2697cf9a80e0aeef3051fda1
                    • Instruction ID: 0c63b4bb94798956b19059fcb918c8118d8093d7ceecff8a99b921f9bd8276c0
                    • Opcode Fuzzy Hash: c2db6fb4e30ce6d7570de28bad723ab2aa04a4bb2697cf9a80e0aeef3051fda1
                    • Instruction Fuzzy Hash: D0A0223C0302208BCB2C23382B2E00E30000E0AAF03220B8CB033C80C0EB28C2800000
                    APIs
                    • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000040), ref: 00228B81
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 1e9f4dcec62181e7a141b9ff3cdb00a91f921e919dd51d4878f42d4bf43c6e83
                    • Instruction ID: b8e3abf1678eabd1fd0cf312f0275c943a6217ac12d804844fc394f217818fe6
                    • Opcode Fuzzy Hash: 1e9f4dcec62181e7a141b9ff3cdb00a91f921e919dd51d4878f42d4bf43c6e83
                    • Instruction Fuzzy Hash: 332116B1C269289BDB62CF24DD857EDB7B5AF52344F1092CAD40D66202DB709BE1CF00
                    APIs
                      • Part of subcall function 0324407D: GetFileAttributesW.KERNELBASE(03245051,0324447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03243ECC), ref: 0324407E
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03243F5D
                    • FindNextFileW.KERNEL32(03241710,?), ref: 03243FFE
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                    • String ID: %s%s$%s\%s$%s\*$p2#v 2#v
                    • API String ID: 674214967-2809092782
                    • Opcode ID: 7186d91be33b0344b91a5ee5d62368fcd9fe1a0727b6f8af2b4375a95fc7a9ad
                    • Instruction ID: f8b45b37b7064c154a8221a80984207a6a069b5a9602f650e1828a6990a0bff7
                    • Opcode Fuzzy Hash: 7186d91be33b0344b91a5ee5d62368fcd9fe1a0727b6f8af2b4375a95fc7a9ad
                    • Instruction Fuzzy Hash: 82312C39A2031A67DB2DFB54CC44BBDB7799F40200F080194ED159F290EBB18EE6CB90
                    APIs
                    • GetLocaleInfoW.KERNEL32(?,2000000B,jW(,00000002,00000000,?,?,?,0028576A,?,00000000), ref: 002854F1
                    • GetLocaleInfoW.KERNEL32(?,20001004,jW(,00000002,00000000,?,?,?,0028576A,?,00000000), ref: 0028551A
                    • GetACP.KERNEL32(?,?,0028576A,?,00000000), ref: 0028552F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP$jW(
                    • API String ID: 2299586839-2942386645
                    • Opcode ID: 29f53a7a2b1c62fd8f7149aabebddbb06734795aacc287b8fe22c87d232738d9
                    • Instruction ID: 229a08d13f0cba2694b421443bda6968d7107b07e26883ea89403ca25183f499
                    • Opcode Fuzzy Hash: 29f53a7a2b1c62fd8f7149aabebddbb06734795aacc287b8fe22c87d232738d9
                    • Instruction Fuzzy Hash: 2C212D3D622522A6D730AF54D905B9773A7EF50B61BA58424E909C7180F732DDA0C350
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0324410D
                    • FindNextFileW.KERNEL32(000000FF,?), ref: 03244159
                      • Part of subcall function 03243536: GetProcessHeap.KERNEL32(00000000,00000000,0324518A), ref: 0324353D
                      • Part of subcall function 03243536: RtlFreeHeap.NTDLL(00000000), ref: 03243544
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFindHeap$FirstFreeNextProcess
                    • String ID: %s\%s$%s\*$p2#v 2#v
                    • API String ID: 1689202581-2084556877
                    • Opcode ID: 01aaccf25b51caae0f554f9bc66eb4126b7a725fb63128736be18aed510e71a2
                    • Instruction ID: a70bc95bc4308e72ef6e3a6ee8d6d4e518e5a09de66a0c61994a8a593f746bfa
                    • Opcode Fuzzy Hash: 01aaccf25b51caae0f554f9bc66eb4126b7a725fb63128736be18aed510e71a2
                    • Instruction Fuzzy Hash: 7F31B9387203159BDB28FF6ADC8476E7BB9AF54640F144069D909DB241EBB48AD18B90
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0028573C
                    • IsValidCodePage.KERNEL32(00000000), ref: 0028577A
                    • IsValidLocale.KERNEL32(?,00000001), ref: 0028578D
                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 002857D5
                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 002857F0
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                    • String ID:
                    • API String ID: 415426439-0
                    • Opcode ID: f6e13aa74b4a439b551f5028cbfb3ddc120976f513d3d4c454578978af70b757
                    • Instruction ID: b6ce48e85562ea56d84ac44b7f648675176e577c78085af25c7797563d930788
                    • Opcode Fuzzy Hash: f6e13aa74b4a439b551f5028cbfb3ddc120976f513d3d4c454578978af70b757
                    • Instruction Fuzzy Hash: 5B51B4799226269BEF10FFA4DC45ABEB7B8BF04700F548029E504E71D1EB70D9608B61
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • GetACP.KERNEL32(?,?,?,?,?,?,002789B1,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00284D7E
                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,002789B1,?,?,?,00000055,?,-00000050,?,?), ref: 00284DB5
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00284F18
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$CodeInfoLocalePageValid
                    • String ID: utf8
                    • API String ID: 607553120-905460609
                    • Opcode ID: ab0de714a6730883239a2474a416a7b1291a8b3b4bc39f338dbcf347c7e8806f
                    • Instruction ID: 2d04d2dcba91130f8bd8d5e1e71991025d460a3d828e11e311557b3f506e31a9
                    • Opcode Fuzzy Hash: ab0de714a6730883239a2474a416a7b1291a8b3b4bc39f338dbcf347c7e8806f
                    • Instruction Fuzzy Hash: 86710639A22207ABDB25BF70DC46BAA73E8EF55710F114029FA15971C1FA70E9608B51
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 002704A1
                    • IsDebuggerPresent.KERNEL32 ref: 0027056D
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00270586
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00270590
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 3f444f8a83ea14ce41610c6e5cb5ad081912e04f56b2321670dff515a3ba3d76
                    • Instruction ID: 6aab35ebbe7849649f36a4dc002e0b0041c407736bbdb22b776b6bef83a79008
                    • Opcode Fuzzy Hash: 3f444f8a83ea14ce41610c6e5cb5ad081912e04f56b2321670dff515a3ba3d76
                    • Instruction Fuzzy Hash: 5831F9B5D11219DBDF20DFA4D9897CDBBB8BF08300F1041AAE50DAB250EB719A88CF45
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00285130
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0028517A
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00285240
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: InfoLocale$ErrorLast
                    • String ID:
                    • API String ID: 661929714-0
                    • Opcode ID: 18e1281f2271bc6c6b8582ac9e6e4d1541221dd70611834629afc66e89c3d884
                    • Instruction ID: 35508cd11ed2074dcb49ca8af05b30d8b6db972aee6c582d27b136dd0a4159c7
                    • Opcode Fuzzy Hash: 18e1281f2271bc6c6b8582ac9e6e4d1541221dd70611834629afc66e89c3d884
                    • Instruction Fuzzy Hash: 5761B3799626279FDB24AF24CC82B7A77A9EF14300F1040B9ED05C65C5FB74E9A1CB50
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0027447B
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00274485
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00274492
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 57335404a8b092473ca1767562cc88c463e3dd451cec99e0f4c2a8ba1dac0806
                    • Instruction ID: 5d23f1b99d5e29a3f14779d2a1af68138aca9bb95e8cdfd71268b79465dcdbbb
                    • Opcode Fuzzy Hash: 57335404a8b092473ca1767562cc88c463e3dd451cec99e0f4c2a8ba1dac0806
                    • Instruction Fuzzy Hash: CD31C574D11219ABCB21DF64D88979DBBB8BF08310F5081DAE40CA7250E7709F958F45
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00270152
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: 8fbde35e9fbefd899dfbd2e5e989b61dfb6d402ba4161d75dd689c04a0150c06
                    • Instruction ID: 31ff4d4e59b2a64640033bf0a2c5c80d88232de90e4c7858943e84488184a8c5
                    • Opcode Fuzzy Hash: 8fbde35e9fbefd899dfbd2e5e989b61dfb6d402ba4161d75dd689c04a0150c06
                    • Instruction Fuzzy Hash: E4519DB1D21216CFDB15CF64E9D9BAEBBF4FB48310F24806AD809EB251D3749954CB90
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00285383
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 6642926e25b103ef42006ac75b0a208400351515da2f12f5b43ceab4da1b92df
                    • Instruction ID: 0d52f6ea25c76be733feaecd6ff5437c2a056bc1052a425e79644fd9a50217fa
                    • Opcode Fuzzy Hash: 6642926e25b103ef42006ac75b0a208400351515da2f12f5b43ceab4da1b92df
                    • Instruction Fuzzy Hash: 7A21D336622617ABDB18AF14DC42A7A73A8EF40350F1040BAF905C61C1EBB4ED61CB50
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • EnumSystemLocalesW.KERNEL32(002850DC,00000001,00000000,?,-00000050,?,00285710,00000000,?,?,?,00000055,?), ref: 00285028
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 629bcf22956127ebed9c83a844e44868fbdad89adfbbbee1e06cc5e5f652b869
                    • Instruction ID: 9ee81c1da932383d14f2d272f8e1cdf23c09124c2acbc421ea1c80753b7702ce
                    • Opcode Fuzzy Hash: 629bcf22956127ebed9c83a844e44868fbdad89adfbbbee1e06cc5e5f652b869
                    • Instruction Fuzzy Hash: AB11293A2117069FDB18AF38C89167ABB91FF84358B14442DEA4647A80E3717852CB40
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,002852F8,00000000,00000000,?), ref: 0028558A
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: a74fd091a92dad92183d14ffe7bcfc08ab9ec65ec0f8e4e24c4388252cbbcbb3
                    • Instruction ID: 8e53c76d6876da88d63b76eae3bb06cf55d73e4df7a53f18220d81704ec1aa22
                    • Opcode Fuzzy Hash: a74fd091a92dad92183d14ffe7bcfc08ab9ec65ec0f8e4e24c4388252cbbcbb3
                    • Instruction Fuzzy Hash: 3201DB3A6216236BEB286A2488057BB3765DB40754F554428EC06A31C0EA78FE51C790
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • EnumSystemLocalesW.KERNEL32(0028532F,00000001,00000000,?,-00000050,?,002856D8,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0028509B
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: ba8ca7936653159b8bd83ec110f83659c6b14f167b58e1ad15285c68836e2fa3
                    • Instruction ID: 56350895abddef8ff30b3bd001e6450f6cdb180b77b0dd31cc0b6c5c302d230c
                    • Opcode Fuzzy Hash: ba8ca7936653159b8bd83ec110f83659c6b14f167b58e1ad15285c68836e2fa3
                    • Instruction Fuzzy Hash: 90F04C3A311B155FCB247F399C8167A7B91EF84368F04402CF905876C0D6719C52C750
                    APIs
                      • Part of subcall function 002749CA: EnterCriticalSection.KERNEL32(-0029B8A8,?,002776D7,00000000,00298C40,0000000C,0027769F,?,?,0027DB90,?,?,0027AA8E,00000001,00000364,00000000), ref: 002749D9
                    • EnumSystemLocalesW.KERNEL32(0027DBBA,00000001,00298E30,0000000C,0027DF92,00000000), ref: 0027DBFF
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: fe987d8be23226a8a1af41aad469d6c6fc64420fd9f9167e286d72c59ba56882
                    • Instruction ID: 94b28ebe5e91747210841585feedbdeabac5c2bf71a105148ff14b5c6d186e88
                    • Opcode Fuzzy Hash: fe987d8be23226a8a1af41aad469d6c6fc64420fd9f9167e286d72c59ba56882
                    • Instruction Fuzzy Hash: 1AF03732A20304DFDB01EFA8E946B9D77F0EB09720F10816AF508DB2A1CBB55910CF41
                    APIs
                      • Part of subcall function 0027A8F0: GetLastError.KERNEL32(?,?,002771B7,?,?,?,?,00000003,00274382,?,002742F1,?,00000000,00274500), ref: 0027A8F4
                      • Part of subcall function 0027A8F0: SetLastError.KERNEL32(00000000,00000000,00274500,?,?,?,?,?,00000000,?,?,0027459E,00000000,00000000,00000000,00000000), ref: 0027A996
                    • EnumSystemLocalesW.KERNEL32(00284EC4,00000001,00000000,?,?,00285732,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00284FA2
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: a911a80b57b96351c3371ffc04136704b33ab7f6f3392e66b72acd681721d5ee
                    • Instruction ID: 298df423e26def9638262944f362063a727c17033c027a896a9f2a44a3ad170e
                    • Opcode Fuzzy Hash: a911a80b57b96351c3371ffc04136704b33ab7f6f3392e66b72acd681721d5ee
                    • Instruction Fuzzy Hash: CFF0E53A7102465BCF04BF39D84966ABFA4EFC2760F0A405DFF098BA91C6719992C790
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00279527,?,20001004,00000000,00000002,?,?,00278B19), ref: 0027E0CA
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: e549189efd6d4036b78315799cf48007ad443402554466c064cb05e6fe6735c0
                    • Instruction ID: 910c624e6dc89b0c86da45d6b687db5c43e6d10e07f480b122726f73c41c04d1
                    • Opcode Fuzzy Hash: e549189efd6d4036b78315799cf48007ad443402554466c064cb05e6fe6735c0
                    • Instruction Fuzzy Hash: 63E01A35511128BBCF122F61EC08BAE3A2ABF48750F098411FC09661618BB29930ABA5
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_0006062E,0026FC56), ref: 00270627
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 853d9e0c4254bca7f33233557b4d2a491305a12b0e2f7226587ecc1f81da614f
                    • Instruction ID: 85eb42c30a56d766b48654289e9d0397687b3a066e4592e781fe977b85a59031
                    • Opcode Fuzzy Hash: 853d9e0c4254bca7f33233557b4d2a491305a12b0e2f7226587ecc1f81da614f
                    • Instruction Fuzzy Hash:
                    APIs
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: 528d0ada766a0f054a9ec11a896c46827ddff9a23c95accb957fecdf0075a6f7
                    • Instruction ID: 864930d6ad1696b1d83aff4b58c91ae5a43a7a43e43b713fa236d1acffd1eaa6
                    • Opcode Fuzzy Hash: 528d0ada766a0f054a9ec11a896c46827ddff9a23c95accb957fecdf0075a6f7
                    • Instruction Fuzzy Hash: FFA00174616206CB9B418F75BF4D21D3AE9AA49A91B0981AAA40AC6960EB288490AB01
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03244574), ref: 03244305
                    • GetProcAddress.KERNEL32(00000000), ref: 0324430E
                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03244574), ref: 0324431F
                    • GetProcAddress.KERNEL32(00000000), ref: 03244322
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03244574), ref: 032443A4
                    • GetCurrentProcess.KERNEL32(03244574,00000000,00000000,00000002,?,?,?,?,03244574), ref: 032443C0
                    • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03244574), ref: 032443CF
                    • CloseHandle.KERNEL32(03244574,?,?,?,?,03244574), ref: 032443FF
                    • GetCurrentProcess.KERNEL32(03244574,00000000,00000000,00000001,?,?,?,?,03244574), ref: 0324440D
                    • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03244574), ref: 0324441C
                    • CloseHandle.KERNEL32(?,?,?,?,?,03244574), ref: 0324442F
                    • CloseHandle.KERNEL32(000000FF), ref: 03244452
                    • CloseHandle.KERNEL32(?), ref: 0324445A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                    • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                    • API String ID: 3110323036-2044536123
                    • Opcode ID: c8b5c012623d00d1a43ba0de3ba8c2fc7fd92561e6e55b5f2748aa94de8e4bc1
                    • Instruction ID: ba604a4d167fd81cfb53951cb50da9af798410911d3fa2a32341dadd7fc57dde
                    • Opcode Fuzzy Hash: c8b5c012623d00d1a43ba0de3ba8c2fc7fd92561e6e55b5f2748aa94de8e4bc1
                    • Instruction Fuzzy Hash: D541B975A1021AABDB14FBEAEC48BAEFBB9EF44750F144065E924D7190D770CD80CB90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                    • String ID: bad locale name
                    • API String ID: 3904239083-1405518554
                    • Opcode ID: d94e52dcc42962b72d39ad0981bfe4512bbcfe1bed450d3a7216f48b8b2697e9
                    • Instruction ID: 21ad44a0f819ad49d07bf996c524bf5482a7d6ed841ad316ef56ab90ea9c1b4a
                    • Opcode Fuzzy Hash: d94e52dcc42962b72d39ad0981bfe4512bbcfe1bed450d3a7216f48b8b2697e9
                    • Instruction Fuzzy Hash: 80218EB0914249DBCF04EB98C951BFEBBB1AF55308F14455CF1122B7C2CB751A64CBA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: __aulldvrm
                    • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                    • API String ID: 1302938615-1267642376
                    • Opcode ID: 72454a6621ff4f5c567cfee503ca73b3e3615479d750c2cff218cdbd4417fded
                    • Instruction ID: d200ed1cfde6c623e970c66e3abc2751e7a7d40e929942e0543bae40db0f4bc9
                    • Opcode Fuzzy Hash: 72454a6621ff4f5c567cfee503ca73b3e3615479d750c2cff218cdbd4417fded
                    • Instruction Fuzzy Hash: B5916E71624742CFC729CF2AC48462AFBE9EF85244F184D6EF89A87651D770E8C1CB51
                    APIs
                    • type_info::operator==.LIBVCRUNTIME ref: 00273400
                    • ___TypeMatch.LIBVCRUNTIME ref: 0027350E
                    • _UnwindNestedFrames.LIBCMT ref: 00273660
                    • CallUnexpected.LIBVCRUNTIME ref: 0027367B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 2751267872-393685449
                    • Opcode ID: 0d4c33ef549ce93ef0e921f467e92eb573589f7736f0ba1d14e7e63a58b91c19
                    • Instruction ID: 01c7a6ee785ade0d9ffaee795ded3b95f2e1366c1c05c2bca7be54f1cfaaf193
                    • Opcode Fuzzy Hash: 0d4c33ef549ce93ef0e921f467e92eb573589f7736f0ba1d14e7e63a58b91c19
                    • Instruction Fuzzy Hash: 8EB16D7182021AEFCF29DFA4C8819AEB7B5BF08310B548559E8096B212D731DB71EF95
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3907804496
                    • Opcode ID: 106f87368d82997717a7d1f30bfb8ae10f0d94eec2d7426e8680bf8ed33d7d4f
                    • Instruction ID: cf3627e6a3268a43270bb170a7e5cfc46f7d2136a75e354bf32db1eab87b0d1e
                    • Opcode Fuzzy Hash: 106f87368d82997717a7d1f30bfb8ae10f0d94eec2d7426e8680bf8ed33d7d4f
                    • Instruction Fuzzy Hash: 2EB14478E252199FDB11EF99D881BADBBB8AF84300F188158E405972D2C7B09D73CF60
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00272DE7
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00272DEF
                    • _ValidateLocalCookies.LIBCMT ref: 00272E78
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00272EA3
                    • _ValidateLocalCookies.LIBCMT ref: 00272EF8
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: csm
                    • API String ID: 1170836740-1018135373
                    • Opcode ID: aa2c207c4245185511b69c15c9174470ab39d48f304b1109d8d2148767a98260
                    • Instruction ID: 2f321dc200c8a1c5b1979bf0c7352538a355672281b712c4a37a3f19143f987a
                    • Opcode Fuzzy Hash: aa2c207c4245185511b69c15c9174470ab39d48f304b1109d8d2148767a98260
                    • Instruction Fuzzy Hash: BC41BF34A2021ADBCF10DF68C885A9EBBB5EF05314F14C155E91CAB392D735AE29CF91
                    APIs
                    • GetUserDefaultUILanguage.KERNEL32 ref: 03241F90
                    • GetKeyboardLayoutList.USER32(00000032,?), ref: 03241FF2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: DefaultKeyboardLanguageLayoutListUser
                    • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                    • API String ID: 167087913-619012376
                    • Opcode ID: 6baee194063db71aa615d5cefa11f731147cb41c19e438914715373b8e11b8d7
                    • Instruction ID: 855fda798a1920313be50b4db16b9a4fd9a34baebd82ca4ea29935932d1aec73
                    • Opcode Fuzzy Hash: 6baee194063db71aa615d5cefa11f731147cb41c19e438914715373b8e11b8d7
                    • Instruction Fuzzy Hash: 1431D354E28388A9DB05DFE8A4013FDBB70AF14305F009096F558FA281D7B94BD5C76A
                    APIs
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,BA8E63C0,?,0027DEA3,00000000,002113A5,00000000,00000000), ref: 0027DE55
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3664257935-537541572
                    • Opcode ID: 91700148160b68e14c794df12b2ce67e0fcbab327a244f4aaf8824bc8278512f
                    • Instruction ID: 9bbd4db8fc23dae83cca26d2c471191cdfd76819d1d80105222632dd50029d1a
                    • Opcode Fuzzy Hash: 91700148160b68e14c794df12b2ce67e0fcbab327a244f4aaf8824bc8278512f
                    • Instruction Fuzzy Hash: C221A875A11212ABCB329F64BC45B6B3778DF557A0F244110E91EAB2D0D770FD20CAE0
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0026E51D
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0026E527
                    • int.LIBCPMTD ref: 0026E53E
                      • Part of subcall function 002146D0: std::_Lockit::_Lockit.LIBCPMT ref: 002146E6
                      • Part of subcall function 002146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00214710
                    • codecvt.LIBCPMT ref: 0026E561
                    • std::_Facet_Register.LIBCPMT ref: 0026E578
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0026E598
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 0026E5A5
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                    • String ID:
                    • API String ID: 2133458128-0
                    • Opcode ID: 4ad9e448120c6ff9cb0099598075d71f08a2de50348da01eb28c304205edf92c
                    • Instruction ID: baf3d587722fbc696a0d783ce02b24684cc4f1cb33669175d91bbb0ab133d97a
                    • Opcode Fuzzy Hash: 4ad9e448120c6ff9cb0099598075d71f08a2de50348da01eb28c304205edf92c
                    • Instruction Fuzzy Hash: ED11E4B59202159FCF11EFA4E9457BE77B5BF84724F500409F40697281DFB49EA18F90
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0026D7AF
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0026D7B9
                    • int.LIBCPMTD ref: 0026D7D0
                      • Part of subcall function 002146D0: std::_Lockit::_Lockit.LIBCPMT ref: 002146E6
                      • Part of subcall function 002146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00214710
                    • codecvt.LIBCPMT ref: 0026D7F3
                    • std::_Facet_Register.LIBCPMT ref: 0026D80A
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0026D82A
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 0026D837
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                    • String ID:
                    • API String ID: 2133458128-0
                    • Opcode ID: 384a5a67250e160d98e6b955b3c2f609d47a71e2a69b751051e47c306230bdbf
                    • Instruction ID: de00f0370aacc4cbe8130de5aabd22f331a80ecd24d3f430e7a50ea43fbc6d6a
                    • Opcode Fuzzy Hash: 384a5a67250e160d98e6b955b3c2f609d47a71e2a69b751051e47c306230bdbf
                    • Instruction Fuzzy Hash: 0801D675E2411A9BCB01FBA0E9596BDB772EF84324F240009E8156B281CF749E65CFC1
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0026F927
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0026F992
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0026F9AF
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0026F9EE
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0026FA4D
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0026FA70
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ByteCharMultiStringWide
                    • String ID:
                    • API String ID: 2829165498-0
                    • Opcode ID: 683fa9c483ba4ac73f85b25fdd0d7fcac20190c8355598a861322e5b062da654
                    • Instruction ID: 078f3c41ab2187509de74fd3ac45d82cfcacfdf864609894d71c1a53ac6f95d0
                    • Opcode Fuzzy Hash: 683fa9c483ba4ac73f85b25fdd0d7fcac20190c8355598a861322e5b062da654
                    • Instruction Fuzzy Hash: 8E51BF7292120AFBDF609FA4ED45FAB7BA9EF44740F244535F919E6150D7708CA0CB90
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: x
                    • API String ID: 0-2363233923
                    • Opcode ID: 0a0d6cca72d7c9a5a29e56f1f8a037c682dc5f88dadd77cfacbc797c3999e773
                    • Instruction ID: 2735e09d45488e705b22c3ba584472108a057a0c9c9ef34178c8917bb903b63b
                    • Opcode Fuzzy Hash: 0a0d6cca72d7c9a5a29e56f1f8a037c682dc5f88dadd77cfacbc797c3999e773
                    • Instruction Fuzzy Hash: B202B178E2020ADFCB49CF98D984AADB7F4FF09304F148456E966EB250D770AA61CF51
                    APIs
                    • GetLastError.KERNEL32(?,?,00272FA1,002716DC,00270672), ref: 00272FB8
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00272FC6
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00272FDF
                    • SetLastError.KERNEL32(00000000,00272FA1,002716DC,00270672), ref: 00273031
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: d9e078d9f17f634a49d4d94b8c1bec0197d6f717c443488fb9ad702826f4ca73
                    • Instruction ID: 49622645a3a5b315bbea7f3b35f32bf81b83fec7b1fc2c6d82d76741e248e0f5
                    • Opcode Fuzzy Hash: d9e078d9f17f634a49d4d94b8c1bec0197d6f717c443488fb9ad702826f4ca73
                    • Instruction Fuzzy Hash: 1801D83213E3229E9A253F757D8972B2655EB51774720832EF11C910E0EF724C746683
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BA8E63C0,?,?,00000000,00288AEC,000000FF,?,002780A8,?,?,0027807C,00000000), ref: 00278101
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00278113
                    • FreeLibrary.KERNEL32(00000000,?,00000000,00288AEC,000000FF,?,002780A8,?,?,0027807C,00000000), ref: 00278135
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 70e93291fdfba95573729c54af824d501b7b185a283a0755af0734b730777742
                    • Instruction ID: 9da6b7813b21066c7f59e7980a066d4679b68eb4fad81ae1ae7ef660ecea46cf
                    • Opcode Fuzzy Hash: 70e93291fdfba95573729c54af824d501b7b185a283a0755af0734b730777742
                    • Instruction Fuzzy Hash: AD01A775551615EFCB119F50DC0DBBFBBB9FB05B10F04452AE815A22D0DB749810CB51
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00211E40
                    • int.LIBCPMTD ref: 00211E59
                      • Part of subcall function 002146D0: std::_Lockit::_Lockit.LIBCPMT ref: 002146E6
                      • Part of subcall function 002146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00214710
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00211E99
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00211F01
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                    • String ID:
                    • API String ID: 3053331623-0
                    • Opcode ID: 0984f72d84c0df503cc97517d5c63721a92b5deaf5277f76071370f0d1229d65
                    • Instruction ID: 95e264cc68f68f2b7a2974630e5c06bdc5a24f0a6c91bb0f1746d17c1e43d571
                    • Opcode Fuzzy Hash: 0984f72d84c0df503cc97517d5c63721a92b5deaf5277f76071370f0d1229d65
                    • Instruction Fuzzy Hash: 0F312DB1D1024ADBCB04EFD4D992BFEBBB0BF18310F204219E91567391DB345AA4CBA1
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00211F40
                    • int.LIBCPMTD ref: 00211F59
                      • Part of subcall function 002146D0: std::_Lockit::_Lockit.LIBCPMT ref: 002146E6
                      • Part of subcall function 002146D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00214710
                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00211F99
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00212001
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                    • String ID:
                    • API String ID: 3053331623-0
                    • Opcode ID: eca640bd73fd614c1f388f7f4cc8fb49016d9f7c9960e7a37001181e69865860
                    • Instruction ID: 83d813bb991f0ac27f9b126044223d58328ea3c664415952fcd74e638137724a
                    • Opcode Fuzzy Hash: eca640bd73fd614c1f388f7f4cc8fb49016d9f7c9960e7a37001181e69865860
                    • Instruction Fuzzy Hash: D03129B1D1024ADBCB04EF94D981AFEBBB4BF18310F204219E51567391DB746AA5CFA1
                    APIs
                    • __EH_prolog3.LIBCMT ref: 0026CE44
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0026CE4F
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0026CEBD
                      • Part of subcall function 0026CFA0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0026CFB8
                    • std::locale::_Setgloballocale.LIBCPMT ref: 0026CE6A
                    • _Yarn.LIBCPMT ref: 0026CE80
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                    • String ID:
                    • API String ID: 1088826258-0
                    • Opcode ID: bfb7db839639175a1b18dcadf312d07ac8947d4a8b10fbce20be4c42a7af5e60
                    • Instruction ID: 7923799bab6976ee47647c83de6565210a2418e5058b22b38509f93c8a4b0cbd
                    • Opcode Fuzzy Hash: bfb7db839639175a1b18dcadf312d07ac8947d4a8b10fbce20be4c42a7af5e60
                    • Instruction Fuzzy Hash: 3501D479A211119BC706FF60E89967D7772BF85750B24400AE44617381CF785E96CFC5
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00274023,00000000,?,0029B824,?,?,?,002741C6,00000004,InitializeCriticalSectionEx,0028B270,InitializeCriticalSectionEx), ref: 0027407F
                    • GetLastError.KERNEL32(?,00274023,00000000,?,0029B824,?,?,?,002741C6,00000004,InitializeCriticalSectionEx,0028B270,InitializeCriticalSectionEx,00000000,?,00273F7D), ref: 00274089
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 002740B1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID: api-ms-
                    • API String ID: 3177248105-2084034818
                    • Opcode ID: 94a7d47da2686d19363c56273392ecc80b522b53b01dc65705235445efb31bab
                    • Instruction ID: 31263267eaea5832d7b60b8a032a6601ed0e46c824cfcdefd5838404f031a879
                    • Opcode Fuzzy Hash: 94a7d47da2686d19363c56273392ecc80b522b53b01dc65705235445efb31bab
                    • Instruction Fuzzy Hash: 89E0B834691205BBDF213F61FC0AB693B959B41B55F148020FE0CE44E1E772D9B4DAD9
                    APIs
                    • GetConsoleOutputCP.KERNEL32(BA8E63C0,00000000,00000000,00000000), ref: 0027F4FA
                      • Part of subcall function 00281EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0027EF8D,?,00000000,-00000008), ref: 00281F1E
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0027F74C
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0027F792
                    • GetLastError.KERNEL32 ref: 0027F835
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                    • String ID:
                    • API String ID: 2112829910-0
                    • Opcode ID: f7e1926ef91553624590840dbc73fd1423734836f42b6def40a3a6bba8217f07
                    • Instruction ID: 7d76b79192138df5f39eca014a72574ee260b37c1b8de42810f504ac39c12c58
                    • Opcode Fuzzy Hash: f7e1926ef91553624590840dbc73fd1423734836f42b6def40a3a6bba8217f07
                    • Instruction Fuzzy Hash: 09D18C75D142499FCB15CFA8D980AADBBB5FF09314F24812AE82AEB351D730A952CF50
                    APIs
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: 378b4f8942846a8a8df9803023af0670dde5ca02767632c30ec28d6b5cac0118
                    • Instruction ID: 7421780f86745ef96927fce8d58d7b334a0310ccc772c1ce53def560d3da7641
                    • Opcode Fuzzy Hash: 378b4f8942846a8a8df9803023af0670dde5ca02767632c30ec28d6b5cac0118
                    • Instruction Fuzzy Hash: C95101726252079FDB29CF14D841BAAB7A5EF40300F64C42DEC0E87291D771EEA1EB90
                    APIs
                      • Part of subcall function 00281EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0027EF8D,?,00000000,-00000008), ref: 00281F1E
                    • GetLastError.KERNEL32 ref: 002822DE
                    • __dosmaperr.LIBCMT ref: 002822E5
                    • GetLastError.KERNEL32(?,?,?,?), ref: 0028231F
                    • __dosmaperr.LIBCMT ref: 00282326
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                    • String ID:
                    • API String ID: 1913693674-0
                    • Opcode ID: bb9d4d937d914b932e7be243908b39d8570529c7b35ecb4fc6373a8419736fe3
                    • Instruction ID: 7da9fd41331f131456174301136adc2c11b6d2e1984e5688804c141c47623ffd
                    • Opcode Fuzzy Hash: bb9d4d937d914b932e7be243908b39d8570529c7b35ecb4fc6373a8419736fe3
                    • Instruction Fuzzy Hash: 05210435621216EFDB20BF619C8182BB7ADFF443647148958FC19D7290D7B4ED748BA0
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: da9ba9767b002101cada23f2630803fd9f73947ce7ac0fc12c4a55c60c9adea2
                    • Instruction ID: 426608f51111092ff8483d16fd5c5fd84f4d5d27faec925fec2364c366ef6d27
                    • Opcode Fuzzy Hash: da9ba9767b002101cada23f2630803fd9f73947ce7ac0fc12c4a55c60c9adea2
                    • Instruction Fuzzy Hash: E221A471628616AFDB20AF75DC4192BBBA9EF40368750C658FC1CD7160E7B0ED308BA0
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 00283226
                      • Part of subcall function 00281EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,0027EF8D,?,00000000,-00000008), ref: 00281F1E
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0028325E
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0028327E
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                    • String ID:
                    • API String ID: 158306478-0
                    • Opcode ID: 78f53ae97f023c8937c71632f9edf8a556f2064469cced755e4733e690be6880
                    • Instruction ID: 54bb1ebd0b85a97c22fb20773258ed61f04c7d0128e0706093972adf3bede0df
                    • Opcode Fuzzy Hash: 78f53ae97f023c8937c71632f9edf8a556f2064469cced755e4733e690be6880
                    • Instruction Fuzzy Hash: 631104B95271167FA711BBB69CCECBF29ACDE98BA83100414FC0691180EB708E618B71
                    APIs
                    • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00286B6B,00000000,00000001,0000000C,00000000,?,0027F889,00000000,00000000,00000000), ref: 00287C52
                    • GetLastError.KERNEL32(?,00286B6B,00000000,00000001,0000000C,00000000,?,0027F889,00000000,00000000,00000000,00000000,00000000,?,0027FE2C,?), ref: 00287C5E
                      • Part of subcall function 00287C24: CloseHandle.KERNEL32(FFFFFFFE,00287C6E,?,00286B6B,00000000,00000001,0000000C,00000000,?,0027F889,00000000,00000000,00000000,00000000,00000000), ref: 00287C34
                    • ___initconout.LIBCMT ref: 00287C6E
                      • Part of subcall function 00287BE6: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00287C15,00286B58,00000000,?,0027F889,00000000,00000000,00000000,00000000), ref: 00287BF9
                    • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,00286B6B,00000000,00000001,0000000C,00000000,?,0027F889,00000000,00000000,00000000,00000000), ref: 00287C83
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: b638b33a08f1c3953c147450f3910949168d675d046d2c2bb8cd27b5275826b3
                    • Instruction ID: 6fadc404573d186069a464b2c7906eb933aa24e84af1949183e1599f5d2d8949
                    • Opcode Fuzzy Hash: b638b33a08f1c3953c147450f3910949168d675d046d2c2bb8cd27b5275826b3
                    • Instruction Fuzzy Hash: BEF01C3A516219BBCF222FD5EC0C9993F36EB087A4F194051FA0996160C632C860EBD5
                    APIs
                      • Part of subcall function 03243508: EnterCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 03243512
                      • Part of subcall function 03243508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,032451B7), ref: 0324351B
                      • Part of subcall function 03243508: RtlAllocateHeap.NTDLL(00000000,?,?,032451B7), ref: 03243522
                      • Part of subcall function 03243508: LeaveCriticalSection.KERNEL32(032484D4,?,?,032451B7), ref: 0324352B
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 03242E3D
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3524183588.0000000003240000.00000040.00001000.00020000.00000000.sdmp, Offset: 03240000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_3240000_62FC.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                    • String ID: x
                    • API String ID: 1990697408-2363233923
                    • Opcode ID: 5133487ef6bf364143e5c805008b9c93b3c516fa21f6b7aca335b81aed517e51
                    • Instruction ID: 519791e10721fa99b484090cee14cb2043618a1377272706b8d267b73066f8fc
                    • Opcode Fuzzy Hash: 5133487ef6bf364143e5c805008b9c93b3c516fa21f6b7aca335b81aed517e51
                    • Instruction Fuzzy Hash: F102BE74A2424AEFCF09CF99D884AADBBF0FB09310F148895E855EB250D770AA91CF51
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 0027BC8D
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: 72fe562b407c9f15526086aa828e8648cbd635d94fb04311c01b20ef0324e7f2
                    • Instruction ID: 1f655d7d0b883625bbcf66bfe557bef5326b09a79eb6cf6ddc37666b7e4a352c
                    • Opcode Fuzzy Hash: 72fe562b407c9f15526086aa828e8648cbd635d94fb04311c01b20ef0324e7f2
                    • Instruction Fuzzy Hash: 8E5147B19355039ACB237F24D94536A2B94DB40B10F34C96FE48E822A9EF358CF49B46
                    APIs
                    • EncodePointer.KERNEL32(00000000,?), ref: 002736AB
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: EncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 2118026453-2084237596
                    • Opcode ID: 8f634998b9da6f2909e3db2cdf1d4aa59216c2fdf88b58c9e0a28a0a4f35de51
                    • Instruction ID: 79ab4e53d46faa9cefef1563e569132263990eee1db0482c39fa507a5bfd723c
                    • Opcode Fuzzy Hash: 8f634998b9da6f2909e3db2cdf1d4aa59216c2fdf88b58c9e0a28a0a4f35de51
                    • Instruction Fuzzy Hash: 68415BB191020AEFCF15DF98CD81AEEBBB5BF48300F148159F908A7251D335AA60EF55
                    APIs
                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 0026C9E8
                    • task.LIBCPMTD ref: 0026C9F6
                    Strings
                    • }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+, xrefs: 0026C92A
                    Memory Dump Source
                    • Source File: 0000000B.00000002.3523031296.0000000000211000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00210000, based on PE: true
                    • Associated: 0000000B.00000002.3523003457.0000000000210000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523082048.0000000000289000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523121899.000000000029A000.00000004.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523145700.000000000029B000.00000040.00000001.01000000.0000000C.sdmpDownload File
                    • Associated: 0000000B.00000002.3523170305.000000000029C000.00000002.00000001.01000000.0000000C.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_210000_62FC.jbxd
                    Similarity
                    • API ID: Concurrency::task_continuation_context::task_continuation_contexttask
                    • String ID: }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+
                    • API String ID: 605201214-2946796713
                    • Opcode ID: 08ac131c64108cf3e435c402c38fd2fcda6b16977da03a84a59f326eabd1a065
                    • Instruction ID: 900a79282682ca39e4564f1b9a107a7803f2adae2ff4b7a683f7b02874e97605
                    • Opcode Fuzzy Hash: 08ac131c64108cf3e435c402c38fd2fcda6b16977da03a84a59f326eabd1a065
                    • Instruction Fuzzy Hash: D43103B1D151199BCB04EF98C952BFEBBB1FF48304F204119E855B7280DB742A50CFA0