Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe

Overview

General Information

Sample name:SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe
Analysis ID:1466796
MD5:ac7fd6661ae787ba13c4599c8aef8807
SHA1:bf28bf1d44e190e4cea10ddad1992fd3671ed13a
SHA256:487d893f6d85731ec5e27e65c863163de9cb7bf8c2f0f18118caa6449c96c922
Tags:exeSmokeLoader
Infos:

Detection

LummaC, Poverty Stealer, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected LummaC Stealer
Yara detected Poverty Stealer
Yara detected SmokeLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Too many similar processes found
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe" MD5: AC7FD6661AE787BA13C4599C8AEF8807)
    • explorer.exe (PID: 2580 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
      • 25B5.exe (PID: 7732 cmdline: C:\Users\user\AppData\Local\Temp\25B5.exe MD5: BD2EAC64CBDED877608468D86786594A)
      • 5B7B.exe (PID: 7832 cmdline: C:\Users\user\AppData\Local\Temp\5B7B.exe MD5: 60172CA946DE57C3529E9F05CC502870)
        • setup.exe (PID: 7120 cmdline: "C:\Users\user\AppData\Local\Temp\setup.exe" MD5: FF2293FBFF53F4BD2BFF91780FABFD60)
          • GamePall.exe (PID: 7656 cmdline: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 1832 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5436 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 7092 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 6824 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 2144 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 6872 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 7916 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 3152 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 7760 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
                • GamePall.exe (PID: 6696 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 7368 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5756 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5552 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 4416 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 2380 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 5100 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6328 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 6780 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
              • GamePall.exe (PID: 7116 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 7688 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 7516 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 3520 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 4364 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 3352 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1 MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 2112 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 5644 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
            • GamePall.exe (PID: 3888 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
      • 91EE.exe (PID: 7920 cmdline: C:\Users\user\AppData\Local\Temp\91EE.exe MD5: DA4B6F39FC024D2383D4BFE7F67F1EE1)
      • GamePall.exe (PID: 4820 cmdline: "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" MD5: 7A3502C1119795D35569535DE243B6FE)
  • utdciaf (PID: 7672 cmdline: C:\Users\user\AppData\Roaming\utdciaf MD5: AC7FD6661AE787BA13C4599C8AEF8807)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "foodypannyjsud.shop"], "Build id": "bOKHNM--"}
{"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
{"C2 url": "146.70.169.164:2227"}
SourceRuleDescriptionAuthorStrings
00000006.00000003.2089670424.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x37ae:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000006.00000003.2091390577.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmpJoeSecurity_SmokeLoader_2Yara detected SmokeLoaderJoe Security
          Click to see the 26 entries
          SourceRuleDescriptionAuthorStrings
          8.2.91EE.exe.1156560.1.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
            8.2.91EE.exe.119eea0.2.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
              8.2.91EE.exe.3820000.3.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                8.2.91EE.exe.3820000.3.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                  8.2.91EE.exe.119eea0.2.raw.unpackJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
                    Click to see the 1 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\setup.exe, ProcessId: 7120, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GamePall
                    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\utdciaf, CommandLine: C:\Users\user\AppData\Roaming\utdciaf, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\utdciaf, NewProcessName: C:\Users\user\AppData\Roaming\utdciaf, OriginalFileName: C:\Users\user\AppData\Roaming\utdciaf, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: C:\Users\user\AppData\Roaming\utdciaf, ProcessId: 7672, ProcessName: utdciaf
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeAvira: detected
                    Source: https://foodypannyjsud.shop/yAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/optAvira URL Cloud: Label: malware
                    Source: http://gebeus.ru/tmp/index.phpAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/fAvira URL Cloud: Label: malware
                    Source: http://cx5519.com/tmp/index.phpAvira URL Cloud: Label: malware
                    Source: contintnetksows.shopAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/:sAvira URL Cloud: Label: malware
                    Source: http://evilos.cc/tmp/index.phpAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/1Avira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/8Avira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/apixAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/obAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/apiaAvira URL Cloud: Label: malware
                    Source: ellaboratepwsz.xyzAvira URL Cloud: Label: malware
                    Source: swellfrrgwwos.xyzAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/apiPAvira URL Cloud: Label: malware
                    Source: https://foodypannyjsud.shop/apiZAvira URL Cloud: Label: malware
                    Source: foodypannyjsud.shopAvira URL Cloud: Label: malware
                    Source: pedestriankodwu.xyzAvira URL Cloud: Label: malware
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAvira: detection malicious, Label: HEUR/AGEN.1313486
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeAvira: detection malicious, Label: HEUR/AGEN.1352426
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeAvira: detection malicious, Label: HEUR/AGEN.1359405
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].datAvira: detection malicious, Label: HEUR/AGEN.1359405
                    Source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
                    Source: 8.2.91EE.exe.119eea0.2.unpackMalware Configuration Extractor: Poverty Stealer {"C2 url": "146.70.169.164:2227"}
                    Source: 6.2.25B5.exe.b60000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyz", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyz", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop", "foodypannyjsud.shop"], "Build id": "bOKHNM--"}
                    Source: http://gebeus.ru/tmp/index.phpVirustotal: Detection: 15%Perma Link
                    Source: contintnetksows.shopVirustotal: Detection: 15%Perma Link
                    Source: http://cx5519.com/tmp/index.phpVirustotal: Detection: 11%Perma Link
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeReversingLabs: Detection: 67%
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeReversingLabs: Detection: 20%
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeReversingLabs: Detection: 54%
                    Source: C:\Users\user\AppData\Roaming\utdciafReversingLabs: Detection: 47%
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeReversingLabs: Detection: 47%
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeVirustotal: Detection: 37%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\GamePall\Del.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeJoe Sandbox ML: detected
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: pedestriankodwu.xyz
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: towerxxuytwi.xyz
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: ellaboratepwsz.xyz
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: penetratedpoopp.xyz
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: swellfrrgwwos.xyz
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: contintnetksows.shop
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: foodypannyjsud.shop
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: potterryisiw.shop
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: foodypannyjsud.shop
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: TeslaBrowser/5.5
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: - Screen Resoluton:
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: - Physical Installed Memory:
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: Workgroup: -
                    Source: 6.2.25B5.exe.b60000.0.unpackString decryptor: bOKHNM--
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03821C94 CryptUnprotectData,CryptProtectData,8_2_03821C94

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeUnpacked PE file: 8.2.91EE.exe.3820000.3.unpack
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: Binary string: ntkrnlmp.pdbx, source: 91EE.exe, 00000008.00000002.3068963485.000000000A812000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb source: Ionic.Zip.dll.10.dr
                    Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdb source: widevinecdmadapter.dll.10.dr
                    Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb$# source: Ionic.Zip.dll.10.dr
                    Source: Binary string: D3DCompiler_43.pdb source: d3dcompiler_43.dll.10.dr
                    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: 91EE.exe, 00000008.00000002.3068963485.000000000A812000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3068963485.000000000A80C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: h:\work\newContent\secondBranch\DeleteProgram\DeleteProgram\obj\Release\KlMain.pdb source: Del.exe.10.dr
                    Source: Binary string: ntkrnlmp.pdb source: 91EE.exe, 00000008.00000002.3068963485.000000000A80C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000B.00000000.3306074531.0000000000F92000.00000002.00000001.01000000.00000010.sdmp
                    Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000012.00000002.3409362343.0000000004ED2000.00000002.00000001.01000000.00000013.sdmp
                    Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exewall.dlldll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exemePall source: setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                    Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000012.00000002.3409362343.0000000004ED2000.00000002.00000001.01000000.00000013.sdmp
                    Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdbGCTL source: widevinecdmadapter.dll.10.dr
                    Source: Binary string: D3DCompiler_43.pdb` source: d3dcompiler_43.dll.10.dr
                    Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 91EE.exe, 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp, 91EE.exe, 00000008.00000000.2253926421.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp
                    Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000A.00000002.3575725593.0000000000759000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000A.00000002.3575725593.0000000000759000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 91EE.exe, 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp, 91EE.exe, 00000008.00000000.2253926421.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1352
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,7_2_00405B4A
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004066FF FindFirstFileA,FindClose,7_2_004066FF
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004027AA FindFirstFileA,7_2_004027AA
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FE256E FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_00FE256E
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03821000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,8_2_03821000
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03824E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,8_2_03824E27
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03821D3C FindFirstFileW,FindNextFileW,8_2_03821D3C
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_038240BA FindFirstFileW,FindNextFileW,8_2_038240BA
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03823EFC FindFirstFileW,FindNextFileW,8_2_03823EFC
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior

                    Networking

                    barindex
                    Source: C:\Windows\explorer.exeNetwork Connect: 77.221.157.163 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 141.8.194.149 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 183.100.39.16 80Jump to behavior
                    Source: Malware configuration extractorURLs: pedestriankodwu.xyz
                    Source: Malware configuration extractorURLs: towerxxuytwi.xyz
                    Source: Malware configuration extractorURLs: ellaboratepwsz.xyz
                    Source: Malware configuration extractorURLs: penetratedpoopp.xyz
                    Source: Malware configuration extractorURLs: swellfrrgwwos.xyz
                    Source: Malware configuration extractorURLs: contintnetksows.shop
                    Source: Malware configuration extractorURLs: foodypannyjsud.shop
                    Source: Malware configuration extractorURLs: potterryisiw.shop
                    Source: Malware configuration extractorURLs: foodypannyjsud.shop
                    Source: Malware configuration extractorURLs: http://evilos.cc/tmp/index.php
                    Source: Malware configuration extractorURLs: http://gebeus.ru/tmp/index.php
                    Source: Malware configuration extractorURLs: http://office-techs.biz/tmp/index.php
                    Source: Malware configuration extractorURLs: http://cx5519.com/tmp/index.php
                    Source: Malware configuration extractorURLs: 146.70.169.164:2227
                    Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                    Source: Joe Sandbox ViewIP Address: 104.192.141.1 104.192.141.1
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewASN Name: INFOBOX-ASInfoboxruAutonomousSystemRU INFOBOX-ASInfoboxruAutonomousSystemRU
                    Source: Joe Sandbox ViewASN Name: SPRINTHOSTRU SPRINTHOSTRU
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00F75B80 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,InternetOpenA,FreeLibrary,_strlen,InternetOpenUrlA,FreeLibrary,task,InternetReadFile,FreeLibrary,task,8_2_00F75B80
                    Source: GamePall.exe, 00000013.00000002.3414593361.00000000025B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activity
                    Source: GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/activity.0
                    Source: GamePall.exe, 00000013.00000002.3414593361.00000000025B7000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.install-stat.debug.world/clients/installs
                    Source: GamePall.exe, 00000017.00000002.3663624201.00000000023A7000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bageyou.xyz
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.000000000982D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: log4net.xml.10.drString found in binary or memory: http://logging.apache.org/log4j
                    Source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp, log4net.xml.10.drString found in binary or memory: http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
                    Source: log4net.xml.10.drString found in binary or memory: http://logging.apache.org/log4net/schemas/log4net-events-1.2&gt;
                    Source: 5B7B.exe, 5B7B.exe, 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 5B7B.exe, 00000007.00000000.2178634584.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000A.00000000.2999786119.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000A.00000003.3307143221.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error
                    Source: 5B7B.exe, 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 5B7B.exe, 00000007.00000000.2178634584.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000A.00000000.2999786119.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000A.00000003.3307143221.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.000000000982D000.00000004.00000001.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: explorer.exe, 00000001.00000000.1732337521.0000000007F40000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1733897915.0000000009B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.1732693553.0000000008720000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                    Source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/).
                    Source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/
                    Source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Ionic.Zip.dll.10.drString found in binary or memory: http://www.codeplex.com/DotNetZip
                    Source: log4net.xml.10.drString found in binary or memory: http://www.connectionstrings.com/
                    Source: log4net.xml.10.drString found in binary or memory: http://www.faqs.org/rfcs/rfc3164.html.
                    Source: log4net.xml.10.drString found in binary or memory: http://www.iana.org/assignments/multicast-addresses
                    Source: icudtl.dat.10.drString found in binary or memory: http://www.unicode.org/copyright.html
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: 25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: 5B7B.exe, 00000007.00000003.3581751482.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, 5B7B.exe, 00000007.00000002.3593544077.00000000007CC000.00000004.00000020.00020000.00000000.sdmp, 5B7B.exe, 00000007.00000003.3581530561.00000000007CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/
                    Source: 5B7B.exe, 00000007.00000003.2180408667.0000000003070000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat
                    Source: 5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat#
                    Source: 5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.dat%
                    Source: 5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datl
                    Source: 5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datle
                    Source: 5B7B.exe, 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd
                    Source: 5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xiexie.wf/22_551/huge.datw
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C893000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirmr
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                    Source: explorer.exe, 00000001.00000000.1733189731.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                    Source: explorer.exe, 00000001.00000000.1733189731.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/q
                    Source: explorer.exe, 00000001.00000000.1730934434.0000000003700000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1730424246.0000000001240000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: explorer.exe, 00000001.00000000.1733189731.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?&
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0CC40BF291614022B7DF6E2143E8A6AF&timeOut=5000&oc
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.00000000097D4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                    Source: explorer.exe, 00000001.00000000.1733189731.00000000096DF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.comi
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/staticsb/statics/latest/traffic/Notification/desktop/svg/RoadHazard.svg
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/humidity.svg
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/GF
                    Source: 91EE.exe, 00000008.00000002.3011588668.00000000010EE000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3011588668.00000000010E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee
                    Source: 91EE.exe, 00000008.00000002.3011588668.00000000010EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee?
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.cookielaw.org/
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu-dark
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chrome.google.com/webstore/category/extensions
                    Source: bn.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=bn&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: bn.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=bnCtrl$1
                    Source: en-US.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: en-US.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=enCtrl$1
                    Source: et.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: et.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=etCtrl$1
                    Source: lt.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: lt.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=ltCtrl$1
                    Source: mr.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: mr.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=mrCtrl$1
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=ukCtrl$1
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=urCtrl$2
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=viCtrl$1
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, zh-CN.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CN&category=theme81https://myactivity.google.com/myactivity
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, zh-CN.pak.10.drString found in binary or memory: https://chrome.google.com/webstore?hl=zh-CNCtrl$1
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TW&category=theme81https://myactivity.google.com/myactivity
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=zh-TWCtrl$1
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherEnabled
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlGreylist
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromeenterprise.google/policies/#BrowserSwitcherUseIeSitelist
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2112281033.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2153865909.0000000001C8C000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144617701.0000000001C85000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191088300.0000000001C97000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2164581591.0000000001CF9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144088971.0000000001C83000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091390577.0000000001CAB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191322655.0000000001CDE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129573415.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089946661.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129331441.0000000001C75000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2112281033.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/1
                    Source: 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/8
                    Source: 25B5.exe, 00000006.00000003.2164581591.0000000001CF9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/:s
                    Source: 25B5.exe, 00000006.00000003.2190787943.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192806726.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2159719721.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2159158009.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2164480701.0000000001D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/ap
                    Source: 25B5.exe, 00000006.00000003.2112281033.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/api
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apiH
                    Source: 25B5.exe, 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129331441.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129573415.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191088300.0000000001C8C000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091390577.0000000001CAB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2153865909.0000000001CAB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089946661.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192503067.0000000001C8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apiP
                    Source: 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apiZ
                    Source: 25B5.exe, 00000006.00000003.2153830305.0000000001CF1000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apia
                    Source: 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192727047.0000000001CF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/apix
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144576355.0000000001CF7000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129573415.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/bm
                    Source: 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/bu)
                    Source: 25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/f
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144576355.0000000001CF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/jh
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144576355.0000000001CF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/ob
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/opt
                    Source: 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/pi
                    Source: 25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144576355.0000000001CF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/s5
                    Source: 25B5.exe, 00000006.00000003.2102037553.0000000001D0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop/y
                    Source: 25B5.exe, 00000006.00000003.2091821267.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.shop:443/api
                    Source: 25B5.exe, 00000006.00000003.2091821267.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C81000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C81000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://foodypannyjsud.so
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hlXIY.img
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAKSoFp.img
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAXaopi.img
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ.img
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqlLky.img
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://myactivity.google.com/
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com_
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.dr, lt.pak.10.drString found in binary or memory: https://passwords.google.com
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, en-US.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://passwords.google.comGoogle
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drString found in binary or memory: https://passwords.google.comT
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://photos.google.com/settings?referrer=CHROME_NTP
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://policies.google.com/
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://support.google.com/chrome/a/answer/9122284
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://support.google.com/chrome/answer/6098869
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://support.google.com/chromebook?p=app_intent
                    Source: 25B5.exe, 00000006.00000003.2090171032.00000000040DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: 25B5.exe, 00000006.00000003.2090171032.00000000040DC000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2090420823.00000000040D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                    Source: 25B5.exe, 00000006.00000003.2090420823.00000000040B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                    Source: 25B5.exe, 00000006.00000003.2090171032.00000000040DC000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2090420823.00000000040D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                    Source: 25B5.exe, 00000006.00000003.2090420823.00000000040B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                    Source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp, GamePall.exe, 00000012.00000002.3402071933.0000000004976000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://svn.apache.org/repos/asf/logging/log4net/tags/2.0.8RC1
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C557000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/L
                    Source: explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: 25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, mr.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.html&
                    Source: et.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldab
                    Source: en-US.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
                    Source: lt.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlP&agalbaTvarko
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlT&r
                    Source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/chrome/privacy/eula_text.htmlYar&d
                    Source: 25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: 25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/biden-makes-decision-that-will-impact-more-than-1
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/travel/i-ve-worked-at-a-campsite-for-5-years-these-are-the-15-mi
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/13-states-that-don-t-tax-your-retirement-income/ar-A
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/no-wonder-the-american-public-is-confused-if-you-re-
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/exclusive-john-kelly-goes-on-the-record-to-confirm-several-d
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/topic/breast%20cancer%20awareness%20month?ocid=winp1headerevent
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/metro-officials-still-investigating-friday-s-railcar-derailment/ar
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/rest-of-hurricane-season-in-uncharted-waters-because-of
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/list/polite-habits-campers-dislike/
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004055E7 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004055E7
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03824BA2 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateDIBSection,SelectObject,BitBlt,DeleteObject,DeleteDC,ReleaseDC,8_2_03824BA2
                    Source: GamePall.exeProcess created: 56

                    System Summary

                    barindex
                    Source: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                    Source: 00000005.00000002.1980398468.00000000028AC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000005.00000002.1980277613.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401538
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,0_2_00402FE9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_004014DE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401496
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401543
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401565
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_00401579
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,0_2_0040157C
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401538 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401538
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00402FE9 RtlCreateUserThread,NtTerminateProcess,5_2_00402FE9
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_004014DE NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_004014DE
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401496 NtAllocateVirtualMemory,NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401496
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401543 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401543
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401565 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401565
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401579 NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_00401579
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_0040157C NtDuplicateObject,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_0040157C
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,7_2_100010D0
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_004034CC
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_00406A887_2_00406A88
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD14908_2_00FD1490
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FDD5158_2_00FDD515
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FDBE098_2_00FDBE09
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\25B5.exe CAE992788853230AF91501546F6EAD07CFD767CB8429C98A273093A90BBCB5AD
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: String function: 00FD0310 appears 51 times
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                    Source: 00000005.00000002.1980398468.00000000028AC000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000005.00000002.1980277613.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: utdciaf.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Ionic.Zip.dll.10.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformBlock'
                    Source: Ionic.Zip.dll.10.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Ionic.Zip.dll.10.dr, WinZipAesCipherStream.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                    Source: GamePall.exe.10.dr, Program.csBase64 encoded string: 'pizR9uKkcZIkMW+F1cRjYV0LMt6eYXmLuiNCndESDPkTO3eY1Mjv7Hs2Qvo+t26G', 'ZTDMzZVpdA1FSa2RiY6ZCl2QGyLDtQ3OBRa/N40wO2xxcvcDsATtLRGwKtaEB36dqPJnDF8qXNs92JbMBlsOyg==', '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', 'T7BWwqrn4yISEECEAnARpwE8R+3lDHSc+RlcJT90an1SNsS27lGBQjOx4RmDHlrj7oJnnzx1IWXOkbTfLzBeCfU6UJhOIoQKhcWidAxAKIxvqZnoB6AujIU0F7dEj65vahyTdEvkIxzFaV2+akbl53KcDi5RPBOP16iXVi0WJdHV5AbSCI9WCEcSX/fUpmukBh4bjVF/T/P/B6TFVtNZintCOSO2Ha+2va2CJMOnJ020zYskwuvcH9d1rGD3Zf9RBC2obzrhRNK2LXTEIYnifs6L2UdqFhw5aANXILziQtzKvsTQKvc15hvHCCoeXJCyyK7/WgA/oRu7bdrTs2DwCQ==', 'ZY0WCEgzqiLEU8ZUVJwGTpbkuL9KoMwYVloBqJXjur8rfBZEXTysQNKRQ1H7/vn7o0wyHAux60SVy06r4v6So5WWxddei09LXvL6ZwK/tyY=', 's7iS2XfzyI+IBoARaZQlTINg1kEy7qT7EopaSHQzpqktZBtc7UiOYrPdv/6f4cNI', 'o2ZleBui4P9C2ZjnB98Vuesy1C+WucHiXjQJ8RANoX6TheGfnLYAWDsXRfSeNCDHWdkBP2RBrkWPBy/nuM2NFLMETMUsPFeG3JHWafvGKzaNEjYO3Up9m61SnaY5tINvLCYJ/TKITszJ9H1YSm2chnmQGLUzbz4pwvWvvKfH8m7z585W73/QZrtw3l/30vcZaVocgwemYusDJYsOTgeWc0okiDahD7qtJcBYZ0aOzxZZmHDMBYigkRVf8GTJ/xucA/i7EHBFpaWoLVZVcuGFMA==', 'T7BWwqrn4yISEECEAnARp+JyVgG3cZc2/9+3VbyOjc4PuRSCU7ZfXuXpIIH8uj2roUU+W7nSmXHqTuxLhe6DBfNVh8PFZrhNX/YhIexDxrk=', 'G4TxOgdwfNBdU+6bscw2hqt3kZYZMfoEuKZtmCxRLrF8xJCK1+L0ocd8eSQjty7d', 'PcG64iM3U1vDIVDm7HuwTSvKhuz45f/WPqYoWZvzLHcapbEfkynZkUjmDgg30eof', 'XGcq7Js3+2f2oGHGFzxJPiYsrodwK+bTw/0lKjiUd0tSWMHEjdVqzAclD1/nPksq3sGhVTN8oFeHMRE7wAt3mCLVCEXKF9JLnNeWw9vvCbs=', 'T7BWwqrn4yISEECEAnARp8UQ6kvfa8mDiwe39obQZ+Rxfj5bbo//kf+4mlTsZUEg0QM/4QBKb6sUDMsk9OTdYg==', 'T7BWwqrn4yISEECEAnARp/U1NCwfjpQ4K5UKuMbDqXSrjfU6Tf/pOCpHlHXtYnU5', 'Gg/rFkGmnFrfPAny9sQ3qerPGxlC7+cuu92x2tgXrCRkqABwTbbIR8+hJN0krbBD9OJX8s2JqeR+xICuD2u17N7KjlWCZwpg4+c7mG1xAahALfXXbu/EvJy+KsAzQlzR9bu8P4wbyuM6r6/7kdf+VQ==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLT3pudJg4gGhcEax3IHwBI0R5vZR7J9mjUQ8R9MdKz/Fw==', 'Zh3o1d4Zr0FJ548CrzCJDMeQhe52nu1Hz4hkTFOalLTcCwJrbTmNGWmZutw1Di2FSZ+3JxFtC00BiemuQuq2+A=='
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@254/115@0/9
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_004034CC
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_00404897 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,7_2_00404897
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0276F7DC CreateToolhelp32Snapshot,Module32First,0_2_0276F7DC
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_00402173 CoCreateInstance,MultiByteToWideChar,7_2_00402173
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utdciafJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_rendLog.txt
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeMutant created: \Sessions\1\BaseNamedObjects\1e7f31ac-1494-47cc-9633-054c20e7432e
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMutant created: \Sessions\1\BaseNamedObjects\C__Users_user_AppData_Roaming_GamePall_Logs_mainLog.txt
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\25B5.tmpJump to behavior
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeFile read: C:\Windows\System32\drivers\etc\hosts
                    Source: 25B5.exe, 00000006.00000003.2091501190.00000000040B4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeReversingLabs: Detection: 47%
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeVirustotal: Detection: 37%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\utdciaf C:\Users\user\AppData\Roaming\utdciaf
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\25B5.exe C:\Users\user\AppData\Local\Temp\25B5.exe
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\5B7B.exe C:\Users\user\AppData\Local\Temp\5B7B.exe
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\91EE.exe C:\Users\user\AppData\Local\Temp\91EE.exe
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\25B5.exe C:\Users\user\AppData\Local\Temp\25B5.exeJump to behavior
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\5B7B.exe C:\Users\user\AppData\Local\Temp\5B7B.exeJump to behavior
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\91EE.exe C:\Users\user\AppData\Local\Temp\91EE.exeJump to behavior
                    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" Jump to behavior
                    Source: C:\Windows\explorer.exeProcess created: unknown unknownJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess created: C:\Users\user\AppData\Local\Temp\setup.exe "C:\Users\user\AppData\Local\Temp\setup.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
                    Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: acgenral.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmm.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: samcli.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: msacm32.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dwmapi.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: mpr.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: winmmbase.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: oleacc.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: shfolder.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: firewallapi.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwbase.dll
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeSection loaded: fwpolicyiomgr.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mmdevapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: devobj.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: audioses.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: powrprof.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: umpdc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.ui.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windowmanagementapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: textinputframework.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: inputhost.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: twinapi.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coreuicomponents.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coremessaging.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: nlaapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wkscli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wtsapi32.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winsta.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mdmregistration.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: omadmapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dmcmnutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iri.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscms.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: coloradapterclient.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netapi32.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dsreg.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msvcp110_win.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dbghelp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winmm.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: chrome_elf.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ntmarta.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dxgi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: resourcepolicyclient.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mf.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mfplat.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rtworkq.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: dwmapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: appresolver.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: bcp47langs.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: slc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sppc.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: propsys.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: edputil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: urlmon.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: iertutil.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: srvcli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: netutils.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeSection loaded: wintypes.dll
                    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\GamePall
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: Binary string: ntkrnlmp.pdbx, source: 91EE.exe, 00000008.00000002.3068963485.000000000A812000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb source: Ionic.Zip.dll.10.dr
                    Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdb source: widevinecdmadapter.dll.10.dr
                    Source: Binary string: c:\DotNetZip\Zip\obj\Release\Ionic.Zip.pdb$# source: Ionic.Zip.dll.10.dr
                    Source: Binary string: D3DCompiler_43.pdb source: d3dcompiler_43.dll.10.dr
                    Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: 91EE.exe, 00000008.00000002.3068963485.000000000A812000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3068963485.000000000A80C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: libEGL.dll.pdb source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: h:\work\newContent\secondBranch\DeleteProgram\DeleteProgram\obj\Release\KlMain.pdb source: Del.exe.10.dr
                    Source: Binary string: ntkrnlmp.pdb source: 91EE.exe, 00000008.00000002.3068963485.000000000A80C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: e:\work\newContent\secondBranch\new\GamePall\obj\Release\GamePall.pdb source: GamePall.exe, 0000000B.00000000.3306074531.0000000000F92000.00000002.00000001.01000000.00000010.sdmp
                    Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdb source: GamePall.exe, 00000012.00000002.3409362343.0000000004ED2000.00000002.00000001.01000000.00000013.sdmp
                    Source: Binary string: *?|<>/":%s%s.dllC:\Users\user\AppData\Roaming\GamePall\GamePall.exewall.dlldll.pdbC:\Users\user\AppData\Roaming\GamePall\Uninstall.exemePall source: setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmp
                    Source: Binary string: E:\work\newContent\secondBranch\cefglue-main\CefGlue\obj\Release\net40\Xilium.CefGlue.pdbSHA256 source: GamePall.exe, 00000012.00000002.3409362343.0000000004ED2000.00000002.00000001.01000000.00000013.sdmp
                    Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdbLK source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: Y:\work\CEF3_git\chromium\src\out\Release_GN_x86\WidevineCdm\_platform_specific\win_x86\widevinecdmadapter.dll.pdbGCTL source: widevinecdmadapter.dll.10.dr
                    Source: Binary string: D3DCompiler_43.pdb` source: d3dcompiler_43.dll.10.dr
                    Source: Binary string: c:\log4net\tags\2.0.8RC1\bin\net\4.0\release\log4net.pdb source: GamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp
                    Source: Binary string: \Desktop\projects\Release\BigProject.pdb source: 91EE.exe, 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp, 91EE.exe, 00000008.00000000.2253926421.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp
                    Source: Binary string: libGLESv2.dll.pdb source: setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Xilium.CefGlue.pdb source: setup.exe, 0000000A.00000002.3575725593.0000000000759000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \swiftshaderXilium.CefGlue.pdb source: setup.exe, 0000000A.00000002.3575725593.0000000000759000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \Desktop\projects\Release\BigProject.pdb. source: 91EE.exe, 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp, 91EE.exe, 00000008.00000000.2253926421.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeUnpacked PE file: 0.2.SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                    Source: C:\Users\user\AppData\Roaming\utdciafUnpacked PE file: 5.2.utdciaf.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeUnpacked PE file: 8.2.91EE.exe.3820000.3.unpack
                    Source: Newtonsoft.Json.dll.10.drStatic PE information: 0xF68F744F [Mon Jan 31 06:35:59 2101 UTC]
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,7_2_100010D0
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmpLp
                    Source: 25B5.exe.1.drStatic PE information: section name: .vmpLp
                    Source: 25B5.exe.1.drStatic PE information: section name: .vmpLp
                    Source: 25B5.exe.1.drStatic PE information: section name: .vmpLp
                    Source: libEGL.dll.10.drStatic PE information: section name: .00cfg
                    Source: libEGL.dll.10.drStatic PE information: section name: .voltbl
                    Source: libGLESv2.dll.10.drStatic PE information: section name: .00cfg
                    Source: libGLESv2.dll.10.drStatic PE information: section name: .voltbl
                    Source: chrome_elf.dll.10.drStatic PE information: section name: .00cfg
                    Source: chrome_elf.dll.10.drStatic PE information: section name: .crthunk
                    Source: chrome_elf.dll.10.drStatic PE information: section name: CPADinfo
                    Source: chrome_elf.dll.10.drStatic PE information: section name: malloc_h
                    Source: libEGL.dll0.10.drStatic PE information: section name: .00cfg
                    Source: libGLESv2.dll0.10.drStatic PE information: section name: .00cfg
                    Source: libcef.dll.10.drStatic PE information: section name: .00cfg
                    Source: libcef.dll.10.drStatic PE information: section name: .rodata
                    Source: libcef.dll.10.drStatic PE information: section name: CPADinfo
                    Source: libcef.dll.10.drStatic PE information: section name: malloc_h
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00408616 push eax; retf 0000h0_2_00408619
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401CD1 push ecx; ret 0_2_00401CD2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_004084E6 push FFFFFFFBh; iretd 0_2_004084FC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00401C91 push 00000076h; iretd 0_2_00401C93
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_00402E96 push B92A2F4Ch; retf 0_2_00402E9B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0274867D push eax; retf 0000h0_2_02748680
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_02742EFD push B92A2F4Ch; retf 0_2_02742F02
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_02741CF8 push 00000076h; iretd 0_2_02741CFA
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0274854D push FFFFFFFBh; iretd 0_2_02748563
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_02741D38 push ecx; ret 0_2_02741D39
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0276CA60 push eax; retf 0_2_0276CA61
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0277522E push edx; ret 0_2_0277522F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_027772AC push FFFFFFFBh; iretd 0_2_027772C2
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00408616 push eax; retf 0000h5_2_00408619
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401CD1 push ecx; ret 5_2_00401CD2
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_004084E6 push FFFFFFFBh; iretd 5_2_004084FC
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00401C91 push 00000076h; iretd 5_2_00401C93
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_00402E96 push B92A2F4Ch; retf 5_2_00402E9B
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_02811CF8 push 00000076h; iretd 5_2_02811CFA
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_02812EFD push B92A2F4Ch; retf 5_2_02812F02
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_0281867D push eax; retf 0000h5_2_02818680
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_02811D38 push ecx; ret 5_2_02811D39
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_0281854D push FFFFFFFBh; iretd 5_2_02818563
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_028B44F6 push edx; ret 5_2_028B44F7
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_028B6574 push FFFFFFFBh; iretd 5_2_028B658A
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD004B push ecx; ret 8_2_00FD005E
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD89AD push cs; ret 8_2_00FD89AE
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeStatic PE information: section name: .text entropy: 7.509021892697256
                    Source: utdciaf.1.drStatic PE information: section name: .text entropy: 7.509021892697256
                    Source: Ionic.Zip.dll.10.drStatic PE information: section name: .text entropy: 6.821349263259562
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeFile created: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\INetC.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\25B5.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeFile created: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\blowfish.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\91EE.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utdciafJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\5B7B.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeFile created: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\nsProcess.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Local\Temp\nsxD63.tmp\liteFirewall.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeFile created: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeFile created: C:\Users\user\AppData\Local\Temp\setup.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].datJump to dropped file
                    Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\utdciafJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GamePall

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\securiteinfo.com.w32.trojan.fwf.gen.eldorado.15788.4670.exeJump to behavior
                    Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\utdciaf:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSIJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_8-145113
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeAPI/Special instruction interceptor: Address: 7FFE2220E814
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeAPI/Special instruction interceptor: Address: 7FFE2220D584
                    Source: C:\Users\user\AppData\Roaming\utdciafAPI/Special instruction interceptor: Address: 7FFE2220E814
                    Source: C:\Users\user\AppData\Roaming\utdciafAPI/Special instruction interceptor: Address: 7FFE2220D584
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 1004080
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 1444DE8
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 100522F
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 10491D7
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 1072432
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: EE76F5
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: FC4E89
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeAPI/Special instruction interceptor: Address: 13A20B2
                    Source: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe, utdciaf, 00000005.00000002.1980353364.000000000289E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1930000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3290000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 5290000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2310000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 24C0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 44C0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 14B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3250000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 18B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: BD0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2830000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 25D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: B90000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 25A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 23E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 900000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2400000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4400000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 9A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2580000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: A30000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 27E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A30000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2E10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3030000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 5030000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 920000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2350000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2270000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: DF0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 28A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 48A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: CE0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2A40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2790000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C00000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C00000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4C00000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: F50000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 29D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: BE0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2650000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 11D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C90000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1280000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2B80000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2D20000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 4D20000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1530000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3060000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2E70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 13D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2DB0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 13D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1250000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C90000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1250000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 17F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 31A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 51A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: D10000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 29D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 28F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 11D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2EA0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 1470000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 16E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 3150000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 5150000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: B70000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2850000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 25E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 10D0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2F40000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2C60000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: A00000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2650000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: 2350000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 434Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1942Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 899Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2763Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 888Jump to behavior
                    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 855Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\INetC.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\log4net.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\blowfish.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Del.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Uninstall.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libcef.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\nsProcess.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxD63.tmp\liteFirewall.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\libEGL.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeAPI coverage: 10.0 %
                    Source: C:\Windows\explorer.exe TID: 7332Thread sleep time: -194200s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 7328Thread sleep time: -89900s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 7716Thread sleep time: -34000s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 7712Thread sleep time: -33500s >= -30000sJump to behavior
                    Source: C:\Windows\explorer.exe TID: 7332Thread sleep time: -276300s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exe TID: 7752Thread sleep time: -150000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exe TID: 7840Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe TID: 6152Thread sleep time: -600000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_00405B4A CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,7_2_00405B4A
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004066FF FindFirstFileA,FindClose,7_2_004066FF
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004027AA FindFirstFileA,7_2_004027AA
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FE256E FindFirstFileExW,FindNextFileW,FindClose,FindClose,8_2_00FE256E
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03821000 FindFirstFileW,FindNextFileW,EnterCriticalSection,LeaveCriticalSection,8_2_03821000
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03824E27 FindFirstFileW,EnterCriticalSection,LeaveCriticalSection,FindNextFileW,8_2_03824E27
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03821D3C FindFirstFileW,FindNextFileW,8_2_03821D3C
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_038240BA FindFirstFileW,FindNextFileW,8_2_038240BA
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03823EFC FindFirstFileW,FindNextFileW,8_2_03823EFC
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_03822054 GetCurrentHwProfileA,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,8_2_03822054
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeThread delayed: delay time: 600000
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
                    Source: explorer.exe, 00000001.00000000.1733684446.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: k&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                    Source: explorer.exe, 00000001.00000000.1733189731.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}$
                    Source: explorer.exe, 00000001.00000000.1733189731.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWar VMware SATA CD00\w
                    Source: explorer.exe, 00000001.00000000.1733684446.00000000098A8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                    Source: explorer.exe, 00000001.00000000.1730424246.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&0000000}
                    Source: 5B7B.exe, 00000007.00000003.3581530561.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, 5B7B.exe, 00000007.00000002.3593715346.00000000007DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn8,
                    Source: explorer.exe, 00000001.00000000.1733684446.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                    Source: explorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTTAVMWare
                    Source: explorer.exe, 00000001.00000000.1733189731.0000000009815000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f&0&000000
                    Source: explorer.exe, 00000001.00000000.1733189731.000000000982D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.00000000097D4000.00000004.00000001.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144617701.0000000001C96000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191088300.0000000001C97000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129331441.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2153865909.0000000001C97000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144088971.0000000001C96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: 25B5.exe, 00000006.00000002.2192438323.0000000001C3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                    Source: GamePall.exe, 0000000B.00000002.3511842004.0000000001452000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllH
                    Source: explorer.exe, 00000001.00000000.1733684446.0000000009977000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                    Source: explorer.exe, 00000001.00000000.1731691549.0000000007A34000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBnx
                    Source: 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`C
                    Source: explorer.exe, 00000001.00000000.1730424246.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                    Source: explorer.exe, 00000001.00000000.1733189731.0000000009660000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
                    Source: explorer.exe, 00000001.00000000.1730424246.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeAPI call chain: ExitProcess graph end nodegraph_7-3465
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSystem information queried: CodeIntegrityInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD4383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00FD4383
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_100010D0 GetVersionExA,LoadLibraryW,GetProcAddress,LocalAlloc,LocalAlloc,NtQuerySystemInformation,LocalFree,LocalAlloc,FreeLibrary,WideCharToMultiByte,lstrcmpiA,LocalFree,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenA,lstrcpynA,lstrcmpiA,CloseHandle,FreeLibrary,7_2_100010D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0274092B mov eax, dword ptr fs:[00000030h]0_2_0274092B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_02740D90 mov eax, dword ptr fs:[00000030h]0_2_02740D90
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeCode function: 0_2_0276F0B9 push dword ptr fs:[00000030h]0_2_0276F0B9
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_02810D90 mov eax, dword ptr fs:[00000030h]5_2_02810D90
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_0281092B mov eax, dword ptr fs:[00000030h]5_2_0281092B
                    Source: C:\Users\user\AppData\Roaming\utdciafCode function: 5_2_028AE381 push dword ptr fs:[00000030h]5_2_028AE381
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FE5891 GetProcessHeap,8_2_00FE5891
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD4383 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00FD4383
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD0495 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00FD0495
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD06F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00FD06F0
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD0622 SetUnhandledExceptionFilter,8_2_00FD0622
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\explorer.exeFile created: 25B5.exe.1.drJump to dropped file
                    Source: C:\Windows\explorer.exeNetwork Connect: 77.221.157.163 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 141.8.194.149 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80Jump to behavior
                    Source: C:\Windows\explorer.exeNetwork Connect: 183.100.39.16 80Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeThread created: C:\Windows\explorer.exe EIP: 34419D0Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafThread created: unknown EIP: 7DA19D0Jump to behavior
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: pedestriankodwu.xyz
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: towerxxuytwi.xyz
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: ellaboratepwsz.xyz
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: penetratedpoopp.xyz
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: swellfrrgwwos.xyz
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: contintnetksows.shop
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: foodypannyjsud.shop
                    Source: 25B5.exe, 00000006.00000002.2191547834.0000000000B9D000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: potterryisiw.shop
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\utdciafSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and readJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: unknown unknown
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --gpu-preferences=waaaaaaaaadgaaamaaaaaaaaaaaaaaaaaabgaaaaaaa4aaaaaaaaaaaaaaaeaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaagaaaaaaaaaayaaaaaaaaaagaaaaaaaaacaaaaaaaaaaiaaaaaaaaaa== --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:2
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=storage.mojom.storageservice --lang=en-us --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=utility --utility-sub-type=network.mojom.networkservice --lang=en-us --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --lang=en-us --user-data-dir="c:\users\user\appdata\local\cef\user data" --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:8
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --first-renderer-process --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeProcess created: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe "c:\users\user\appdata\roaming\gamepall\gamepall.exe" --type=renderer --log-severity=disable --user-agent="mozilla/5.0 (linux; android 10; k) applewebkit/537.36 (khtml, like gecko) chrome/126.0.0.0 mobile safari/537.36 edga/126.0.0.0" --user-data-dir="c:\users\user\appdata\local\cef\user data" --no-sandbox --log-file="c:\users\user\appdata\roaming\gamepall\debug.log" --lang=en-us --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=backforwardcache,calculatenativewinocclusion,documentpictureinpictureapi /prefetch:1
                    Source: explorer.exe, 00000001.00000000.1731537443.0000000004CE0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.0000000009815000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1730650105.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: explorer.exe, 00000001.00000000.1730650105.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                    Source: explorer.exe, 00000001.00000000.1730424246.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman$
                    Source: explorer.exe, 00000001.00000000.1730650105.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                    Source: explorer.exe, 00000001.00000000.1730650105.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD013C cpuid 8_2_00FD013C
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_00FE50DC
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetLocaleInfoW,8_2_00FDE096
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: EnumSystemLocalesW,8_2_00FE5051
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetLocaleInfoW,8_2_00FE532F
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_00FE5458
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetLocaleInfoW,8_2_00FE555E
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_00FE5634
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: EnumSystemLocalesW,8_2_00FDDBC7
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: EnumSystemLocalesW,8_2_00FE4FB6
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: EnumSystemLocalesW,8_2_00FE4F6B
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: EnumSystemLocalesW,8_2_00FE4F69
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\System32\spool\drivers\color\sRGB Color Space Profile.icm VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\GamePall.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\log4net.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeCode function: 8_2_00FD038F GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_00FD038F
                    Source: C:\Users\user\AppData\Local\Temp\5B7B.exeCode function: 7_2_004034CC EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_004034CC
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: 25B5.exe, 00000006.00000003.2190787943.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2155123340.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192806726.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2159719721.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2159158009.0000000001D18000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192727047.0000000001CF1000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2164480701.0000000001D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 25B5.exe PID: 7732, type: MEMORYSTR
                    Source: Yara matchFile source: 8.2.91EE.exe.1156560.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.119eea0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.3820000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.3820000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.119eea0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.1156560.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.3011588668.000000000114C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 91EE.exe PID: 7920, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                    Source: 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                    Source: 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                    Source: 25B5.exe, 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                    Source: 25B5.exe, 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusWeb3
                    Source: 25B5.exe, 00000006.00000002.2192503067.0000000001C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                    Source: 25B5.exe, 00000006.00000003.2089670424.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: 25B5.exe, 00000006.00000003.2089670424.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\91EE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\25B5.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
                    Source: C:\Users\user\AppData\Roaming\GamePall\GamePall.exeDirectory queried: number of queries: 1352
                    Source: Yara matchFile source: 00000006.00000003.2089670424.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2091390577.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2129331441.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2129573415.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2129573415.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2129331441.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2089946661.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2112281033.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 25B5.exe PID: 7732, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 25B5.exe PID: 7732, type: MEMORYSTR
                    Source: Yara matchFile source: 8.2.91EE.exe.1156560.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.119eea0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.3820000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.3820000.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.119eea0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.91EE.exe.1156560.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.3011588668.000000000114C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 91EE.exe PID: 7920, type: MEMORYSTR
                    Source: Yara matchFile source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts11
                    Native API
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    111
                    Deobfuscate/Decode Files or Information
                    LSASS Memory23
                    File and Directory Discovery
                    Remote Desktop Protocol41
                    Data from Local System
                    2
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Exploitation for Client Execution
                    1
                    Registry Run Keys / Startup Folder
                    1
                    Windows Service
                    31
                    Obfuscated Files or Information
                    Security Account Manager137
                    System Information Discovery
                    SMB/Windows Admin Shares1
                    Screen Capture
                    1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts1
                    Command and Scripting Interpreter
                    Login Hook312
                    Process Injection
                    22
                    Software Packing
                    NTDS651
                    Security Software Discovery
                    Distributed Component Object Model1
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts1
                    PowerShell
                    Network Logon Script1
                    Registry Run Keys / Startup Folder
                    1
                    Timestomp
                    LSA Secrets241
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials3
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    File Deletion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                    Masquerading
                    Proc Filesystem1
                    Remote System Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt241
                    Virtualization/Sandbox Evasion
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Access Token Manipulation
                    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd312
                    Process Injection
                    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
                    Hidden Files and Directories
                    KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1466796 Sample: SecuriteInfo.com.W32.Trojan... Startdate: 03/07/2024 Architecture: WINDOWS Score: 100 105 Multi AV Scanner detection for domain / URL 2->105 107 Found malware configuration 2->107 109 Malicious sample detected (through community Yara rule) 2->109 111 13 other signatures 2->111 12 SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe 2->12         started        15 utdciaf 2->15         started        process3 signatures4 145 Detected unpacking (changes PE section rights) 12->145 147 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->147 149 Maps a DLL or memory area into another process 12->149 151 Switches to a custom stack to bypass stack traces 12->151 17 explorer.exe 56 10 12->17 injected 153 Multi AV Scanner detection for dropped file 15->153 155 Checks if the current machine is a virtual machine (disk enumeration) 15->155 157 Creates a thread in another existing process (thread injection) 15->157 process5 dnsIp6 91 141.8.194.149 SPRINTHOSTRU Russian Federation 17->91 93 183.100.39.16 KIXS-AS-KRKoreaTelecomKR Korea Republic of 17->93 95 3 other IPs or domains 17->95 75 C:\Users\user\AppData\Roaming\utdciaf, PE32 17->75 dropped 77 C:\Users\user\AppData\Local\Temp\91EE.exe, PE32 17->77 dropped 79 C:\Users\user\AppData\Local\Temp\5B7B.exe, PE32 17->79 dropped 81 2 other malicious files 17->81 dropped 115 System process connects to network (likely due to code injection or exploit) 17->115 117 Benign windows process drops PE files 17->117 119 Deletes itself after installation 17->119 121 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->121 22 5B7B.exe 3 35 17->22         started        26 25B5.exe 17->26         started        29 91EE.exe 12 17->29         started        31 GamePall.exe 17->31         started        file7 signatures8 process9 dnsIp10 83 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 22->83 dropped 85 C:\Users\user\AppData\Local\...\blowfish.dll, PE32 22->85 dropped 87 C:\Users\user\AppData\Local\...\huge[1].dat, PE32 22->87 dropped 89 2 other files (none is malicious) 22->89 dropped 127 Antivirus detection for dropped file 22->127 129 Multi AV Scanner detection for dropped file 22->129 33 setup.exe 112 22->33         started        99 188.114.97.3 CLOUDFLARENETUS European Union 26->99 131 Query firmware table information (likely to detect VMs) 26->131 133 Machine Learning detection for dropped file 26->133 135 Found many strings related to Crypto-Wallets (likely being stolen) 26->135 143 4 other signatures 26->143 101 146.70.169.164 TENET-1ZA United Kingdom 29->101 103 104.192.141.1 AMAZON-02US United States 29->103 137 Detected unpacking (creates a PE file in dynamic memory) 29->137 139 Found evasive API chain (may stop execution after checking mutex) 29->139 141 Tries to harvest and steal browser information (history, passwords, etc) 29->141 file11 signatures12 process13 file14 67 C:\Users\user\AppData\...\vulkan-1.dll, PE32 33->67 dropped 69 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 33->69 dropped 71 C:\Users\user\AppData\...\libGLESv2.dll, PE32 33->71 dropped 73 16 other files (13 malicious) 33->73 dropped 113 Antivirus detection for dropped file 33->113 37 GamePall.exe 33->37         started        signatures15 process16 dnsIp17 97 104.21.45.251 CLOUDFLARENETUS United States 37->97 123 Antivirus detection for dropped file 37->123 125 Machine Learning detection for dropped file 37->125 41 GamePall.exe 37->41         started        43 GamePall.exe 37->43         started        45 GamePall.exe 37->45         started        47 6 other processes 37->47 signatures18 process19 process20 49 GamePall.exe 41->49         started        51 GamePall.exe 41->51         started        53 GamePall.exe 41->53         started        55 10 other processes 41->55 process21 57 GamePall.exe 49->57         started        59 GamePall.exe 49->59         started        61 GamePall.exe 51->61         started        63 GamePall.exe 51->63         started        65 GamePall.exe 53->65         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe47%ReversingLabsWin32.Trojan.CrypterX
                    SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe38%VirustotalBrowse
                    SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe100%AviraHEUR/AGEN.1318160
                    SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\25B5.exe100%AviraHEUR/AGEN.1313486
                    C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%AviraHEUR/AGEN.1352426
                    C:\Users\user\AppData\Local\Temp\5B7B.exe100%AviraHEUR/AGEN.1359405
                    C:\Users\user\AppData\Local\Temp\setup.exe100%AviraHEUR/AGEN.1359405
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat100%AviraHEUR/AGEN.1359405
                    C:\Users\user\AppData\Roaming\GamePall\Del.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\25B5.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\GamePall\GamePall.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Temp\91EE.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].dat3%ReversingLabsWin32.Trojan.Generic
                    C:\Users\user\AppData\Local\Temp\25B5.exe68%ReversingLabsWin32.Trojan.Smokeloader
                    C:\Users\user\AppData\Local\Temp\5B7B.exe21%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\91EE.exe54%ReversingLabsWin32.Trojan.PovertyStealer
                    C:\Users\user\AppData\Local\Temp\nsj567B.tmp\INetC.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\nsj567B.tmp\blowfish.dll5%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\nsj567B.tmp\nsProcess.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\nsxD63.tmp\liteFirewall.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\setup.exe3%ReversingLabsWin32.Trojan.Generic
                    C:\Users\user\AppData\Roaming\GamePall\Del.exe7%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\GamePall.exe3%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\Ionic.Zip.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\Newtonsoft.Json.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\Uninstall.exe0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\Xilium.CefGlue.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\chrome_elf.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_43.dll3%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\d3dcompiler_47.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\libEGL.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\libGLESv2.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\libcef.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\log4net.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\swiftshader\libEGL.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\swiftshader\libGLESv2.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\vk_swiftshader.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\vulkan-1.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\GamePall\widevinecdmadapter.dll0%ReversingLabs
                    C:\Users\user\AppData\Roaming\utdciaf47%ReversingLabsWin32.Trojan.CrypterX
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://excel.office.com0%URL Reputationsafe
                    http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                    http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
                    https://android.notify.windows.com/iOS0%URL Reputationsafe
                    https://aka.ms/odirmr0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                    http://xiexie.wf/22_551/huge.dat#0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%Avira URL Cloudsafe
                    http://api.install-stat.debug.world/clients/activity.00%Avira URL Cloudsafe
                    https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                    https://aka.ms/odirmr0%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?u0%VirustotalBrowse
                    http://xiexie.wf/22_551/huge.dat%0%Avira URL Cloudsafe
                    http://xiexie.wf/22_551/huge.dat#0%VirustotalBrowse
                    https://support.google.com/chrome/answer/60988690%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?u0%VirustotalBrowse
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%VirustotalBrowse
                    https://foodypannyjsud.shop/y100%Avira URL Cloudmalware
                    https://support.google.com/chrome/answer/60988690%Avira URL Cloudsafe
                    https://api.msn.com:443/v1/news/Feed/Windows?0%Avira URL Cloudsafe
                    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%Avira URL Cloudsafe
                    https://foodypannyjsud.shop/opt100%Avira URL Cloudmalware
                    https://www.google.com/chrome/privacy/eula_text.html0%Avira URL Cloudsafe
                    http://gebeus.ru/tmp/index.php100%Avira URL Cloudmalware
                    http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=etCtrl$10%Avira URL Cloudsafe
                    https://www.google.com/chrome/privacy/eula_text.html1%VirustotalBrowse
                    https://foodypannyjsud.shop/f100%Avira URL Cloudmalware
                    http://logging.apache.org/log4net/release/faq.html#trouble-EventLog0%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?u0%VirustotalBrowse
                    https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=urCtrl$20%Avira URL Cloudsafe
                    http://gebeus.ru/tmp/index.php16%VirustotalBrowse
                    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%Avira URL Cloudsafe
                    https://photos.google.com/settings?referrer=CHROME_NTP0%Avira URL Cloudsafe
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=ltCtrl$10%Avira URL Cloudsafe
                    https://api.msn.com:443/v1/news/Feed/Windows?0%VirustotalBrowse
                    https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi0%Avira URL Cloudsafe
                    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/0%VirustotalBrowse
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%Avira URL Cloudsafe
                    https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl0%Avira URL Cloudsafe
                    https://photos.google.com/settings?referrer=CHROME_NTP0%VirustotalBrowse
                    http://cx5519.com/tmp/index.php100%Avira URL Cloudmalware
                    https://passwords.google.com0%Avira URL Cloudsafe
                    https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl0%VirustotalBrowse
                    contintnetksows.shop100%Avira URL Cloudmalware
                    http://www.iana.org/assignments/multicast-addresses0%Avira URL Cloudsafe
                    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%Avira URL Cloudsafe
                    http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd0%Avira URL Cloudsafe
                    contintnetksows.shop16%VirustotalBrowse
                    https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%220%Avira URL Cloudsafe
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY0%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=bnCtrl$10%Avira URL Cloudsafe
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark0%VirustotalBrowse
                    http://cx5519.com/tmp/index.php12%VirustotalBrowse
                    https://foodypannyjsud.shop/:s100%Avira URL Cloudmalware
                    http://bageyou.xyz0%Avira URL Cloudsafe
                    https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%220%VirustotalBrowse
                    https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    http://www.iana.org/assignments/multicast-addresses0%VirustotalBrowse
                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc940%Avira URL Cloudsafe
                    http://bageyou.xyz0%VirustotalBrowse
                    http://evilos.cc/tmp/index.php100%Avira URL Cloudmalware
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%Avira URL Cloudsafe
                    https://bitbucket.org/0%Avira URL Cloudsafe
                    https://wns.windows.com/L0%Avira URL Cloudsafe
                    https://foodypannyjsud.shop/1100%Avira URL Cloudmalware
                    http://www.connectionstrings.com/0%Avira URL Cloudsafe
                    https://word.office.com0%Avira URL Cloudsafe
                    https://support.google.com/chromebook?p=app_intent0%Avira URL Cloudsafe
                    https://foodypannyjsud.shop/8100%Avira URL Cloudmalware
                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%Avira URL Cloudsafe
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu0%Avira URL Cloudsafe
                    https://passwords.google.com0%VirustotalBrowse
                    https://foodypannyjsud.shop/apix100%Avira URL Cloudmalware
                    http://xiexie.wf/22_551/huge.datle0%Avira URL Cloudsafe
                    https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                    https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta0%Avira URL Cloudsafe
                    https://foodypannyjsud.shop/ob100%Avira URL Cloudmalware
                    http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=mrCtrl$10%Avira URL Cloudsafe
                    https://foodypannyjsud.shop/apia100%Avira URL Cloudmalware
                    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%Avira URL Cloudsafe
                    https://www.google.com/chrome/privacy/eula_text.html&0%Avira URL Cloudsafe
                    http://logging.apache.org/log4j0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?u0%Avira URL Cloudsafe
                    https://www.google.com/chrome/privacy/eula_text.htmlT&r0%Avira URL Cloudsafe
                    ellaboratepwsz.xyz100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://gebeus.ru/tmp/index.phptrue
                    • 16%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://cx5519.com/tmp/index.phptrue
                    • 12%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    contintnetksows.shoptrue
                    • 16%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://evilos.cc/tmp/index.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    ellaboratepwsz.xyztrue
                    • Avira URL Cloud: malware
                    unknown
                    swellfrrgwwos.xyztrue
                    • Avira URL Cloud: malware
                    unknown
                    foodypannyjsud.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    pedestriankodwu.xyztrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://chrome.google.com/webstore?hl=vi&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://aka.ms/odirmrexplorer.exe, 00000001.00000000.1731691549.00000000079FB000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/chrome_newtab25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://xiexie.wf/22_551/huge.dat#5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=mr&category=theme81https://myactivity.google.com/myactivity/?umr.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://api.install-stat.debug.world/clients/activity.0GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xiexie.wf/22_551/huge.dat%5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.google.com/chrome/answer/6098869setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/y25B5.exe, 00000006.00000003.2102037553.0000000001D0A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.google.com/chrome/privacy/eula_text.htmlsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, mr.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.1733189731.00000000097D4000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/opt25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://logging.apache.org/log4net/release/faq.html#trouble-EventLogGamePall.exe, 00000012.00000002.3397602073.0000000004932000.00000002.00000001.01000000.00000012.sdmp, log4net.xml.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=et&category=theme81https://myactivity.google.com/myactivity/?uet.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=etCtrl$1et.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://excel.office.comexplorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://foodypannyjsud.shop/f25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-weexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=urCtrl$2setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://simpleflying.com/how-do-you-become-an-air-traffic-controller/explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://photos.google.com/settings?referrer=CHROME_NTPsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUYexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=ltCtrl$1lt.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-darkexplorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrlsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://passwords.google.comsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.dr, lt.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.iana.org/assignments/multicast-addresseslog4net.xml.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000001.00000000.1735163104.000000000C893000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xiexie.wf/22_551/huge.datmCGBZvyfGQlwd5B7B.exe, 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chromestatus.com/features#browsers.chrome.status%3A%22Deprecated%22setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=bnCtrl$1bn.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/:s25B5.exe, 00000006.00000003.2164581591.0000000001CF9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://bageyou.xyzGamePall.exe, 00000017.00000002.3663624201.00000000023A7000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=ur&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc9425B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://bitbucket.org/91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://wns.windows.com/Lexplorer.exe, 00000001.00000000.1735163104.000000000C557000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/125B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://www.connectionstrings.com/log4net.xml.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://word.office.comexplorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.google.com/chromebook?p=app_intentsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/825B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZuexplorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/apix25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192727047.0000000001CF1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://xiexie.wf/22_551/huge.datle5B7B.exe, 00000007.00000002.3593292586.0000000000748000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-winexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=en&category=theme81https://myactivity.google.com/myactivity/?uen-US.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.rootca1.amazontrust.com/rootca1.crl025B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta25B5.exe, 00000006.00000003.2116571824.0000000004090000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/ob25B5.exe, 00000006.00000003.2153788211.0000000001CFB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144161500.0000000001CF6000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2144576355.0000000001CF7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://ocsp.rootca1.amazontrust.com0:25B5.exe, 00000006.00000003.2113151886.000000000409E000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000003.2999302143.000000000A8DF000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=mrCtrl$1mr.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/apia25B5.exe, 00000006.00000003.2153830305.0000000001CF1000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201625B5.exe, 00000006.00000003.2090171032.00000000040DC000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2090420823.00000000040D5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nsis.sf.net/NSIS_ErrorError5B7B.exe, 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 5B7B.exe, 00000007.00000000.2178634584.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000A.00000000.2999786119.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000A.00000003.3307143221.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.google.com/chrome/privacy/eula_text.html&setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, ur.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://logging.apache.org/log4jlog4net.xml.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chrome.google.com/webstore?hl=lt&category=theme81https://myactivity.google.com/myactivity/?ult.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/chrome/privacy/eula_text.htmlT&rsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, vi.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/25B5.exe, 00000006.00000003.2091945056.0000000004098000.00000004.00000800.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091744419.00000000040AF000.00000004.00000800.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3012906163.0000000009FFD000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xiexie.wf/22_551/huge.dat5B7B.exe, 00000007.00000003.2180408667.0000000003070000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br25B5.exe, 00000006.00000003.2115447830.00000000041A4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://bitbucket.org/fcsdcvscvc/sadcasdv/raw/62af221cbc4d137cf4e95f7d66f3ced90597b434/kupee91EE.exe, 00000008.00000002.3011588668.00000000010EE000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmp, 91EE.exe, 00000008.00000002.3011588668.00000000010E0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/chrome/privacy/eula_text.htmlA&biHaldabet.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeuexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrlsetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, en-US.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nsis.sf.net/NSIS_Error5B7B.exe, 5B7B.exe, 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmp, 5B7B.exe, 00000007.00000000.2178634584.000000000040A000.00000008.00000001.01000000.00000008.sdmp, setup.exe, 0000000A.00000000.2999786119.000000000040A000.00000008.00000001.01000000.0000000E.sdmp, setup.exe, 0000000A.00000003.3307143221.00000000007B7000.00000004.00000020.00020000.00000000.sdmp, setup.exe, 0000000A.00000002.3575220016.000000000040A000.00000004.00000001.01000000.0000000E.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://chrome.google.com/webstore?hl=tr&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-darkexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/apiP25B5.exe, 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129331441.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2129573415.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089670424.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2143846961.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191088300.0000000001C8C000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2091390577.0000000001CAB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2102081465.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2153865909.0000000001CAB000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2089946661.0000000001CA9000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192503067.0000000001C8C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://chrome.google.com/webstore?hl=ukCtrl$1setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.rd.com/list/polite-habits-campers-dislike/explorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://api.install-stat.debug.world/clients/installsGamePall.exe, 00000013.00000002.3414593361.00000000025B7000.00000004.00000800.00020000.00000000.sdmp, GamePall.exe, 0000001F.00000002.3833329216.0000000003061000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://foodypannyjsud.shop/apiZ25B5.exe, 00000006.00000003.2190853830.0000000001CEE000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000002.2192766096.0000000001CFD000.00000004.00000020.00020000.00000000.sdmp, 25B5.exe, 00000006.00000003.2191388247.0000000001CFC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://support.microsof25B5.exe, 00000006.00000003.2090171032.00000000040DE000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://cdn.cookielaw.org/91EE.exe, 00000008.00000002.3011588668.000000000112E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.google.com/chrome/a/answer/9122284setup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmp, et.pak.10.dr, mr.pak.10.dr, ur.pak.10.dr, lt.pak.10.dr, vi.pak.10.dr, zh-CN.pak.10.dr, bn.pak.10.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.imgexplorer.exe, 00000001.00000000.1731691549.00000000078AD000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://outlook.com_explorer.exe, 00000001.00000000.1735163104.000000000C5AA000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples25B5.exe, 00000006.00000003.2090420823.00000000040B0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://chrome.google.com/webstore?hl=uk&category=theme81https://myactivity.google.com/myactivity/?usetup.exe, 0000000A.00000002.3576694809.0000000002731000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppeexplorer.exe, 00000001.00000000.1731691549.0000000007900000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      77.221.157.163
                      unknownRussian Federation
                      30968INFOBOX-ASInfoboxruAutonomousSystemRUtrue
                      104.192.141.1
                      unknownUnited States
                      16509AMAZON-02USfalse
                      188.114.97.3
                      unknownEuropean Union
                      13335CLOUDFLARENETUSfalse
                      141.8.194.149
                      unknownRussian Federation
                      35278SPRINTHOSTRUtrue
                      188.114.96.3
                      unknownEuropean Union
                      13335CLOUDFLARENETUStrue
                      183.100.39.16
                      unknownKorea Republic of
                      4766KIXS-AS-KRKoreaTelecomKRtrue
                      104.21.45.251
                      unknownUnited States
                      13335CLOUDFLARENETUSfalse
                      146.70.169.164
                      unknownUnited Kingdom
                      2018TENET-1ZAtrue
                      IP
                      127.0.0.127
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1466796
                      Start date and time:2024-07-03 12:30:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 16m 47s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:40
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Sample name:SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@254/115@0/9
                      EGA Information:
                      • Successful, ratio: 80%
                      HCA Information:
                      • Successful, ratio: 55%
                      • Number of executed functions: 115
                      • Number of non-executed functions: 84
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Connection to analysis system has been lost, crash info: Unknown
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Execution Graph export aborted for target 25B5.exe, PID 7732 because there are no executed function
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtEnumerateKey calls found.
                      • Report size getting too big, too many NtOpenFile calls found.
                      • Report size getting too big, too many NtOpenKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Skipping network analysis since amount of network traffic is too extensive
                      TimeTypeDescription
                      06:31:08API Interceptor125928x Sleep call for process: explorer.exe modified
                      06:31:37API Interceptor9x Sleep call for process: 25B5.exe modified
                      06:33:45API Interceptor1x Sleep call for process: GamePall.exe modified
                      11:31:22Task SchedulerRun new task: Firefox Default Browser Agent EE94F52D23136CD5 path: C:\Users\user\AppData\Roaming\utdciaf
                      11:33:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                      11:33:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.192.141.1A662vmc5co.exeGet hashmaliciousUnknownBrowse
                      • bitbucket.org/kennethoswald1/aoz918/downloads/LEraggt.exe
                      lahPWgosNP.exeGet hashmaliciousAmadeyBrowse
                      • bitbucket.org/alex222111/testproj/downloads/s7.exe
                      SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                      SecuriteInfo.com.HEUR.Trojan.Script.Generic.18657.xlsxGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets/tinypro/rEG6d7/ba869eaf2433f3e0b56e4d0776eb5117fc09b21f/files/street-main
                      SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets
                      SecuriteInfo.com.HEUR.Trojan.Script.Generic.20331.xlsxGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets
                      Paid invoice.ppaGet hashmaliciousAgentTeslaBrowse
                      • bitbucket.org/!api/2.0/snippets/warzonepro/Egjbp5/1b96dd9b300f88e62e18db3170d33bf037793d72/files/euromanmain
                      PO#1487958_10.ppaGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets/warzonepro/KME7g4/7678df565d5a8824274645a03590fc72588243f0/files/orignalfinal
                      Purchase Inquiry_pdf.ppaGet hashmaliciousAgentTeslaBrowse
                      • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                      Purchase Inquiry_pdf.ppaGet hashmaliciousUnknownBrowse
                      • bitbucket.org/!api/2.0/snippets/warzonepro/8E74BM/47d1c5bd6af9e6b1718ba4d2e049cba6beb1ac95/files/charles1final
                      188.114.97.3aAEsSBx24sxHhRz.exeGet hashmaliciousFormBookBrowse
                      • www.fin4d-sl.com/dy13/?GdIHAFZ=MC4QZEftrgtCVvoYAYxBXZxxSCJu24Hzj16GKJrL5MOAuB5Jt3GFkekm4l21S7hYr6F9&BhU=5jl0ddZhNnYlOrV0
                      http://sp.26skins.com/steamstore/category/action_run_jump/?snr=1_1530_4__12Get hashmaliciousUnknownBrowse
                      • sp.26skins.com/favicon.ico
                      Inquiry No PJO-4010574.exeGet hashmaliciousFormBookBrowse
                      • www.oc7o0.top/2zff/?iHmHOtK=4L8xoD0W4Zo4sy88OPxzXkM4Et1OXrliZZOBxyE5jHDJEgkxN8cq+PG6NIXzy1XRCqQIvL5VyJCknvUNNLKk7znic/DfJyEGJbg1Pv28u2ofuxZkWteJjYs=&L480=nFsp
                      30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
                      • filetransfer.io/data-package/TbaYPT0S/download
                      nJ8mJTmMf0.exeGet hashmaliciousFormBookBrowse
                      • www.coinwab.com/efdt/
                      hkLFB22XxS.exeGet hashmaliciousFormBookBrowse
                      • www.cavetta.org.mt/yhnb/
                      QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      • filetransfer.io/data-package/mJcm5Gfa/download
                      http://url.usb.m.mimecastprotect.com/s/SPnzCDwVznT7kyA0HkOsZj?domain=linkscan.ioGet hashmaliciousHTMLPhisherBrowse
                      • emmalee.sa.com/favicon.ico
                      file.exeGet hashmaliciousFormBookBrowse
                      • www.cavetta.org.mt/yhnb/
                      6Z4Q4bREii.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                      • 000366cm.nyashka.top/phpflowergenerator.php
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUShttps://dl.dropboxusercontent.com/scl/fi/2urfr5q3ixqp323mpxvhk/doc0992002349204234.zip?rlkey=y7i8kx77whrcy1cmi0q2meqie&st=b7dosz01&dl=0Get hashmaliciousUnknownBrowse
                      • 104.16.230.132
                      4YlwTsmpuZ.rtfGet hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      HSBCscancopy-invoice778483-payment87476MT103.exeGet hashmaliciousFormBookBrowse
                      • 104.21.21.230
                      https://www.mediafire.com/file/9gqqmzveuoh1gqc/Confirmation+of+Payment.tgz/fileGet hashmaliciousAgentTeslaBrowse
                      • 104.16.113.74
                      #U00f6deme makbuzunu onayla.exeGet hashmaliciousLokibotBrowse
                      • 104.21.76.60
                      PI and payment confirmed pdf.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.12.205
                      https://developers.foxit.com/Get hashmaliciousUnknownBrowse
                      • 104.26.9.44
                      https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 104.17.2.184
                      _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
                      • 104.26.13.205
                      https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousUnknownBrowse
                      • 188.114.96.3
                      INFOBOX-ASInfoboxruAutonomousSystemRUEclf71HXa1.exeGet hashmaliciousUnknownBrowse
                      • 77.221.149.185
                      Eclf71HXa1.exeGet hashmaliciousUnknownBrowse
                      • 77.221.149.185
                      file.exeGet hashmaliciousPureLog Stealer, RedLine, XmrigBrowse
                      • 77.221.149.185
                      file.exeGet hashmaliciousPureLog StealerBrowse
                      • 77.221.140.76
                      file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                      • 77.221.140.76
                      file.exeGet hashmaliciousPureLog StealerBrowse
                      • 77.221.140.76
                      SecuriteInfo.com.Win64.MalwareX-gen.13147.14133.exeGet hashmaliciousUnknownBrowse
                      • 77.221.159.5
                      SecuriteInfo.com.Win64.MalwareX-gen.13147.14133.exeGet hashmaliciousUnknownBrowse
                      • 77.221.159.5
                      SecuriteInfo.com.W32.MSIL_Kryptik.KHA.gen.Eldorado.9663.18711.exeGet hashmaliciousPureLog StealerBrowse
                      • 77.221.140.76
                      file.exeGet hashmaliciousPureLog StealerBrowse
                      • 77.221.140.76
                      SPRINTHOSTRUJuHVfiAuLo.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      LXbM8RbhLa.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      6IMo1kM9CC.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                      • 141.8.192.126
                      https://kawak.com.coGet hashmaliciousUnknownBrowse
                      • 185.251.91.91
                      AMAZON-02USfactura.exeGet hashmaliciousFormBookBrowse
                      • 76.223.67.189
                      https://developers.foxit.com/Get hashmaliciousUnknownBrowse
                      • 99.81.164.152
                      https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 13.33.187.96
                      https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousUnknownBrowse
                      • 18.194.165.123
                      http://www.splendidcare.sa.com/Juwqdh/xacwk5957irfeugd/FW2HGOqFbIVQssWaWxsuPFbxoA78Qv8umKJQmKBGMM0/enpkwYwNDdxjXCgjy64rbJkHYw5eTv2C-VSAAV3Fufzkb2cfb573zE5R9OTtHCML20yl9BXVgVz_5eGAS31RGQGet hashmaliciousUnknownBrowse
                      • 52.85.247.89
                      https://www.itanhangasaude.com.br/www/1475312998d8aKqdmPdPNJZi4JNq7WIowwvYGOvuIT___714820ufgtMx5cBwKyVuzlJn3VAYy1QdJUF0IuhCb1EFSueBwxxR9n7T4VNMSyrZd9kcF9rD67v2lJn3VufgtMP8xfiVl9n3IuhCbR9n7Tx5cBw4VNMSx5cBwi3vtsVl9n3MryfS1EFSuufgtMi3vts7O1AR408519___47741237d8aKqdmPdPNJZi4JNq7WIowwvYGOvuITGet hashmaliciousHTMLPhisherBrowse
                      • 13.33.187.68
                      http://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CnemcJJ-2FkU8Glr1M3HQvGDXPIOyf8nkQbVJt7YovOZkAEhuJOuEH4Ph5MiX9jsYgicGN-2FPvxMb8qP3PNxydat9K4xALqN5Q554s0jqmG18yyE0AoEP3aqsetKiEetfLRlyIoY9Go3GDyKCGByc1bkwA-3D-3D_hiB_k8wtFa9etD1KMa1MmHXW-2FwYg06wo9cWiDvHqiPmYOGRytNUZst79UpJomtryxKKrh0AV18bTw1Uxa1j3-2B-2BWgpNF6-2FluKqUVQIq65eqgwBcBWQ5CQR9M5cCIHc1cOAH-2BE24H4P7fEAYeqsitSa9ibB8GYFVo8FSHDcQGWJdcDhc6qRVYNNoOHnXmlwvjC9umLA7lBgfKuIFPk0wTmv1npRA3-2BeNSYEECh53hnx2Ya-2Bv8-3DGet hashmaliciousHTMLPhisherBrowse
                      • 99.83.228.109
                      https://doc-online.totalenergies.com/web/totalenergies-marketing-franceGet hashmaliciousUnknownBrowse
                      • 35.157.215.50
                      https://www.getaround.co.il/wp-logs/?r=mag372@norauto.esGet hashmaliciousHTMLPhisherBrowse
                      • 18.196.133.205
                      disjR92Xrrnc3aZ.exeGet hashmaliciousFormBookBrowse
                      • 3.18.7.81
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\25B5.exeJuHVfiAuLo.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                        LXbM8RbhLa.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                          EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                            6IMo1kM9CC.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                              file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                  37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                    OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                      SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                        setup.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, SmokeLoader, StealcBrowse
                                          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\huge[1].datJuHVfiAuLo.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                            LXbM8RbhLa.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                              EiPVv5yELP.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                6IMo1kM9CC.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                  file.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                    SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                      37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                        OBbrO5rwew.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                          SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exeGet hashmaliciousLummaC, Poverty Stealer, SmokeLoaderBrowse
                                                            file.exeGet hashmaliciousSmokeLoaderBrowse
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Category:dropped
                                                              Size (bytes):107232830
                                                              Entropy (8bit):7.999946456161068
                                                              Encrypted:true
                                                              SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                                                              MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                                                              SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                                                              SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                                                              SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                              Joe Sandbox View:
                                                              • Filename: JuHVfiAuLo.exe, Detection: malicious, Browse
                                                              • Filename: LXbM8RbhLa.exe, Detection: malicious, Browse
                                                              • Filename: EiPVv5yELP.exe, Detection: malicious, Browse
                                                              • Filename: 6IMo1kM9CC.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe, Detection: malicious, Browse
                                                              • Filename: 37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exe, Detection: malicious, Browse
                                                              • Filename: OBbrO5rwew.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6642176
                                                              Entropy (8bit):7.866419732571782
                                                              Encrypted:false
                                                              SSDEEP:98304:LqhZ67opwYckx35SF2XKgxVvHuCPU8GSbO3JAXV1LrA+ZlL9CxpzTp2:LgErupSgKORuCT43JeV1LE+/s3p
                                                              MD5:BD2EAC64CBDED877608468D86786594A
                                                              SHA1:778AD44AFD5629F0A5B3B7DF9D6F02522AE94D91
                                                              SHA-256:CAE992788853230AF91501546F6EAD07CFD767CB8429C98A273093A90BBCB5AD
                                                              SHA-512:3C8F43045F27ADDCB5FB23807C2CE1D3F247CC30DD1596134A141B0BBC7FA4D30D138791214D939DC4F34FD925B9EC450EA340E5871E2F4F64844226ED394312
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 68%
                                                              Joe Sandbox View:
                                                              • Filename: JuHVfiAuLo.exe, Detection: malicious, Browse
                                                              • Filename: LXbM8RbhLa.exe, Detection: malicious, Browse
                                                              • Filename: EiPVv5yELP.exe, Detection: malicious, Browse
                                                              • Filename: 6IMo1kM9CC.exe, Detection: malicious, Browse
                                                              • Filename: file.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.2850.19434.exe, Detection: malicious, Browse
                                                              • Filename: 37e6e5d8b399fefb9ae774516ff6367e800c69a272e18a654bb84ccff2d7c67a_dump.exe, Detection: malicious, Browse
                                                              • Filename: OBbrO5rwew.exe, Detection: malicious, Browse
                                                              • Filename: SecuriteInfo.com.Win32.DropperX-gen.32377.19302.exe, Detection: malicious, Browse
                                                              • Filename: setup.exe, Detection: malicious, Browse
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....U~f..............................M...........@...................................e...@..................................O......P......................@.......................................................@3..............................text...+........................... ..`.rdata...*..........................@..@.data.... ..........................@....vmpL.p.....0...................... ..`.vmpL.p@....@3.....................@....vmpL.p..]..P3...]................. ..`.reloc.......@........].............@..@.rsrc.......P...f....].............@..@........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Category:dropped
                                                              Size (bytes):293869
                                                              Entropy (8bit):5.61569579822855
                                                              Encrypted:false
                                                              SSDEEP:3072:lFi6z/VXzAf3ocMNqB3r1Josf+OMhERMlm+twHBumSYyDgIoIPM7l0UGHM7:lxFSIjs+OM2eLFmSFgIZk7+HM7
                                                              MD5:60172CA946DE57C3529E9F05CC502870
                                                              SHA1:DE8F59D6973A5811BB10A9A4410801FA63BC8B56
                                                              SHA-256:42CEB2252FEC41FD0ACC6874B41C91E0BA07C367045D6A9A7850D59781C2584C
                                                              SHA-512:15D37AF3CAB96FC9026A1898E09C775FE0D277098A3FE20C2E591272DE996A243850D43F3B48B4C037C5FED359E57795A7CF1652547D7AD8B16B186AB9508792
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 21%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........`..X............................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...X....`......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:modified
                                                              Size (bytes):578048
                                                              Entropy (8bit):6.297510031778876
                                                              Encrypted:false
                                                              SSDEEP:12288:No4ykJuqlLJop9G3/AmAGWn7sfPJYQIMt8KHsTH:NoBsLaDKAmAbUJ+M2K2
                                                              MD5:DA4B6F39FC024D2383D4BFE7F67F1EE1
                                                              SHA1:7CC975D9FF785E269163897907D0B9B3CEE29956
                                                              SHA-256:544697A024ABAEA1B24EAA3D89869B2C8A4C1ACF96D4E152F5632D338D054C9E
                                                              SHA-512:D73CC4D911D9E61711B97CB9212D5BC93CB1B1314A39945934EB92239A31728FCCA7FEFBEC0143BAD915B0A7A6B93DF11D0AB7F559737AA7EC920BD24243FFFE
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 54%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I..I..I...1..I...1...I...1..I..l...I..l...I..l....I...1..I..I...I..]...I..]...I..Rich.I..................PE..L...w;.f...............'.....\....................@.......................................@.....................................(................................2..Xh..p....................i.......g..@...............@............................text....~.......................... ..`.rdata..4...........................@..@.data...............................@....reloc...2.......4..................@..B........................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):60466
                                                              Entropy (8bit):5.603640719549413
                                                              Encrypted:false
                                                              SSDEEP:1536:akqg31kqY3Q4Oc//////Q0LatojW/lX1Xb41:3qg323Sc//////Q3tojW/XXy
                                                              MD5:DE806154A80E3916669C466B6D001BD6
                                                              SHA1:B85BD0EC436125772A9C5403162628B7AAB35F49
                                                              SHA-256:10D9B7F2238EFFEB71990F979B9DFE4F3BE3D212B05232EF34C39F9578CC11E3
                                                              SHA-512:63CC5D6865C89AE2C41EEE3C76FD865D9461E96DBC570270982EB6DB5A15FB234098286CEE3FF9DB2255FEDA5207A222AB67743475AD60CCFD89A86B881BCB94
                                                              Malicious:false
                                                              Preview:",......,..................."...|%......H+......",..............................................................................................................................................................................................................................................................j.......,.../...5.......3.......................................................................................................................N.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):22016
                                                              Entropy (8bit):5.668346578219837
                                                              Encrypted:false
                                                              SSDEEP:384:VpOSdCjDyyvBwRlX+ODbswYM2s74NS0v0Ac9khYLMkIX0+Gzyekx:rdCjW/lX1PfYM2X1
                                                              MD5:92EC4DD8C0DDD8C4305AE1684AB65FB0
                                                              SHA1:D850013D582A62E502942F0DD282CC0C29C4310E
                                                              SHA-256:5520208A33E6409C129B4EA1270771F741D95AFE5B048C2A1E6A2CC2AD829934
                                                              SHA-512:581351AEF694F2489E1A0977EBCA55C4D7268CA167127CEFB217ED0D2098136C7EB433058469449F75BE82B8E5D484C9E7B6CF0B32535063709272D7810EC651
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........9<.EXR.EXR.EXR.b.).LXR.EXS..XR.b. .FXR.b.(.DXR.b...DXR.b.*.DXR.RichEXR.................PE..L....I6V...........!.....8...P......Q?.......P...................................................................... G..l....?..d.......(...............................................................................P............................text....7.......8.................. ..`.data...<<...P.......<..............@....rsrc...(............D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):22528
                                                              Entropy (8bit):6.674611218414922
                                                              Encrypted:false
                                                              SSDEEP:384:yTxz0Cv0hqd+1TjQmd9YWrSUEc//////OD5hF92IJpJgLa0MpoYfAz6S:jCvsqdS3QGBREc//////Q53NgLa1ub
                                                              MD5:5AFD4A9B7E69E7C6E312B2CE4040394A
                                                              SHA1:FBD07ADB3F02F866DC3A327A86B0F319D4A94502
                                                              SHA-256:053B4487D22AACF8274BAB448AE1D665FE7926102197B47BFBA6C7ED5493B3AE
                                                              SHA-512:F78EFE9D1FA7D2FFC731D5F878F81E4DCBFAF0C561FDFBF4C133BA2CE1366C95C4672D67CAE6A8BD8FCC7D04861A9DA389D98361055AC46FC9793828D9776511
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................6..........dD.......P....@.....................................................................Y.......................................p...................................................................................CODE....|4.......6.................. ..`DATA....8....P.......:..............@...BSS..........p.......L...................idata...............L..............@....edata..Y............P..............@..P.reloc..p............R..............@..P.rsrc................V..............@..P.....................X..............@..P................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):4608
                                                              Entropy (8bit):4.666004851298707
                                                              Encrypted:false
                                                              SSDEEP:48:iYXzAm8HGJLvwM8GJFd6I7W4JtT2bxNNAa4GsNf+CJ8aYqmtlKdgAtgma1QvtCSJ:lz2mJkpGR6GY74GQ1YqmstgGCtR
                                                              MD5:FAA7F034B38E729A983965C04CC70FC1
                                                              SHA1:DF8BDA55B498976EA47D25D8A77539B049DAB55E
                                                              SHA-256:579A034FF5AB9B732A318B1636C2902840F604E8E664F5B93C07A99253B3C9CF
                                                              SHA-512:7868F9B437FCF829AD993FF57995F58836AD578458994361C72AE1BF1DFB74022F9F9E948B48AFD3361ED3426C4F85B4BB0D595E38EE278FEE5C4425C4491DBF
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........s.I...I...I...n|f.L...I...Q...@..K...@..H...@..H...RichI...........PE..L...`..N...........!......................... ...............................`.......................................#....... ..<....@.......................P..|.................................................... ..`............................text............................... ..`.rdata....... ......................@..@.data... ....0......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):358363995
                                                              Entropy (8bit):6.972150585647623
                                                              Encrypted:false
                                                              SSDEEP:3145728:KTzytRGD/CYRNIPKYTFBhfmOS9KBaVzTx9OSsKV97nM:KnUs4tvaVzTD99M
                                                              MD5:5F9D89B40243E83C0B48206CE4EB77D1
                                                              SHA1:477A019AB11E5793168B3E41D83B80A8AC8F1D43
                                                              SHA-256:2BF31800E731EF63E7E5BDEECD87B50B349EC8F5C9D752AACB807AC0E82E95B9
                                                              SHA-512:5B812C2D341FE8A9296EF68E416E0EFA8185FB3ECCEC0917AB206CD7639E1810E6444538B61583E2260F1A46D4209E1995CFBF940A1D9836C4155ADF0504940B
                                                              Malicious:false
                                                              Preview:........,.......................H...........................................................................................................................................................................................................................................................e...i...............j.......................3.......................................................................................................................t....V..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):82944
                                                              Entropy (8bit):6.389604568119155
                                                              Encrypted:false
                                                              SSDEEP:1536:Dli3i1jKfTV0LzYpAzMk2nACScLw5jPAT:j9KLQ+ScLw5jPAT
                                                              MD5:165E1EF5C79475E8C33D19A870E672D4
                                                              SHA1:965F02BFD103F094AC6B3EEF3ABE7FDCB8D9E2A5
                                                              SHA-256:9DB9C58E44DFF2D985DC078FDBB7498DCC66C4CC4EB12F68DE6A98A5D665ABBD
                                                              SHA-512:CD10EAF0928E5DF048BF0488D9DBFE9442E2E106396A0967462BEF440BF0B528CDF3AB06024FB6FDAF9F247E2B7F3CA0CEA78AFC0CE6943650EF9D6C91FEE52A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W=.e9n.e9n.e9n...n.e9n...n.e9n..Bn.e9n.e8n.e9n.7.n.e9n...n.e9n...n.e9n...n.e9nRich.e9n........PE..L...,.N...........!.........^.......%...............................................3..................................`...$'..d....`.......................p...................................... ...@...............h............................text...1........................... ..`.rdata..P/.......0..................@..@.data........0......................@....rsrc........`.......*..............@..@.reloc.......p.......,..............@..B........................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Category:dropped
                                                              Size (bytes):107232830
                                                              Entropy (8bit):7.999946456161068
                                                              Encrypted:true
                                                              SSDEEP:1572864:6F6Q78DDbO8pDfwpK5ZAQ5WKor2G5N6Y7ZxFo9jk7WUTLECglga1R7P435MZZDXA:jPNVfsQZoL5NJdo9jKWergS89P4qZZc
                                                              MD5:FF2293FBFF53F4BD2BFF91780FABFD60
                                                              SHA1:61A9EDCF46228DC907AD523AA6FD035CC26C9209
                                                              SHA-256:B9BC473FC866909F089E005BAF2537EE7FF2825668D40D67C960D5C2AFB34E9F
                                                              SHA-512:C31A0046BA580926097422DF34619B614AA0DEB6435EC5CE68A553846FAD15BC61908B8C8292D25EE061BA1974637A7B91D72F19CCCCC2C76B9AC737B1CB4A5E
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.01057775872642915
                                                              Encrypted:false
                                                              SSDEEP:3:MsFl:/F
                                                              MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                              SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                              SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                              SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                              Malicious:false
                                                              Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.012096502606932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsEllllkXl:/M/6
                                                              MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                                                              SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                                                              SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                                                              SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.011852361981932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsHlDll:/H
                                                              MD5:0962291D6D367570BEE5454721C17E11
                                                              SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                              SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                              SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:modified
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.012340643231932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsGl3ll:/y
                                                              MD5:41876349CB12D6DB992F1309F22DF3F0
                                                              SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                              SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                              SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                              Category:dropped
                                                              Size (bytes):262512
                                                              Entropy (8bit):9.400746676417616E-4
                                                              Encrypted:false
                                                              SSDEEP:3:LsNlC:Ls3
                                                              MD5:9D21F1B0FD97191202229770DFBC3F0E
                                                              SHA1:D05278AFF66B2A292C9E220667B5447918232700
                                                              SHA-256:9F47205A81BA44023817804FA27E1788DA86D5867A9A0E032964C1D7B648BA8C
                                                              SHA-512:C24D8FA9D62ABD18D18017A3C82457663C99A489DDF5CBB558CA390B7FC0EEC75F570E03929416E84D17B5B50125925B07411D962CB4688F904114DE9B8416C4
                                                              Malicious:false
                                                              Preview:.........................................z...z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):4.622398838808078
                                                              Encrypted:false
                                                              SSDEEP:96:QPjzIyfbInD3W0IwrBmEH7UewW4ORIhmY5XO40uK8DDzNt:pQIS0IwrJbU7W4kIX5e4kgF
                                                              MD5:97D4D47D539CB8171BE2AEFD64C6EBB1
                                                              SHA1:44ABF82DD553CCE0C1F41B9B78D853075DDD1F16
                                                              SHA-256:8D996D5F68BF2248F223C4F3549303BC6A8EC58CC97FCB63B7BB7D8068850273
                                                              SHA-512:7D402847B093E208410C695095DE815A3F5D5DA81630FD51C88C009C48C269D0EA5016D626351BB9D38862163FAD930645072C50ACCCD743DC0E19531A592FDE
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 7%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....&.].........."...0.............64... ...@....@.. ....................................@..................................3..O....@.......................`.......2............................................... ............... ..H............text...<.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................4......H........#...............1...............................................0..-.......(....r...p(.....(.......(....,...(....*(....*....0..T........~....(.....~....(.....(....s....%.o....%.o....%.o....%.o....%~....o....(....&..&..*........PP.......0..6.......(....(......( ...r...p~....r...p(!.....("...,...(#...*...0..........r...p.~$.....o%.....,..~....o&......,..o'....ra..p.~$.....o%.....,..~....o(......,..o'....r...p.~$.....o%.....,..~....o(......,..o'......&..*....4.......#..
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.01057775872642915
                                                              Encrypted:false
                                                              SSDEEP:3:MsFl:/F
                                                              MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                              SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                              SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                              SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                              Malicious:false
                                                              Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.012096502606932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsEllllkXl:/M/6
                                                              MD5:259E7ED5FB3C6C90533B963DA5B2FC1B
                                                              SHA1:DF90EABDA434CA50828ABB039B4F80B7F051EC77
                                                              SHA-256:35BB2F189C643DCF52ECF037603D104035ECDC490BF059B7736E58EF7D821A09
                                                              SHA-512:9D401053AC21A73863B461B0361DF1A17850F42FD5FC7A77763A124AA33F2E9493FAD018C78CDFF63CA10F6710E53255CE891AD6EC56EC77D770C4630F274933
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.011852361981932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsHlDll:/H
                                                              MD5:0962291D6D367570BEE5454721C17E11
                                                              SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                              SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                              SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8192
                                                              Entropy (8bit):0.012340643231932763
                                                              Encrypted:false
                                                              SSDEEP:3:MsGl3ll:/y
                                                              MD5:41876349CB12D6DB992F1309F22DF3F0
                                                              SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                              SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                              SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                              Category:dropped
                                                              Size (bytes):262512
                                                              Entropy (8bit):9.553120663130604E-4
                                                              Encrypted:false
                                                              SSDEEP:3:LsNlEi:Ls3Ei
                                                              MD5:77DC39EF400ACC54EAF49AD55558ACCC
                                                              SHA1:D772FEC7480A027E74B9A507985FAE28EA10C8F9
                                                              SHA-256:133DA62E8CB453A84973BC3B55D0C0E35A9B98682494F625B44994EFB9A8F023
                                                              SHA-512:DD4D4282F410A965474C2AE4C381F9EA7539C8ED3EBA0FB988E0F069AA28E1B15B03CD0FC3DE7B33848C4B3B2B68970E587E85A97FC7D98199C077B5DD77E1ED
                                                              Malicious:false
                                                              Preview:........................................`S...z/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):296448
                                                              Entropy (8bit):5.660420770467009
                                                              Encrypted:false
                                                              SSDEEP:3072:xTpjI4TptgvmHMaellnhblkK0m2QEk0xjo4OVzdvayfvYn6A:ppbVtsg1e5b2Px2zdyyq
                                                              MD5:7A3502C1119795D35569535DE243B6FE
                                                              SHA1:DA0D16BC66614C7D273C47F321C5EE0652FB5575
                                                              SHA-256:B18FEFB56ED7B89E45CEC8A5494FBEC81E36A5CB5538CCBB8DE41CCE960FAA30
                                                              SHA-512:258B111AC256CD8145CBE212D59DFF5840D67E70EFFD7CDDC157B2A3461B398BBC3446004980131FAA6A8762C19305F56E7B793F045331B56B8BD17D85B884C4
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....rf..............0.............>.... ........@.. ....................................@....................................O.......t............................................................................ ............... ..H............text...d.... ...................... ..`.rsrc...t...........................@..@.reloc..............................@..B................ .......H....... ...$...........D...p............................................(....s....*Z..(....,...(....(....*.(....*..(....*..(....*.......*.~....*....0..W.......(....".....(......,..o....-..*.o.....+...( .....o....&..(!...-...........o"....."...BZ*.......%..A.......0..Q.......(....(........,..o....-..*.o.....+...( .....o....&.._...(!...-...........o".....*.........!. A.......0..V.......(....(......,..o....-.*~#.....o.....+...( ...."...B[..o....&..(!...-...........o"....*......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):462336
                                                              Entropy (8bit):6.803831500359682
                                                              Encrypted:false
                                                              SSDEEP:6144:leSYvQAd10GtSV41OJDsTDDVUMle6ZjxLV/rHo0Oaaz2R9IY:oJBdBS4msNUCe65frHMnz2R9
                                                              MD5:6DED8FCBF5F1D9E422B327CA51625E24
                                                              SHA1:8A1140CEBC39F6994EEF7E8DE4627FB7B72A2DD9
                                                              SHA-256:3B3E541682E48F3FD2872F85A06278DA2F3E7877EE956DA89B90D732A1EAA0BD
                                                              SHA-512:BDA3A65133B7B1E2765C7D07C7DA5103292B3C4C2F0673640428B3E7E8637B11539F06C330AB5D0BA6E2274BD2DCD2C50312BE6579E75C4008FF5AE7DAE34CE4
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=N...........!................N#... ...@....@.. ..............................T.....@.................................."..O....@..P....................`......."............................................... ............... ..H............text...T.... ...................... ..`.rsrc...P....@......................@..@.reloc.......`......................@..B................0#......H.......0U..l...........P%.../..P ......................................6..`N.?O...%.C.k_..d...I......5a.......9x......R...gg8...JM...`.[. .o..eE1$_.M.h.q.oz..1..........@....s.c/J..wk.D.....t..&...(....*...0..2........r...p(....}.......}"....(........(.........(....*..r...p(....}.......}"....(........(....*..0..j.........o....-..s#...+..}......(......(......}.....(....s....}......}......}......(......%-.&r...p}......j(#...*rr!..p.{.....{.....B...(....*..0..A........{..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):574376
                                                              Entropy (8bit):5.8881470355864725
                                                              Encrypted:false
                                                              SSDEEP:12288:ZzfhypmNGgHA37YyUD1AboTf3xnpJbC8VGSBJjRuz7:ZoI1AbQf3xnpJbC8VLBJjRuz7
                                                              MD5:8F81C9520104B730C25D90A9DD511148
                                                              SHA1:7CF46CB81C3B51965C1F78762840EB5797594778
                                                              SHA-256:F1F01B3474B92D6E1C3D6ADFAE74EE0EA0EBA6E9935565FE2317686D80A2E886
                                                              SHA-512:B4A66389BF06A6611DF47E81B818CC2FCD0A854324A2564A4438866953F148950F59CD4C07C9D40CC3A9043B5CE12B150C8A56CCCDF98D5E3F0225EDF8C516F3
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Ot............" ..0.............6.... ........... ....................................@....................................O.......................................T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........f...P............................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*..(....*:.(......}....*..{....*..(....*..(....*:.(......}....*..{....*.(.........*....}.....(......{.....X.....}....*..0...........-.~....*.~....X....b...aX...X...X.+....b...aX...X...2.....cY.....cY....cY...{...._..{........+,..{E....3...{D......(....,...{D...*..{F.......-..*...0...........-.r...ps....z.o......-.~....*.~....X...+....b..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):561424
                                                              Entropy (8bit):4.606896607960262
                                                              Encrypted:false
                                                              SSDEEP:6144:XqqUmk/Rik2rH6dl0/IaHNpOVIeR0R+CRFo9TA82m5Kj+sJjoqoyO185QyMYFLse:DUK
                                                              MD5:928ED37DB61C1E98A2831C8C01F6157C
                                                              SHA1:98103C2133EBDA28BE78BFE3E2D81D41924A23EE
                                                              SHA-256:39F6A4DB1BE658D6BAFF643FA05AAE7809139D9665475BFCA10D37DCA3384F21
                                                              SHA-512:F59387BFA914C7DB234161E31AD6075031ACA17AAEF4B8D4F4B95C78C7A6A8D0E64211566CA2FD4549B9DA45231F57A4191FBCD3809404653F86EE2ABD4937A4
                                                              Malicious:false
                                                              Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>Newtonsoft.Json</name>.. </assembly>.. <members>.. <member name="T:Newtonsoft.Json.Bson.BsonObjectId">.. <summary>.. Represents a BSON Oid (object id)... </summary>.. </member>.. <member name="P:Newtonsoft.Json.Bson.BsonObjectId.Value">.. <summary>.. Gets or sets the value of the Oid... </summary>.. <value>The value of the Oid.</value>.. </member>.. <member name="M:Newtonsoft.Json.Bson.BsonObjectId.#ctor(System.Byte[])">.. <summary>.. Initializes a new instance of the <see cref="T:Newtonsoft.Json.Bson.BsonObjectId"/> class... </summary>.. <param name="value">The Oid value.</param>.. </member>.. <member name="T:Newtonsoft.Json.Bson.BsonReader">.. <summary>.. Represents a reader that provides fast, non-cached, forward-only access to s
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                              Category:dropped
                                                              Size (bytes):215862
                                                              Entropy (8bit):5.849338245796311
                                                              Encrypted:false
                                                              SSDEEP:3072:rFi6z/VXzAf3oc8+vat7fvYnDAdOVz5kNx:rxFSI+y1qk6zuNx
                                                              MD5:9D21A25AA1B5985A2C8CBCE7F7007295
                                                              SHA1:86EBF56352B4DBB831FAE0CCA180B4ADD951240D
                                                              SHA-256:E41F984C39183BA4FD1578134D71E203F4A7A8C23F278924562876326FC40EE2
                                                              SHA-512:EE4A1AC97968F2DDA3C54A49AC33D3FCE28C4DAE72032D9FDD1F8D8BA41B07A1D78D15E11586DA54AD5E0F2BD4A48C79A0CBAC84DE3D957B2AC6C1B5F41A33BB
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........................................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):875520
                                                              Entropy (8bit):5.621956468920589
                                                              Encrypted:false
                                                              SSDEEP:12288:jsRfnBqqvFXWesd2HiZ9fyn+5FHrvUR1Qnzx7LuQ:jsRITeWAQ5vtu
                                                              MD5:B03C7F6072A0CB1A1D6A92EE7B82705A
                                                              SHA1:6675839C5E266075E7E1812AD8E856A2468274DD
                                                              SHA-256:F561713347544E9D06D30F02A3DFCEC5FE593B38894593AEEDF5700666B35027
                                                              SHA-512:19D6792EB9BA8584B94D0D59E07CE9D1C9C4DA5516490F4ABCE5AE0D7D55B357BDA45B2093B3E9EB9D6858061E9D3F530A6655C4779A50C911501AE23925C566
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................." ..0..R...........p... ........... ....................................@..................................p..O.......x............................o..T............................................ ............... ..H............text....P... ...R.................. ..`.rsrc...x............T..............@..@.reloc...............Z..............@..B.................p......H....... .................................................................(....*..(....*..(....*^.(.......=...%...}....*:.(......}....*:.(......}....*^.(.......>...%...}....*:.(......}....*.(.........*....0..,.......(....o.......3..*....... ....3.(....-..*.*.*.0..L.......~..... . ..(......(....-..(....r...p( ...,.......&...~....(!...,..(".....*.*........+1...........4.......~....*.~....*..(....*.~....,.*.(#...-.(....-..(....+.r...ps$...z(..........*b.r...p(%...~.....(....&*.r
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1946739
                                                              Entropy (8bit):7.989700491058983
                                                              Encrypted:false
                                                              SSDEEP:49152:fpXzD2VLpS71ycdao6LreGCL/0jJZWOiBiXkbEia9T:xjyFgZ0Lr2/0jJU5BiIEN
                                                              MD5:96AD47D78A70B33158961585D9154ECC
                                                              SHA1:149BF6F6905A76B0CC9E9ACA580357BD6C3497A2
                                                              SHA-256:C861117D1F1DBF02867B46FA87CB8C65C3213D196029EE81A02B617D131236E2
                                                              SHA-512:6A971F742B5754EEF39C6C2C64DB13DFDCB74D8CB23833404E9EF5AD89E142278E5DF789F508DB561C5E957013AE0C60D002CDFA93BCD87CA4967D610DF1579B
                                                              Malicious:false
                                                              Preview:........V...f.....g.7........................!.....%....o8...).>...).F...).H...).X...).a...)*i...).k...).q...)Lt...).v...)Tw...).x...).}...).....)I....)i....)....).....).....)L....)....)....)t....).....).....).....)s....).... )....!)....")....#)....$)}...%)+...&)h#..').'..().-..)).>..*).A..+).C..,).Q..-)CU...).]..<).d..=).l..>)i...?)G...@)H...A)r...B)....C)z...T)....U)....V)+...W)....X)....Y)....Z)....[)#...\)}...]).!..^)R1.._).2..`).;..a).=..b)mE..c)QG..d).H..e)qL..f).U..g).]..h).b..i))d..j).e..k).g..l)Pi..m).p..n).z..s).z...).....)b....).....)'....).....)....)....).....).....)....).....)s....)F....)j....)....).....)....)....)....)h....)H....)....).....).....)k....).....)L....)q....)2....).....).....).....).....).....)N....)|....).....).....).....).!...).)...).6...).C...)RE...).L...).N...).O...).U...)bV...).W...).^...)o_...)(g...)Si...).v...).....)0....)/....).....),....).....*.....*F....*]....*3....*v....*....*v....*.....*.....*.....*$... *....!*8..."*....#*....$*....%*..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):214119
                                                              Entropy (8bit):7.955451054538398
                                                              Encrypted:false
                                                              SSDEEP:6144:m5S+8U5mtp0ra7rFrJzw95T9OHCZg0Gb0OveGe04mExhLY:mWU5OGUFoqoORehrQ
                                                              MD5:391F512173ECEC14EB5CE31299858DE1
                                                              SHA1:3A5A41A190C1FB682F9D9C84F500FF50308617FC
                                                              SHA-256:E0F5C754C969CCA0AC4594A6F3F2C23D080A09EEA992AF29E19F4291FD1E0B06
                                                              SHA-512:44D7B9BCB3544C3F5550150EF3522BF6A0B36900695E6A13E44F5616E16A058548189D4FEA4A22248B1CB2B273B0EAA7D559EB2D8F013BED520E4097BD45D800
                                                              Malicious:false
                                                              Preview:........................#.b...&.....:.g....7.....7.....7.....7|(...7.-...7t5...7.6...7.9...7s:...7hB...7.E...7.G...7.K...7qN...7.Q...7yR...7.S...7.W...7.\...7.b...7.i...7.k...76m...7Vq...7.r...7.v...7.y...7.{...7.~...7Z....75....7;....7W....7.....7c....7u....7b....7.....7.....7.....7Q....7*....7\....8."...8,)..<FqG..=F7I..>F.L..?F$O..@F.P..AFaQ..BFnT..CF.W..DF.Y..EFJ\..FF.^..MF(b..NF.c..QF.e..RF.f..YFZg..ZF.p..[F.x..\F.{..]F.{...L.|...L.....L....Ni....N.....NJ....N2....N+....N^....No....N9....NK....N....N1....N$....N....Nh....N.....N.....U.....U.....U.....U.....U.....U[....U.&...Uh(...U?/...U.4...U.:...U.@...U.B...U,G...U.K...U)N...U.R...UF\...U.`...U.b...U.j...U]s...UEt...U.u...U.w...U.z...Uh{...U.}...U#....U.....U^....U.....U|....U.....U.....U.....U.....U.....U.....U.....U.....U.....U]....U?....U.....U9....U....U.....Um....U<....U!....U.....U.....U....Uq....U3....U!....U.....U....U.....Uu....UJ....U.....U.....U.....U.....U`....U'....U.....U.....Ul....U%....U7....U.....U.....UW.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):290001
                                                              Entropy (8bit):7.9670215100557735
                                                              Encrypted:false
                                                              SSDEEP:6144:tS+8U5mtp0ra7rFriDQYaF+9bQHgs4jTlmOHCZVWGMRe8InVXYopym74:CU5OGUFrfs4gs4jTQ6ebVIo374
                                                              MD5:BF59A047984EAFC79E40B0011ED4116D
                                                              SHA1:DF747125F31F3FF7E3DFE5849F701C3483B32C5E
                                                              SHA-256:CD9BE67AA0527F16E309189FA2369E1A2596D0601A7D55C405F8A619F4D095E9
                                                              SHA-512:85A545758E8C89EF47BF11B553C57D23ED7DA6AE89A8BCCB262F509AABE61A1121C3F87EC9200791F2670225BAEECC3C92AED6AFDA86C08CA0FD611DA2E595D2
                                                              Malicious:false
                                                              Preview:........................#.....&.....:......7.....7.....7.....7.+...7.1...7.8...7.9...7)<...7.=...7xE...7.H...7.J...7'N...7.Q...7.T...7.U...7.W...7.Z...7._...7.e...7.l...7.n...7Fp...7ft...7.v...7)y...7.|...7.~...7.....7j....7E....7K....7g....7.....7s....7.....7r....7.....7.....7.....7a....7:....7l"...8.%...8<,..<F.J..=F.N..>FtV..?F9\..@Fw_..AFr`..BF0g..CFll..DF|o..EF.v..FF){..MF....NF...QFf...RF....YF`...ZF...[F....\F....]F....L*....L.....L.....N.....N.....N.....N.....N.....N.....N.#...N.&...N.'...N.)...N.*...N.+...Nv,...N.-...N;r...N.|...Um....U.....UM....UV....U.....U....UC....U.....U....UM....U.....U.....Um....U.....U.....U.....U.....UQ....U.....U7....U.....U.....Uk....U.....U.....U.....U.....U.....U.....U.....U.....U.....U{....U.....U.....U.....U~&...U.)...U.Q...U.Q...U.V...U.[...U.\...U._...U.`...U?a...U.a...Uic...U.d...U\f...U.g...U.i...U1l...U.p...U.u...U.}...U.....U.....U^....U.....U.....Ux....U....U.....Uy....U6....U.....U....UR....Uq....U.....U.....U_....U.....U.....U..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1305142
                                                              Entropy (8bit):7.99463351416358
                                                              Encrypted:true
                                                              SSDEEP:24576:8AkckSbnVLjWG13xdT0b+SLzRYt2k+lbG9EjJNH/osm22O+EcRfPLP:88zVXWG1hdAKSxY4k5EFNHgvPPLP
                                                              MD5:20DDA02AF522924E45223D7262D0E1ED
                                                              SHA1:378E88033A7083AAC24E6CD2144F7BC706F00837
                                                              SHA-256:8448C2BA10A3D7DC8CA3FB24F580BF99D91F746107B1A06E74932749CC1CAB01
                                                              SHA-512:E71320B2AA0CB52938206EC00187D78274646C4C7D3579B33A0163262C063B7813FE7ACD0D2E5807082ADE772069AA577FED7F594964790C2F7C061CE38467B6
                                                              Malicious:false
                                                              Preview:........i...f+....i+....l+....m+{...n+q...o+7(..p+.1..q+X3..r+~5..s+aI..t+.]..u+.f..v+Ui..w+'k..x+.l..y+.q..z+.s..{+O{..|+...}+=...~+.....+....+-....+.....+.....+.....+.....+.....+.....+.....+.....+.....+%....+.....+&(...+.Q...+.Y...+Xe...+Bj...+cv...+.}...+....+H....+....+Q....+l....+I....+.....+ ....+T....+!....+m....+.....+.....+U....+.....+.....+.....+l....+~....+.....+=....+w....+.....+-"...+.(...+.0...+.2...+.4...+.G...+uS...+.....+9....+y....+.....+.....+N....+....+0....+.....+.....+.....+_....+.....+.....+.....+.....+.....+.....+.....+.....+S....7`....7R...(7/...)7.....L.m...LO....L.....Mk....M.....M.....M>....M.....M.....Mq....M.....M.....M\....M.....M.....M.....M.....M.....M.....M.....M.....M.....MO....M.....M.....M.!...M.(...Mf5...M.;...M&E...M.P...M.T...M<]...M.`...M.j.. M.k..!M2v.."M.w..#M.z..$M....%M...&M...'M#...(M@...)M....*M(...+MY...,Mu...-M$....M..../MV...0M;...1Mx...2M....3M....4Mi...5M....6M....7MP...8M"...DM....EM.....Mi....M.~...M.~...Mb....M_....M....M.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:current ar archive
                                                              Category:dropped
                                                              Size (bytes):87182312
                                                              Entropy (8bit):5.477474753748716
                                                              Encrypted:false
                                                              SSDEEP:196608:v0b1XAJ5V8XYcrfCNJsTtU0ZhdYHbgMnn6d25JOcLRiLnIrBcnK0EAeg1GF:78JaNJyZhdE6383rWEAR8
                                                              MD5:FFD456A85E341D430AFA0C07C1068538
                                                              SHA1:59394310B45F7B2B2882D55ADD9310C692C7144F
                                                              SHA-256:F188B96639B5157E64222BB8483D76CD21A99141FC2614EF275E20639C739264
                                                              SHA-512:EB4CB388383CB37B1D89531D560169985A80DF9335F005AFBBFDE56F9031821A933D735138B1086CF81D006E480FF14711A8A95B3DB8A0FD4037AA6EFD926B50
                                                              Malicious:false
                                                              Preview:!<arch>./ 1696073295 0 1940897 `...Y..:.t.:.>.:...:...:...:...:...;/..;/..;/..;/..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..;k..@...@...@...@...@...A...A...A...A...A...A...A...A...A...A...A...A...Co..Co..Co..Co..Co..Co..Co..Co..Co..Co..E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...E...G..G..G..G..G..G..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=..H=.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):656926
                                                              Entropy (8bit):7.964275415195004
                                                              Encrypted:false
                                                              SSDEEP:12288:fI3Hdjzgsz5B0GDJQrnKs8SNP+QSsSilRBdNze0Vc+gIXgt4z8oO0TehEr7:g397zEEmPLSOdNze05gUgmz8oO0TOW
                                                              MD5:3404DD2B0E63D9418F755430336C7164
                                                              SHA1:0D7D8540FDC056BB741D9BAF2DC7A931C517C471
                                                              SHA-256:0D3FCA7584613EB1A38BAF971A7DD94F70803FC130135885EC675E83D16A4889
                                                              SHA-512:685D63633DB8A57D84225C2B92C92016E1CE98BA2BF8D3DDACE2EB120B3BCF84C718787D59DB6EC61F34CF91CB651500B4E4FF0AC37AEB89561CDCC586946C80
                                                              Malicious:false
                                                              Preview:..........+...........................&..........;.....;N....;.....;"....;.....;.....;N....;.....;.....;s....;....;.....;.....;....;4....;.....;.....;0....;.....;c....;7....;.....;.....;.....;.....;?....;:....;G....;.....;n....;x....;.....;.....;.....;#....;.....;.....;B....;.....;.....;.....;N....;.....;.....;+....;.....;% ...;c!...;.!...;."...;E+...;t4...;qH...;I\...;.]...;.^...;>a...;.c...;.g...;.o...;pw...;.|...;h....;.....;.....;....;.....;....;o....;.....;.....;.....;*....;y....;.....;.....;3....;9....;h....;.....;.....;.....;F....;."...;.+...;.0...;.8...;?:...;'X...;.q...;.....;....;.....;t....;.....;.....;.....;./...;.X...; m...;....;.....;.....;.....;+....;.....<O....<.....<.....<=....<2$...<y+...<.3...<.<...<aA...<.L...<.W...<.[...<._...<.d...<Dv...<t....<!....<....<....<.....<.....<.....<V....<.....<.#...<.8...<|F...<hP...<bW.. <i^..!<ts.."<(...#<{...)<`...*<c...+<d...,<"...;<x...<<k...=<....><-...?<....@<....A<'...B<g...C<....D<U...E<....F<....G<....J<....K<....L<v%
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1017158
                                                              Entropy (8bit):7.951759131641406
                                                              Encrypted:false
                                                              SSDEEP:24576:m3Tl5zLmmibkFR8+mZRUumegvQtc05UwvdAbatzk6edhOLoe9:m3Tl53mNbkFRJmHURhQW05JvdlzkjrOH
                                                              MD5:3FBF52922588A52245DC927BCC36DBB3
                                                              SHA1:EF3C463C707A919876BF17C3E1CD05C0D2C28CA9
                                                              SHA-256:C6FE346106C5E4950161ED72EB0A81FE3537A94E4A59461AAF54E750D1904F76
                                                              SHA-512:682EB6D61B564C878FDB971A6439FCDA9F1E108BD021A32E8990B68B1338986A4866A0965DEA62567501C8826D43CEBF2B7C8BE8323DE415A75E8D89A9D592E7
                                                              Malicious:false
                                                              Preview:..........+.....................b................;.....;&....;.....;.....;.....;.....;b....;....;8....;.....;.....;o....;....;<....;.....;.....;l....;....;/....;.....;[....;Q....;.....;j....;.....;.....;L'...;.E...;lZ...;.o...;.q...;.r...;.s...;.{...;.{...;.~...;"....;.....;U....;.....;.....;.....;....;d....;.....;.....;i....;.....;f....;....;0....;.....;.....;.(...;+*...;.+...;A....;54...;.9...;,O...;.`...;.n...;.~...;.....;.....;M....;....;;....;q....;Z....;.....;.....;.-...;\=...;.P...;.d...;@|...;.....;Y....;#....;_....;/....;.....;.#...;.;...;.J...;gc...;cf...;W....;....;W....;.....;.....;.....;7....;.-...;.I...;Y\...;W....;....;.....;S....;.....;t....;.....;.....<W....<.&...<9<...<iG...<jQ...<.X...</a...<gi...<.n...<Pz...<.....<f....<.....<I....<.....<.....<.....<4C...<4d...<....<....<.....<.....<.....<D8...<.e...<_....<....<.... <I...!<...."<.E..#<.E..)<.G..*<%j..+<N...,<....;<....<<v...=<....><....?<....@<y...A<....B<....C<....D<....E<"F..F<.J..G<.O..J<.X..K<.e..L<.r
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1174528
                                                              Entropy (8bit):6.475826085865088
                                                              Encrypted:false
                                                              SSDEEP:24576:I3lp87thPKuxyj+tWF8lCwOvzr90p5OM3:FauY+tWF8b5OM3
                                                              MD5:207AC4BE98A6A5A72BE027E0A9904462
                                                              SHA1:D58D2C70EA0656D81C627D424F8F4EFCCEF57C86
                                                              SHA-256:2BA904DA93ACC4766639E7018AC93CC32AA685DB475F3A59B464C6BC8B981457
                                                              SHA-512:BFB6C58774829DB3D5FADC92CB51477FF4EAC8FB934DB6583A312BB1157468F6DD3A4A3AFAF25A687B74890DC8A69857A12D0B38B18D83E82836E92E02046FF3
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....v...p......P.....................................................@A........................vT......AX..<.......x...........................<<.......................;......(...............<[.......O.......................text....u.......v.................. ..`.rdata..\............z..............@..@.data...H...........................@....00cfg...............F..............@..@.crthunk.............H..............@..@.tls.................J..............@...CPADinfo(............L..............@...malloc_h.............N.............. ..`.rsrc...x............P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):2106216
                                                              Entropy (8bit):6.4563314852745375
                                                              Encrypted:false
                                                              SSDEEP:49152:DpX9JVeE9HP6Zpy9KyhMI50Du8LljslNsHSHFUq9OiapbbO5Akb:H3P9HP6Zpy9KyhMI50Du8LljslNsyHiS
                                                              MD5:1C9B45E87528B8BB8CFA884EA0099A85
                                                              SHA1:98BE17E1D324790A5B206E1EA1CC4E64FBE21240
                                                              SHA-256:2F23182EC6F4889397AC4BF03D62536136C5BDBA825C7D2C4EF08C827F3A8A1C
                                                              SHA-512:B76D780810E8617B80331B4AD56E9C753652AF2E55B66795F7A7D67D6AFCEC5EF00D120D9B2C64126309076D8169239A721AE8B34784B639B3A3E2BF50D6EE34
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.h...;...;...;..];...;...;...;.._;...;..h;0..;..i;'..;..X;...;..l;D..;?M.;...;..Y;...;..^;...;Rich...;........PE..L...92.K...........!.........d...............................................p .....O. ...@.........................@.......@...P..................... .h............................................i..@............................................text...S........................... ..`.data....~.......B..................@....rsrc................(..............@..@.reloc..D............,..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):4127200
                                                              Entropy (8bit):6.577665867424953
                                                              Encrypted:false
                                                              SSDEEP:49152:OS7PQ+besnXqRtHKzhwSsz6Ku1FVVOsLQuouM0MeAD36FqxLfeIgSNwLTzHiU2Ir:O4PhqqFVUsLQl6FqVCLTzHxJIMd
                                                              MD5:3B4647BCB9FEB591C2C05D1A606ED988
                                                              SHA1:B42C59F96FB069FD49009DFD94550A7764E6C97C
                                                              SHA-256:35773C397036B368C1E75D4E0D62C36D98139EBE74E42C1FF7BE71C6B5A19FD7
                                                              SHA-512:00CD443B36F53985212AC43B44F56C18BF70E25119BBF9C59D05E2358FF45254B957F1EC63FC70FB57B1726FD8F76CCFAD8103C67454B817A4F183F9122E3F50
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!7P.OdP.OdP.Od..NeR.OdP.Nd..OdY..dU.Od.Jem.Od.KeQ.Od...dQ.Od..Leo.Od..Je..Od..OeQ.Od..Ge..Od..Kec.Od...dQ.Od..MeQ.OdRichP.Od................PE..L..................!.....2<..*...............P<...............................?.......?...@A.........................<<.u.....=.P.....=.@.............>..%....=.........T....................u..........@.............=..............................text...e0<......2<................. ..`.data...`"...P<......6<.............@....idata........=.......<.............@..@.rsrc...@.....=.......<.............@..@.reloc........=.......<.............@..B........................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):2205743
                                                              Entropy (8bit):7.923318114432295
                                                              Encrypted:false
                                                              SSDEEP:49152:qHlbrhXKMVp/DVegxF2Xe1WFG4F3KMWB7rwz3yY+23:qFnhXKwggr0cWEgaMi7rwrw23
                                                              MD5:54D4E14BFF05C268248CAB2EEDFB61DD
                                                              SHA1:33AF472176F6E5FB821FFE23C9FBCCC7C735B5B9
                                                              SHA-256:2CAC401BFFA9FD4DFFE11E05EE18FC5CA7A30EC5BF7EF6A3EA8518A4F3344790
                                                              SHA-512:5A6893E7EA30EAA0EFF44687B0D15366A8224E476E4AE8FE0D5C7EF2B3C62E6B0184F73EAD36C4E4E08D6936524CEF8429660B3EC29453EED128E3C5368CE78C
                                                              Malicious:false
                                                              Preview:........K....[.....[.....[.....[Y....[.....[.....[.....[.....[P ...[.!...[."...[.#...[.$...[.%...[.%...[T&...[0'...[/(...[.(...[.(...[.*...[.+...[{,...[1-...[.-...[3....[b/...[.0...[.1...[.2...[.3...[,4...[.4...[P5...[.5...[#6...[!8...[.8...[.9...[.9...[::...[q;...[Y=...[.=...[ ?...[.@...[0A...[iB...[?D...[.E...[pE...[UF...[.G...[.H...[)I...[.I...[.M...[.M...[DN...[.N...[FO...[.O...[.Q...[oV...[uW...[cX...[[\...[.]...[Ea...[bc...[.c...[ d...[.d...[oe...[.f...[.h...[.i...[Xj...[.k...[.l...[An...[.o...[.p...[.....[....[.....[.....[.....[.....[[!...[.%...[d....[x1...[.4...[.4...[.9...[.C...[.Q...[KS...[#V...[=]...\.b...\.z...\Q}...\.....\.....\*....\`....\.^...\7b...\uy...\g....\.....\.....\=....\....\....\....\'....\.....\....\.... \....!\...."\....$\....%\....&\....)\....*\....+\.Q..,\.S..-\.U...\..../\w...0\....1\8...2\....3\....4\....5\....6\....7\.T..8\.z..9\6...:\....;\c...<\)&..=\.*..>\>5..?\JU..@\.r..A\....B\9...C\....D\S...E\....F\\y..G\Y...H\%...I\....J\M...K\.a..L\.j..M\.n
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):10717392
                                                              Entropy (8bit):6.282534560973548
                                                              Encrypted:false
                                                              SSDEEP:196608:hpgPBhORiuQwCliXUxbblHa93Whli6Z86WOH:n8wkDliXUxbblHa93Whli6Z8I
                                                              MD5:E0F1AD85C0933ECCE2E003A2C59AE726
                                                              SHA1:A8539FC5A233558EDFA264A34F7AF6187C3F0D4F
                                                              SHA-256:F5170AA2B388D23BEBF98784DD488A9BCB741470384A6A9A8D7A2638D768DEFB
                                                              SHA-512:714ED5AE44DFA4812081B8DE42401197C235A4FA05206597F4C7B4170DD37E8360CC75D176399B735C9AEC200F5B7D5C81C07B9AB58CBCA8DC08861C6814FB28
                                                              Malicious:false
                                                              Preview:...'........CmnD........ Copyright (C) 2016 and later: Unicode, Inc. and others. License & terms of use: http://www.unicode.org/copyright.html ......E.......E.......E..P/...E.../...E..P7...E...7...E...h...F...h.. F..Pi..0F......DF.....WF.....jF..P...}F.......F..`....F.......F.. ....F.......F..0....F.......G......G......(G.....;G..@...NG......aG.....tG.......G.......G..@....G.......G.......G.......G..P....G.......H.......H..P...2H......EH..`...UH......hH......yH..P....H.......H.......H..`....H.......H.......H..P....I.......I......-I..@...=I......PI......aI..@...uI.......I...0...I.. 1...I..p1...I...e...I...e...I...i...I..`i...J...i..)J...K..BJ..p...^J..."'.uJ..P.'..J....'..J...5'..J..06'..J...>'..J..P?'..K...D'..K...F'.0K...H'.IK...V'.hK....(..K....(..K..P.)..K....)..K..pW*..K..P.*..L...*+.?L..p.+.bL....+..L...U,..L....,..L....,..L....,..L..@.,..M....,.-M..P.-.IM.. e-.`M...e-.~M...R/..M.../..M..0.0..M..@.0..M..P.0..M....0..N....0.!N...,0.9N...,0.NN..0-0.fN...-0.vN...Y0..N...Z0..N..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):377856
                                                              Entropy (8bit):6.602916265542373
                                                              Encrypted:false
                                                              SSDEEP:6144:oJ4tr7XVkL/2qBCOeRMIKVpqtXmzKwdo23zqyU73omBT095OiZH:2NfBCOeR/KVpqtio23zqyOsOo
                                                              MD5:8BC03B20348D4FEBE6AEDAA32AFBBF47
                                                              SHA1:B1843C83808D9C8FBA32181CD3A033C66648C685
                                                              SHA-256:CBEE7AC19C7DCCCA15581BD5C6AD037A35820DDFE7C64E50792292F3F2E391E6
                                                              SHA-512:3F9EEC2C75D2A2684C5B278A47FB0E78B57F4F11591FAC4F61DE929F716BBAA8F7DF05E10390408AD6628538611541548C26869822372E9C38D2C9C43881651E
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....`...`............................................... ............@A........................8,..h....:..(.......x........................>..........................D........p..............(<..`............................text....^.......`.................. ..`.rdata..L....p.......d..............@..@.data....4...p.......`..............@....00cfg...............|..............@..@.tls.................~..............@....rsrc...x...........................@..@.reloc...>.......>..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6635008
                                                              Entropy (8bit):6.832077162910607
                                                              Encrypted:false
                                                              SSDEEP:196608:HrmMLEFtac5bM68f8Oi3WjH13GzSW3430aTwQCe:a+ktad68f8Oi3oH13GztokaTwbe
                                                              MD5:63988D35D7AB96823B5403BE3C110F7F
                                                              SHA1:8CC4D3F4D2F1A2285535706961A26D02595AF55C
                                                              SHA-256:E03606B05EEAED4D567EA0412350721C0D566B3096B18C23BD0B3FCDE239E45A
                                                              SHA-512:D5F5ACA00BE9E875FCD61531CC7F04F520FB12999E36E4FE06BEAAE491B47D2E9FE182015DB1CBFBB8E78CF679F2EB49E20ECDF1B16D1D42058D6F2D91BC3359
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!......L...........@.......................................e...........@A.........................].......^.d.....a.......................a.."...U]......................T].....X.L.............H.^.@.....].@....................text.....L.......L................. ..`.rdata...I....L..J....L.............@..@.data...X....._.......^.............@....00cfg........a.......a.............@..@.tls..........a.......a.............@....rsrc.........a.......a.............@..@.reloc..."....a..$....a.............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):176517632
                                                              Entropy (8bit):7.025874989859836
                                                              Encrypted:false
                                                              SSDEEP:1572864:VSuR7JVHywK/Sf1rWID4Pu2v8zgguHWJEqM90Hw4DclJkBLrWXmfnehuWNIPKtlL:MCYRNIPKYTFBhfmOS9KBaVz
                                                              MD5:F5259CC7721CA2BCC8AC97B76B1D3C7A
                                                              SHA1:C2FC0C8396D8CD6764809A2A592972E2EBCA64BA
                                                              SHA-256:3FE6A262EF01CB8FD4DC2D4373DE0F1F0A89EE51953452ED4557CB55F1DA9AB4
                                                              SHA-512:2D01B1F2B24717EFF37965BBC32D167434A65F3DFFF74342D2E2FA8FBB0E97C3F61FDF673A13AD63031D630D9CE46A6F9F0C4F89EBD30C31F3EA55817B9D1331
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.........N.......k....................................................@A........................#..........h....0J.(C....................L.|.\.P................................?..............`.......LY..@....................text............................... ..`.rdata...%2..0...&2.................@..@.data...dr+..`.......>..............@....00cfg........I.......&.............@..@.rodata.@.....I.......&............. ..`.tls..........J.......&.............@...CPADinfo(.....J.......&.............@...malloc_h..... J.......&............. ..`.rsrc...(C...0J..D....&.............@..@.reloc..|.\...L..0\..B).............@..B........................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:current ar archive
                                                              Category:dropped
                                                              Size (bytes):40258
                                                              Entropy (8bit):4.547436244061504
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:310744A0E10BD9C2C6F50C525E4447F9
                                                              SHA1:9BA62D6AC2CB8EFF46C9B21051677FC1DC66D718
                                                              SHA-256:E9C55CFF925E26812139CDCAD6612E0D69E317CB7BB1435C9EB5113D338ACCE7
                                                              SHA-512:6DF9E3F9AFD7CDEC750B006987E5AEC445E163DD0B9CF1A9EA53F78DB2EE5FD654E3B4F82BCA3E1F4BEDB189F5DFA51189C820905676AD048DBE2E0AD405BF5B
                                                              Malicious:false
                                                              Preview:!<arch>./ 0 0 0 0 14390 `.......8z..:&..:...;...;...<&..<&..<...<...=...=...=...=...>...>...>...>...>...>...?f..?f..?...?...@B..@B..@...@...A$..A$..A...A...B"..B"..B...B...C...C...C...C...D...D...D...D...D...D...E...E...E...E...Fn..Fn..F...F...GZ..GZ..G...G...HJ..HJ..H...H...I$..I$..I...I...J...J...J...J...K ..K ..K...K...L...L...L...L...M...M...M...M...N...N...N|..N|..N...N...Od..Od..O...O...P`..P`..P...P...QP..QP..Q...Q...RT..RT..R...R...S@..S@..S...S...T...T...T...T...U...U...Un..Un..U...U...VP..VP..V...V...W,..W,..W...W...X...X...X...X...X...X...Y\..Y\..Y...Y...ZB..ZB..Z...Z...[,..[,..[...[...\...\...\...\...\...\...]b..]b..]...]...^N..^N..^...^..._6.._6.._..._...`$..`$..`...`...a...a...a...a...b...b...b...b...c...c...c...c...c...c...dj..dj..d...d...e^..e^..e...e...fV..fV..f...f...g8..g8..g...g...h*..h*..h...h...i"..i"..i...i...j...j...j...j...k...k...k...k...l...l...l...l...l...l...mh..mh..m...m...nN..nN..n...n...o2..o2..o...o...p...p...p.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):470498
                                                              Entropy (8bit):5.409080468053459
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:64F46DC20A140F2FA3D4677E7CD85DD1
                                                              SHA1:5A4102E3E34C1360F833507A48E61DFD31707377
                                                              SHA-256:BA5CA0A98E873799A20FD0DF39FDB55AAB140E3CC6021E0B597C04CCE534246D
                                                              SHA-512:F7D789427316595764C99B00AF0EF1861204F74B33F9FAB0450F670CB56290C92BFB06EF7D1D3B3BF0B6ACDC6295E77F842C49579BD9973E3D5805920CDB2527
                                                              Malicious:false
                                                              Preview:........$$..e.>...h.F...i.N...j.Z...k.i...l.t...n.|...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................&...........5.....<.....C.....D.....E.....J.....W.....f.....w.................x.................A.......................S.........................................%.....{.......................V.......................J.......................Y.......................e.......................a.......................l...................................O.....f.......................).....z.......................6.....u.......................Q.......................E.....w.................!.....I.....R.............................l.......................f.................+.............................f.......................D.......................<......................._.......................2.....~.................2.....v.................X...........$.....8.................P.....r...........6.....j.....}.................1.....?...................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):763010
                                                              Entropy (8bit):4.909167677028143
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3B0D0F3EC195A0796A6E2FAB0C282BFB
                                                              SHA1:6FCFCD102DE06A0095584A0186BD307AA49E49BD
                                                              SHA-256:F9F620F599BC00E84A9826948C3DA985AC9ADB7A6FFB4C6E4FBEFEAF6A94CF85
                                                              SHA-512:CA9217F22C52EF44E4F25142D1AD5DD9D16E4CCC3B6641609E1F4C2650944E35BA4CAB59CA5CD9EA6FEFD6BE1D3E8227FC0E3E6BDEDD14B059CA2C72D096D836
                                                              Malicious:false
                                                              Preview:........>${.e.r...h.z...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.(...|.....}.@.....H.....M.....U.....].....e.....l.....s.....z.....{.....|...............................................F.....f.....'...........V...........Y.............................5.................F.................!.................d.....z...............................................C...........\.................z...........h...........3...........$.....C.................e.................i.................,.......................X.............................h.......................!.....|...........$.............................1.....}.........................................Z.................|...........'.....N...........F.................;.............................G.................v............ ....4 ..... ....X!.....!.....!....x"....."....Z#.....#....M$.....%.....%.....%.....&....+'.....'.....'.....(....D).....).....)....2*.....*.....*.....*.....+....",.....,
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):838413
                                                              Entropy (8bit):4.920788245468804
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:C70B71B05A8CA5B8243C951B96D67453
                                                              SHA1:DEED73A89F0B3EDAB8FF74117CC6B31CB4F426E8
                                                              SHA-256:5E0D4BC0893A334B6FFF610F66E4A00920530D73EC3257EB9D37A96EBD555C13
                                                              SHA-512:E000FD3592AC5FE700C4CE117868915C066AC66D5954A1DE4F5AFF0F4559C93F7DFF47623F1837CE827FFF94E91ECD89A974037BE9CCCC8E672E229A1E8115E9
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.!...n.)...o.....p.;...q.A...r.M...s.^...t.g...v.|...w.....y.....z.....|.....}.........................................................................-.....d.................n...........A...........u.......................O.......................D.................Y...........3.....J...........=.....g.....~.....&.................O.......................B.....!...........u...........5...........).....W.................3.....N.....U.....B...........!.........../.....Y........... .......................g...........).....I.................#.....A...........@.................6........... .....D...........I.................%.............................=.................?...................................G...................................).....t............ ..... ..... ..... ....o!.....!....6"....\"....."....S#.....#.....#.....$.....%....V&.....&....5'.....'.....(....J(.....(....X).....).....).....*....z*.....*.....*....t+.....,....{,.....,....--
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):869469
                                                              Entropy (8bit):4.677916300869337
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:12A9400F521EC1D3975257B2061F5790
                                                              SHA1:100EA691E0C53B240C72EAEC15C84A686E808067
                                                              SHA-256:B7FD85B33B69D7B50F6C3FDC4D48070E8D853C255F2711EEDAA40D1BA835F993
                                                              SHA-512:31EAA1CBF13BC711750B257C6B75813ACC8E4E04E9262815E399A88B96BA7B5BE64CE2450638B5521D5CB36750C64848944168C3234D2CE15A7E3E844A1E1667
                                                              Malicious:false
                                                              Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....L.....n...................................I...........Q...........q.......................T.................E.......................7.....~...........<.................:.....&...........F.................X...........$.................Z...........X...........m.................C.........................................{...........:.....a...................................8................._...........O.....}...................................$.....h.........................................2.............................3 ....e .....!.....!.....!.....".....".....#....W#.....#....{$....-%.....%.....%.....&....k'.....'....T(.....).....).....).....).....*....`+.....+.....+.....,....p-.....-....&....../...../.....0.....0.....1....o2.....2....73.....4.....4.....4....-5.....5....X6.....6.....6.....7.....8.....9
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1118348
                                                              Entropy (8bit):4.2989199535081895
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:89A24AF99D5592AB8964B701F13E1706
                                                              SHA1:2177122C6DCC20E1D07EF43AF5A112E8E5C6B95B
                                                              SHA-256:5BDBBCD0D07B6AE3A7F96F07871EE541F4111D90D73FD6E112C5ABE040025C96
                                                              SHA-512:60F6CD73BF35886EF54FA6200F86BCED78DD11F612C8071F63EB31108F109C166D45609879E8E5107024A025BAFCFCF1C80051B6D8FF650D92DCF17136384EB1
                                                              Malicious:false
                                                              Preview:........($..e.F...h.N...i._...j.k...k.z...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......#.....(.....0.....8.....=.....E.....L.....S.....Z.....[.....\.....a.............................=.....G...........?.....4...........................................................B.....}.....>...........k...........X...........].............................q.....W...................................W...........S...........e.............................I.....m.....e..........._.....(.................9...........q.................p...........5.....X.....8...........Q...........M...........I.....u.....-...........!.....G............ ..... ..... .....!....P".....".....".....#.....%.....%.....&.....'.....'....^(.....(....;).....).....*....6*.....+.....+....1,....],....E-................-/...../....x0.....0.....0.....1.....2.....2.....3...."4.....4....x5.....5.....6....78....*9....]9.....:.....;....;<.....<.....=....?>.....>.....>.....?....y@.....@.... A....&B.....B
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):537139
                                                              Entropy (8bit):5.397688491907634
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:37B54705BD9620E69E7E9305CDFAC7AB
                                                              SHA1:D9059289D5A4CAB287F1F877470605ED6BBDA2C8
                                                              SHA-256:98B2B599C57675EFC1456B38B23CE5657B142E0547F89AB1530870652C8EB4BA
                                                              SHA-512:42D667FEB59BB5FA619AC43DC94629ED1157CBE602643FB21378A2C524EF1F6E32098E7C62D3F3DE35D9FEDEF6607FE034908601AE3C49156CD0916E2514D2F9
                                                              Malicious:false
                                                              Preview:........%$..e.@...h.H...i.P...j.\...k.k...l.v...n.~...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}................... .....(.....0.....7.....>.....E.....F.....G.....I.....c.....|................._...........[.....z...........O.................D...........(.....G.................B....._.................A.....T.................8.....I...........3.....u...........(.......................p.................,.......................1.................T.....o.............................v.......................b.......................@.......................@.......................O.......................<.............................`.......................P.........................................M.......................H......................._.........................................n.......................Q.......................[.............................1.................>.........................................6.............................|...........".....>.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):545011
                                                              Entropy (8bit):5.844949195905198
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:65A2C2A73232AB1073E44E0FB6310A5F
                                                              SHA1:F3158AA527538819C93F57E2C778198A94416C98
                                                              SHA-256:E9A1610AFFCA9F69CD651C8D2EDD71B5A0F82CB3910A8A9D783F68E701DB5BB0
                                                              SHA-512:20ED527F3BBBA2CECE03D7B251B19D6DCC9D345B5425291D8139FCDD5646EC34D585891160CC4BD96C668D18FFFFDD56F4D159880CFC0D538749F429F7F65512
                                                              Malicious:false
                                                              Preview:.........$..e.....h.&...i.....j.:...k.I...l.T...n.\...o.a...p.n...q.t...r.....s.....t.....v.....w.....y.....z.....|.....}.................................................#.....$.....%.....'.....7.....I.....[.....p.............................|.................%...........(.........................................3......................./.......................2.......................z...........I.....k...........R.......................v................./.......................z...........=.....W.................&.....=....................... .....o.......................^.......................r.......................m.......................b.......................z.................0...........%.....i.......................3.....G.......................(.......................1.................R................./.....J.....^...........A.....q.................`.................,...................................V.....w...........Z.......................O.....t.................b.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):496165
                                                              Entropy (8bit):5.446061543230436
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:A44EC6AAA456A6129FD820CA75E968BE
                                                              SHA1:9B5B17AFD57ADB8513D2DA9A72223E8A003975A5
                                                              SHA-256:F01F9C3E4E6204425F2969F77BF6241D1111CE86CDD169BDF27E5D2D4B86C91A
                                                              SHA-512:947DB81EA64009CC301CD2DCE06384202E56446F6D75E62390334B91D09B564CB0681E06BF7A945033BD6C28C2171346A91EE16693262C4E373A31B51AD42A9E
                                                              Malicious:false
                                                              Preview:........,$..e.N...h.V...i.g...j.s...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.".....*...../.....7.....?.....G.....N.....U.....\.....].....^.....`.....n.....~.........................................Q.............................*.....q.................].......................P.....w.................8.....b.....p...........9.....h.................n.................7.......................^............................. .....p...................................q.......................X.......................1...............................................".............................{.......................Z.......................C.....p.....~...........y.................4.............................l.......................I.....f.....v...........^.................................................................F.......................B...................................O.....~...........J.....z.................$.....@.....M.................F.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):534726
                                                              Entropy (8bit):5.49306456316532
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:49CA708EBB7A4913C36F7461F094886B
                                                              SHA1:13A6B5E8DC8B4DF7A976A0859684DC0AA70F1B12
                                                              SHA-256:8AE7D6B77C51A4FE67459860ABDAE463F10766FAF2BA54F2BB85FD9E859D2324
                                                              SHA-512:6908F96BFDF7499B33E76697AA96103E89ACB3E25EDBD6156B610564AF14D4ED474C547A760503490B6327A801478E223039836BEEF2B938AF76827A15C0F751
                                                              Malicious:false
                                                              Preview:.........#..e.~...h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.%...y.+...z.:...|.@...}.R.....Z....._.....g.....o.....w.....~.................................................................X.................E...................................^.....x...........n................./.......................Z...................................U.....w.............................h...........&.....7...........9.....w........... ................. ..........._.................D.......................U.......................h...................................a.....x...........f.........................................F.......................u...........).....;...........j.................A.......................;.......................9.......................t...........,.....`...........-.....K.....b...........G.....s.................}.................T...........,.....6...........S................./.......................K.......................t...........*.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):950999
                                                              Entropy (8bit):4.76377388695373
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:9CBC320E39CFF7C29F61BD367C0BF3BB
                                                              SHA1:2AF07EFFF54A0CF916CF1C0A657F7B7ADF2029FF
                                                              SHA-256:E8837DEFA908EB2FD8B4EB6344412C93403A4258F75EC63A69547EB06A8E53B3
                                                              SHA-512:F7D84185F4520E7AAF3F3CACF38B53E9638BB7D5023FA244020EC8D141FFD5C10B198FF089824D69671FE8350F931B0BB19B6CAF14AF47B0838953367A146DD0
                                                              Malicious:false
                                                              Preview:........)$..e.H...h.P...i.X...j.b...k.q...l.|...n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...................&...........6.....=.....D.....K.....L.....M.....O.....v.......................5...................................V.................h...........F.....i...........~...........{...........a...........'.................&.......................M.....U.....O............................./.....J.....1..........._...........{.....6................. .............................g.......................<.................J...........8.....t.....O.....).......................U............................................................ ..... .....!.....!.....".....#.....$.....$.....$.....%....|&.....&.....'.....'....;(....t(.....(....M).....)....;*....h*....U+.....,.....,.....,.....-....8.....t...........f/....(0.....0.....0.....1....S2.....2.....3....64....Q5.....6....@6....A7....(8.....8.....8.....9.....:....o;.....;....[<....%=.....=.....=.....>.....?....6@
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):430665
                                                              Entropy (8bit):5.517246002357965
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:0F1E2BC597771A8DB11D1D3AC59B84F3
                                                              SHA1:C1F782C550AC733852C6BED9AD62AB79FC004049
                                                              SHA-256:E4798E5FF84069C3BFD7D64734CCD9FF5C8A606315B44A714ACDCABDDAF3CA6E
                                                              SHA-512:07E9B98357C880995576059AD4E91E0F145DC0F2FFF2DFDAD8649FA42EB46FA86F7F093503C41019EAD4550784E26C553D171518355FBBF995E38B1F6D7ABFF0
                                                              Malicious:false
                                                              Preview:.........$ .e.(...h.0...i.>...j.J...k.Y...l.d...n.l...o.q...p.~...q.....r.....s.....t.....v.....w.....y.....z.....|.....}.....................................%.....,.....3.....4.....5.....:.....G.....V.....f.....w...........J.......................H.....y.................I.......................@.....o.......................?.....M............................._.......................B.......................8.............................[.......................*.....V.....a...........*.....l............................. .....^.............................A.....b.....n.................H.....[.......................+.....t.......................5.....y.......................:.....c.....n...........'.....d.....y.................).....?.............................G.............................].......................4.....O.....^.................6.....F.................#.....;.................V.....d...........$.....[.....x.................F.....U.............................k.............
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):434598
                                                              Entropy (8bit):5.509004494756697
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:FEAB603B4C7520CCFA84D48B243B1EC0
                                                              SHA1:E04138F1C2928D8EECE6037025B4DA2995F13CB4
                                                              SHA-256:C5B8FBDBB26F390A921DCACC546715F5CC5021CD7C132FD77D8A1562758F21F4
                                                              SHA-512:E6B3970A46D87BFD59E23743B624DA8116D0E1A9912D014557C38FD2664F513E56317AFA536DF52E7E703863FBD92136BE57EE759A2FFC2958AB028F6287E8B7
                                                              Malicious:false
                                                              Preview:.........$..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.,...y.2...z.A...|.G...}.Y.....a.....f.....n.....v.....~.................................................................G.......................\.......................Q.......................T......................./.....t.......................7.....^.....k.................".....9.................!.....9.............................i.......................7.......................!.............................K.....f.....u.............................Y.............................k.......................G.....t.......................7.....B.............................J.......................$.....~.......................^.............................=.....R.............................q.......................X.............................X.......................7.....o.................X.......................k.......................a.......................!.....C.....S.................,.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):524728
                                                              Entropy (8bit):5.377464936206393
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:32A59B6D9C8CA99FBD77CAA2F586509A
                                                              SHA1:7E8356D940D4D4CC2E673460483656915AA59893
                                                              SHA-256:AA4A5AA83DD5F8476867005844F54664DB1F5464A855EF47EC3A821DAF08E8F2
                                                              SHA-512:860BA06228BBA31EEC7EB8BD437DDB6E93BABD0129033FB6EFF168F2FB01B54E2B93D2AB50A5D4F5D2FB7B04A5D0DD5541999D708CC2613B74AADD17B3E98735
                                                              Malicious:false
                                                              Preview:........5$..e.`...h.h...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....j.....|.......................J...........>.....Y...........1.....v..........."...................................L.....g.................4.....G.................,.....=...........7.....}...........6...................................6.....I.................\.....s..........._.................Z...........2.....Y.......................:.......................".......................0.................R.....e...........).....g.....s.................P.....[.................4.....>.................L.....\...........O.................!.....v.................+.....x.................i.................:.................2.......................!.......................0.................I.....c...........x.............................B.....p...........V.......................G.....j.....}...........n.............
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):523181
                                                              Entropy (8bit):5.356449408331279
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3D1720FE1D801D54420438A54CBE1547
                                                              SHA1:8B1B0735AE0E473858C59C54111697609831D65A
                                                              SHA-256:AE32D66C0329104B9624BA0811FE79149D1680D28299440EC85835DBA41C7BD2
                                                              SHA-512:C033BBB5261EC114DCB076EDB5E4B3293F37D60C813674A947F996606A6289204C04D2E4315356D92EEEB43FF41D534997DBEBBF960B17F2F24AA731AFE4B7E1
                                                              Malicious:false
                                                              Preview:........5$..e.`...h.h...i.p...j.|...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.+.....3.....8.....@.....H.....P.....W.....^.....e.....f.....g.....i.....|.......................O...........G.....b...........D.................0........... .....:.................Y.....t.........../.....^.....n...........0.....X.....i...........c.................W...................................I.....Z...........*.....f.....{...........o.................g...........+.....P.................8.....N.................".....1.................*.....@.................?.....R.................;.....G.................%.....0.............................y...................................D.....^.................@.....].................5.....T...........;.....`.....s...........h.................M.......................A.......................W.............................&.................)...................................A.....U................. .....3.................D.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):475733
                                                              Entropy (8bit):5.456553040437113
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:C00D66D3FD4FD9D777949E2F115F11FB
                                                              SHA1:A8EAAD96CABCDFB7987AF56CB53FA5E16143EC48
                                                              SHA-256:26C438935E3F666329EE8D1DABA66B39179BCF26EBAC902F9B957A784BDC9B4A
                                                              SHA-512:E7E8C083B556DD05874AC669B58A4D1CD05D1E1B771EB4C32942869E387C6FA2B317B5F489138BD90135117DAEB051D96A7823B531DF0303BD4245A036F25A20
                                                              Malicious:false
                                                              Preview:........@$y.e.v...h.~...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.#...z.2...|.8...}.J.....R.....W....._.....g.....o.....v.....}.....................................................S...........J.....e...........4.....d.....w...........Y.......................u.......................m.......................\.......................[.........................................7.......................;.......................K.......................x...........;.....R.................9.....T................. .....,.............................w...........#......................./.....=.................'...../.................".....1.................$.....,.................O.....g.................4.....J.................,.....O.................4.....A.................=.....i.................&.....7.................#.....;.................?.....Z...........U.................C...................................@.....M...........................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):773397
                                                              Entropy (8bit):5.04618630633187
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:C998140F7970B81117B073A87430A748
                                                              SHA1:8A6662C3AABDAC68083A4D00862205689008110C
                                                              SHA-256:182F18E4EFCA13CA59AFD1DF2A49B09733449D42526EE4700B11A9C5E6AAC357
                                                              SHA-512:5A947A44F674F9556FDD44D2E4FF8CF0E0AAC4475FFA12480CA1BD07CFE7514961B7CACE6760189432B4B4BEB5EA5816701158EB3CB827A806F3063853C46D5E
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.#...s.4...t.=...v.R...w._...y.e...z.t...|.z...}...............................................................................-.....T.....9.......................^...........u..........._.............................H.................a...........S.....f...................................?.................j..........._.............................'...........f.......................I.......................v.............................Q.....u...........}.................S...........).....@...........x.................m...........M.....d...........p.................H.................:...........`.................`...........l...............................................s...........C...........0.....P.......................;...........1 ....V ....q ....+!.....!....'"....I"....."....|#.....#.....#.....$.....%.....&.....&....j'.....(....l(.....(....W).....)....M*....p*.....*....n+.....+.....+....d,.....-....P-....x-
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):483378
                                                              Entropy (8bit):5.428549632880935
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:1CFD31A6B740D95E4D5D53432743EBF1
                                                              SHA1:20CEEEA204150BD2F7AAE5866C09A3B0AE72D4C5
                                                              SHA-256:F821E06B4BACD9E7660A2D6912A049591FFD56C6D2A0A29B914648589B17B615
                                                              SHA-512:C483B7347F91BE8EE515DCF352A1D7502B9A159EDE35EACCEBAA763B93A625BCE2D0C7D598C2A6111092257D6DAC7A167102E956697210D4694B9812D70C8A94
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.%...v.:...w.G...y.M...z.\...|.b...}.t.....|.....................................................................................................^.....q...........7.....j.....}...........Z.......................~.......................s.......................D.....d.....t........... .....F.....`...........C.......................Q.....}.................S.......................T.........................................E.............................k......................./.....P.....\.................).....3.............................p.......................L.......................0.......................%.......................B.............................g.......................e.......................d.......................M.....d.....s...........*.....T.....f...........".....[.....u...........x.................I.......................Y.......................4.....v.......................S.....~.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):546749
                                                              Entropy (8bit):5.197094281578282
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:6EDA0CD3C7D513AAB9856EC504C7D16F
                                                              SHA1:BA24C4B994E7866F2C012CCEC6C22DFC1A4FCFF6
                                                              SHA-256:3CD2BC9E887663C5E093E0334BC60CF684655A815E3DE7AD9A34BAD5EBB858B1
                                                              SHA-512:47000F5EA882CB9EDDCF4FB42ED229423EE55AA18B4A4353D7EF85ADFA7E1B0BBB33C2469887224D7146B3E33FB2296749CD053D68D7DAF26980BC710A27C63E
                                                              Malicious:false
                                                              Preview:.........$..e.@...h.H...i.^...j.j...k.y...l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.......!.....&...........6.....>.....E.....L.....S.....T.....U.....Z.....g.....|.................K...........:.....X...........O.................Q...........>.....e...........Z.......................~.................%.......................h.................H...........^.................M.................!.................H.....b...........].................V...........B.....d...........#.....N.....k.................A.....N.................,.....;.................S.....i...........5.....k.....z...........=.....o.....}...........>.....o.....}...........@.....r...................................R.......................L.......................<.......................e.................U.................F.....`...........>.....q.........................................%.................4.................4.................J.....b.................B.....X...........N.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):568277
                                                              Entropy (8bit):5.380723339968972
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:D185162DF4CAC9DCE7D70926099D1CF1
                                                              SHA1:46594ADB3FC06A090675CA48FFA943E299874BBD
                                                              SHA-256:E40C07183A32B75930242F166C5AAE28F4CD769BB2268391BEAA241814E7D45A
                                                              SHA-512:987D9CC6AD5F2ED6A87537FDADF105F6EB31A97B11156E70814FE021047E5D8D08398F008812038DF3CCDCB6254BF5B744D9982FE04F79D407AC2F53BB046E25
                                                              Malicious:false
                                                              Preview:.........$..e. ...h.(...i.9...j.E...k.T...l._...n.g...o.l...p.y...q.....r.....s.....t.....v.....w.....y.....z.....|.....}..................................... .....'.........../.....0.....2.....B.....P.....b.....q.................6.....X...........?.................'.................(.................W.................4.....`.....p...........D.........................................{...........(.....L...........*.....i.....{...........S.........................................}...........i.................N.......................H.....r.................N.......................f.......................}.......................x.......................e.......................d.................+.................&.......................8.....~.......................k.................0...........;.......................f.........................................d.................6...........4................."...................................R.....k.................G.....[...........G.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1103776
                                                              Entropy (8bit):4.336526106451521
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:44F704DB17F0203FA5195DC4572C946C
                                                              SHA1:205CBCC20ADCCCF40E80AA53272FBA8CD07389CA
                                                              SHA-256:4B073F08F0C8C035974B5EC43AA500F8BDD50E6CFE91A2FB972A39E0F15ECEDD
                                                              SHA-512:3CFD4501556845141EE9B461C831CA59779AD99F0E83E8D03433DE78D774378E87DE752DD9711C112A0C584259AD1DA6DC891D92F3F447F63A4D84263CD5BFCE
                                                              Malicious:false
                                                              Preview:........4$..e.^...h.f...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.#...|.)...}.;.....C.....H.....P.....X.....`.....g.....n.....u.....v.....w.....|.......................&.....b....._.....0.....l....._..... ...............................................a.......................G.................r...........\.....|....._...........z.......................V...........n.....B...................................7.....4...../.......................".......................4.....p...........P...........E.....m.......................................................................'...........}.......................C.................j .....!....u!.....!.....".....#....\$.....$....K%.....%....R&....{&.....'.....'.....'.....'.....(....b).....).....*....'+.....+....t,.....,.....-....9.....|............/....W0.....0.....0.....1.....2....33....f3.....4.....5.....6.....6.....7.....8....<9.....9....|:....H;.....;.....;.....<....s=.....=.....=.....?.....?.....@
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):681555
                                                              Entropy (8bit):4.658620623200349
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:E75086A24ECAA25CD18D547AB041C65A
                                                              SHA1:C88CE46E6321E4A21032308DFD72C272FB267DBD
                                                              SHA-256:55BE8A5ED9FB9C129AC45B7FC99574B9907350AFD024BAA5D07525F43E995F6B
                                                              SHA-512:01D7FDD90B8D0D3779B8442250E2AA767481B2E581F880BF9C3DCBB15FCE52E477B1881F3704FBCB3172DB77DB10241BCB24851BFE30066D1E9B66244B3C6877
                                                              Malicious:false
                                                              Preview:.........$..e.....h.....i.....j.'...k.6...l.A...n.I...o.N...p.[...q.a...r.m...s.~...t.....v.....w.....y.....z.....|.....}.........................................................................+.....D.....].....z.....?...........~...........).............................O.................T...........#.....E...........:.......................w.................W................./...........F.................V...........5.....T...........K.................3.............................o...................................E.........../.....a.....t.............................z...........,.....?...........5.....v.................q.................5.......................r.................1...........X.................I.......................y.................$.................k...........).................!.......................#.................7.....P...........e.......................e.............................w...........W ..... ....$!....K!.....!....7"....g"....."....@#.....#....-$
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1167065
                                                              Entropy (8bit):4.308980564019689
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:1FF8A0B82218A956D2701A5E4BFA84EF
                                                              SHA1:56BB8218963E14ADCC435F2455891F3A0453D053
                                                              SHA-256:62E7C3ABC317931723BE11ADD3712DD15EAAB0A35A4D8E7DB0B6347104EC5733
                                                              SHA-512:3330D983401953AA5ED4856A8D10FFCBEEFC2A4E594CF850566A0AD38837BC1164870BB1270B6BBE5D7DD6FB1ECA29CDE85869A5C51808B901CDC282E04764E4
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.%...n.-...o.2...p.?...q.E...r.Q...s.b...t.k...v.....w.....y.....z.....|.....}...............................................................................?.....j.............................................../.....j.........................................N.....}.....P...........^...........F...........A.....d.....K...........N.............................L.....&...........V...........f...................................L.....~.................{.................A.................y.....*.....}...........;...................................*.....[.................,.....K...................................j ..... ..... .....!....J".....".....".....#.....$....T%.....%....@&.....&....8'....d'.....'.....(.....(.....(.....)....6*.....*.....*.....+.....,.....-....c-......................%/.....0.....0.....1.....1.....2....i3.....4....B4.....5.....6.....7.....7.....9.....9....S:.....:.....;.....<....F=.....=.....>....N?.....?.....@.....@.....A....LB
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):526575
                                                              Entropy (8bit):5.518614920030561
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:0BD2F9847C151F9A6FC0D59A0074770C
                                                              SHA1:EA5313A194E9D99489E9F1D7B4DFC0BC986C8E17
                                                              SHA-256:5F2F1AA2E2EC78F375084A9C35275E84692EE68A1E87BBEF5A12A2C0FCF7F37A
                                                              SHA-512:0032C0B41FDF769DAA1AF23C443D4195B127DF9EA8621174F1AABDBAFAE4954383095FA1EEAD14FC458188B8837BBE9AECA0D5338E4D47F10D976FBED8609496
                                                              Malicious:false
                                                              Preview:........F$s.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.)...y./...z.>...|.D...}.V.....^.....c.....k.....s.....{.................................................................k...........Y.....z...........F.....~...................................e.......................y.......................m.......................l................. .................q................._.........................................A.............................4.......................j.......................D.....f.....w.................*.....:.................4.....I.................&.....5.................8.....M................. .....0.........................................S.....n.................0.....M.......................3....................... .................E.....v...........!.....F.....\...........).....[.....t...........U.................M...........(.....:...........".....`.................G.....v.................$.....B.....T...........0.....n.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):566819
                                                              Entropy (8bit):5.6387082185760935
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:4C27A1C79AB9A058C0A7DFFD22134AFD
                                                              SHA1:5F0A1B34E808B91ADB1E431E462D9FCF82F4FFF2
                                                              SHA-256:AD98C0A367B51EB217E69D66FA6A946946E85EC8452FC5A7AE0F179F35BE28C3
                                                              SHA-512:0F066DB5905EB24B6CB4FBC7C81F017B43AFB7A6E975886644D871E979406B990509905D100653496EE2D20969A77434B702FF1EA5D348274AE54EA597A91D5E
                                                              Malicious:false
                                                              Preview:.........$..e.....h.....i.!...j.+...k.:...l.E...n.M...o.R...p._...q.e...r.q...s.....t.....v.....w.....y.....z.....|.....}.........................................................................+.....A.....V.....j.................9.....W...........N.................*.................*...........".....X.....q...........K.....r.................Y.................?................."...........I.................7.......................k...........'.....7...........:................./.................:.................Z.....w...........O.....v.................f.................5.................(...........2.....u...................................M.................0...........6.....x...................................m.................)................. .....I.................O.....g...........c.................O.......................E.......................r...........'.....H...........v.............................l...........7.........................................5...........& ....q
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):466959
                                                              Entropy (8bit):5.379636778781472
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:1466C484179769A2263542E943742E59
                                                              SHA1:18E45A08661FD6D34BADE01CDB1E1D5184BA2B67
                                                              SHA-256:C331293D16B16B08DEF73BE73437845D58C593941320C547A377DB423749AEBB
                                                              SHA-512:ABC54D5CAAA663578F064E43CC0465BEB97EFC46991936708EBF3FCD64BD007E47072AB4834A5361B21F064BB0F6527E247BC2C2F0DFB8336F50C2FF3E15A59C
                                                              Malicious:false
                                                              Preview:........ $..e.6...h.>...i.O...j.[...k.j...l.u...n.}...o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.........................'...../.....6.....=.....D.....E.....F.....H.....V.....c.....s.................k................. .....l.......................l.................-.......................0.............................R.....s.................I.....x.................T.......................@.....j.....w.................L.....Y.................Z.....m...........H.......................%.....@.....Q.............................c.......................<.......................#.....t.......................L.....x.................%.....R.....^.................>.....K.................5.....G.............................J.......................".....h.......................L.....}.................#.....=.....K.................+.....:.................2.....K...........C.......................u.................,.....|.......................C.....b.....r...........1.....h.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):522800
                                                              Entropy (8bit):5.284113957149261
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:7767A70358D0AE6D408FF979DF9B2CD4
                                                              SHA1:9C57A5B068DC12AAF1591778DEF5D3696377EDAB
                                                              SHA-256:672908E77E9EACA793654C8E630442099DE3BE772FD3230A9C4045CAFBCC0B1E
                                                              SHA-512:913AA8C49D04CD84706D08A88453D1ED36FDE6A00F7C1DF63DECEA99316A8A234924457C0C50937329B3979E437B1C2D7796E63ADF209505E212FDCEAE3BFDB5
                                                              Malicious:false
                                                              Preview:........-$..e.P...h.X...i.i...j.u...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.$.....,.....1.....9.....A.....I.....P.....W.....^....._.....`.....b.....u.......................E...........3.....O.................V.....g..........._.................o...........#.....L.............................k.......................n.................2...........*.......................w.................5.......................R...................................c................./.....[.....y.................=.....K.............................x.................*.............................`.......................4.............................^.........................................B.............................F.....\.....r........... .....L.....a...........=.......................b.......................8.....c.....v...........[.................c...........S.....j...........d.................[.................).....v.......................X.............
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):634636
                                                              Entropy (8bit):5.718480148171718
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:4A4AF69546DCF65F2D722A574E221BEA
                                                              SHA1:EE51613F111CF5B06F5605B629952EFFE0350870
                                                              SHA-256:7AD195AF107F2A394BAB527C3E84E08F3B7748076F23459F084CF0E05DD29655
                                                              SHA-512:0E93F6B22F7C9176EFC9D49901BFBD281FA5AC3632780DFA76CE597CADD8C1CF570A9163A86BC320BBFBD354F48288DBEC5E36A6088999B00A3561D302A96D03
                                                              Malicious:false
                                                              Preview:........n#K.e.....h.....i.....j.....k.....l.....m.....o.%...p.2...q.8...v.D...w.Q...y.W...z.f...|.l...}.~...............................................................................................6.....W...........}.................l........... .....8...........c.......................B.................W.......................x...................................7.....V...........e.................=.......................].......................{...........#.....2...........y.................`...................................<.....W...........j.................y...........e...................................h...........(.....:...........%.....a.....p...........{.................}...........m..................................._...................................Z.....x.............................o...................................:.....U...........*.....d.....z....."...........*.....?...........X.................`.................@.................g............ ..... ..... .....
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1256908
                                                              Entropy (8bit):4.247594585839553
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:6A41A5AB03A22BDAEC7985B9A75EC11A
                                                              SHA1:6BB02DF557BD6522E02FE026C0243BEB9332B2E5
                                                              SHA-256:E22873652AC7D9D18E47DAE838D121B5644EDA4C67F7B0BC110733BF7E931FEA
                                                              SHA-512:BCA661D802D29463A847AC77EB8D5DFA41C31455E7314049CA26555957DCA3BE33701C074F7ED26D2C375A0A9C5F8A93461007B8D74F5ED3BD27C02E5DB170A5
                                                              Malicious:false
                                                              Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}.................................................................W...........".....V.....W...................................n...........b............................._.......................<.....)...........s.......................).............................1.....7...................................[.................................................................*.....u...........f...........K.....^........................ ..... .....!..../"....i"....=#.....#....r$.....$....I%.....%....l&.....&....p'....((.....(.....(.....)....N*.....*.....*.....,.....-.....-................./.....0....W0.....0....z1.....1.....1.....2....Y3.....3.....4....@5.....6.....6.....7.....8.....8.....9....V9.....:....R;.....;....1<.....=....B>.....?....]?.....@....DB....BC....wC.....D.....E.....F....$G....\H....AI.....I....4J.....K.....K.....L....PL.....M....lN.....O
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):532715
                                                              Entropy (8bit):6.0824169765918725
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:5FD9942F57FFC499481947DB0C3FDFA7
                                                              SHA1:4D60AB21305902877467FF6151C1B7AB12553AAE
                                                              SHA-256:09E279860E20E9E559945940E29446CAD4273D05C5F3F15D0BAD664A1D5749F2
                                                              SHA-512:97953E580588C07769F1BD0002E2DF648FFCE5B246D2359E4475EDCFA1CD6E7286BAF168A115D7A65686B2151C313B6FD0C271E40B1F9DD4132F2F39904FE8D4
                                                              Malicious:false
                                                              Preview:........O#j.e.....h.....i.....j.....k.....l.....m.....o.....p.....q.....r.....s.....t.....y.#...z.2...|.8...}.J.....R.....W....._.....j.....r.................................................................].................5.................O.....b...........F.......................p.................'.......................,.......................;.......................L.......................e.......................Y.......................X...................................Q.....h.................>.....U................. .....0.........................................-.....I.................A.....Q.................L....._.................K.....[.................J.....Z...........O.......................Z.....{.................U.....}.................`.................%.......................J.............................h.......................\.................+.......................m.........................................'.............................x.........................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):573015
                                                              Entropy (8bit):5.63016577624216
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:8745B87D09D9ECC1112C60F5DD934034
                                                              SHA1:2F411E4EEF0E656CAC0C755FECE1AD2531CB689E
                                                              SHA-256:D546C994C81510122E7B2359DA50F694E1F0CA4081830404E16187A5CF4D4E0D
                                                              SHA-512:27B658C153A01AABB9595C5B1059567E535EDFC8F8187B89316D2C85694DE32696D209CFDD2A32C4826DFB1E50AC692937156563EE190E68DB358C40F9AAE15F
                                                              Malicious:false
                                                              Preview:........+$..e.L...h.T...i.e...j.q...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}. .....(.....-.....5.....=.....E.....L.....S.....Z.....[.....\.....^.....l.....y.................4...........".....=...........S.................M...........'.....A...........8.....p...................................A...................................B.....g...........z.................R...................................;.....K...........c.................T...........2.....P...........2.....Y.....t...........W.........................................E...................................D.....S...........Q.........................................S.............................B.................&.......................t...........1.....Y...........K.................+.........................................'...........N.................A.................,...........q.................d...........&.....F...........x.................(.......................H ..... .....!
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):570683
                                                              Entropy (8bit):5.624052036286866
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:E16B0B814074ACBD3A72AF677AC7BE84
                                                              SHA1:10744490B3E40BEB939B3FDCA411075A85A34794
                                                              SHA-256:46B5C09AA744AF0F660C79B0CDBDE8C8DBDD40A0BA1A23AAF28D37ECC4211DC5
                                                              SHA-512:70EA9DFAC667C0992AE0E95815A47EB8E779BAAE1215E733AFE84EEE26D3BA754AD838C12E9AEE3114D7BBE11CD21B31C550F5CAFE6C5E838B69E54C6174EF18
                                                              Malicious:false
                                                              Preview:........O$j.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.;...y.A...z.P...|.V...}.h.....p.....u.....}...................................................................................Z.................G.................%...........Z.................F.................6.................Q.....\...........Q.........................................|.....#.....t...................................W.................0...........T.................B...........8.....Y...........$.....J.....`...........-.....V.....h...........;.....b.....v.............................G.......................r.........../.....>...........'.....Z.....k...........c.................@...........3.....K.................).....>...........=.....t.................c.................(.................2.......................8...........<.....q.........................................:.................8...................................N.....^...........0.....K.....m............ .....
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1307271
                                                              Entropy (8bit):4.279854356980692
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:309E068B4E15157486D095301370B234
                                                              SHA1:D962CDAF9361767045A928966F4323EAD22D9B37
                                                              SHA-256:4F2C19B7E94B695C5C5CAB95DEE6E49AE53C3337C351B5C665BCB6BA4E6AE909
                                                              SHA-512:6B1333946C7950D97D2DF29D063DB39A0EC5C0EEAA1ECA40743E4A6A0E4C972D897D3FF2BA837B53E31B8003F2C5C4BACCB7A4AB4B50C6CB47DF39AD7B8E05E7
                                                              Malicious:false
                                                              Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.,...w.9...y.?...z.N...|.T...}.f.....n.....s.....{...........................................................$.....d.................Z.....C.......................W...........%.....r.....a.......................}.................n...........................................................I.................m.......................l.......................5.....y.............................^.............................j.......................|............ ..... .....!.....!....*".....#.....#....V$.....$....n%.....&.....&.....&.....'....n(.....(.....).....*.....*....W+.....+....c,....+-.....-.....-...........0.....0.....1.....1.....2....!3....Y3.....4.....4.....5....T5....06.....6.....7.....7.....9.....9.....:.....;.....;.....<.....=....Z=....|>....s?.....@....T@.....A....UB.....C....SC.....D.....E....yF.....F.....G.....H.....I.....I....-K....(L.....L.....M.....N.....N....eO.....O.....P.....Q.....R
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1075591
                                                              Entropy (8bit):4.313573412022857
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:69C36C23D6D9841F4362FF3A0F86CFDF
                                                              SHA1:C4C1F632EB8373107AEEBD6C26ECF036AEDA2B6B
                                                              SHA-256:6A794C2B08F8B046BE771DF33719536BDAF2371E3825D49A0E556958B781832D
                                                              SHA-512:8C1329BDB371677BC0A9D727A38591EDF32025BAE1E7EFE402D01C6A8BB5F647D827C59A18F40455D5C9C0482798525C98C3F1C8AC568AA886D7C1ED07D1580E
                                                              Malicious:false
                                                              Preview:.........$..e.....h.....i."...j.....k.=...l.H...n.P...o.U...p.b...q.h...r.t...s.....t.....v.....w.....y.....z.....|.....}.........................................................................@.....b.................%.....]...........W.................J.............................:.....@.....=...................................&.................&.....F.....P.......................h...........o...............................................c...................................R..........._.................i...............................................J.................. .....!.....!....(".....#.....#....O$....{$....B%.....&....c&.....&....F'.....(...._(.....(....R).....*....y*.....*.....+.....-.....-................./...../...../.....0....61....l1.....1....Z2.... 3.....3.....3.....4.....5.....6.....6.....7.....8.....9....E9....u:....n;.....;....@<.....=....O>.....?....5?.....@.....A.....B.....B....MD....WE.....E....eF....nG....LH.....H.....H.....I.....J.....J.....K....5L....)M.....M
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):489457
                                                              Entropy (8bit):5.250540323172458
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:A1253E64F8910162B15B56883798E3C0
                                                              SHA1:68D402D94D2145704DC3760914BF616CC71FC65D
                                                              SHA-256:E033BFAD6CD73EA7B001DFAF44B7102E3BBE2A1C418F005C149E4FB2565DB19F
                                                              SHA-512:ABD63713093049ECC8E24FD8145EAE065340058A3C38758A59EE8796FBED7E6CFBC54982D650889F1CEB54797060C7DDA12EEE2A963B14C5E907A110C2057DBE
                                                              Malicious:false
                                                              Preview:........T$e.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v./...w.<...y.B...z.Q...|.W...}.i.....q.....v.....~........................................................................................._.....{...........:.....n.....~...........\.................#.......................=.......................1.......................3.......................Y.................*.....z.......................W.......................E.......................b.........../.....A.............................N.......................$.....x.......................r.......................z.......................p.......................^.......................Q.......................r.................!.....s.......................S.....w.................6....._.....p.................T.....w.......................#.......................$.................2.....K...........B.......................s.................,.............................P.....r.................0.....].
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):476208
                                                              Entropy (8bit):5.4272499712806965
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:622ED80836E0EF3F949ED8A379CBE6DF
                                                              SHA1:9A94CD80E747B88582470EF49B7337B9E5DE6C28
                                                              SHA-256:560B2F09C1B6E6BB7E6A5A5F9BF85A88BD2ACA054B7D4A5955D9C91B6D7CA67C
                                                              SHA-512:950627E74180E1451BB35AE4A7416AC14D42D67BBBB59DC51D7B69E4CEB61715F8F9B0EB9D7F35FCEFD4D43FABE5CE2103F1AF3709CAE6733C25AC19E6339A83
                                                              Malicious:false
                                                              Preview:........2$..e.Z...h.b...i.y...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.....}.......................N...........A.....V.................X.....k...........z.................K.......................L.......................:.......................;.......................g................./...........<.........................................R.................1...........Q.......................\.....u.................1.....V.....f.................9.....I.................H.....\.................J.....Z...........".....T.....d.................@.....P.................<.....J...........4.....y.................B.....h.....{...........&.....E.....^.................-.....?...........,.....k.................V.....|.................b.......................i.................&.......................s...........9.....b...........*.....V.....i.................".....0.................).
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):491139
                                                              Entropy (8bit):5.362822162782947
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:C8378A81039DB6943F97286CC8C629F1
                                                              SHA1:758D9AB331C394709F097361612C6D44BDE4E8FE
                                                              SHA-256:318FB294CE025BDA7636B062CA7B6A1FB1E30C485D01856159CB5DB928782818
                                                              SHA-512:6687FFE4DE0D5A2314743EB3134096292724163D4E0332D2F47922B4807B0CDE7C20E2D57D2662E403D801BC7A20BC247F5D0EDD787AB650E5766B49AF7D3C63
                                                              Malicious:false
                                                              Preview:.........$..e.*...h.2...i.C...j.O...k.^...l.i...n.q...o.v...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................#.....*.....1.....8.....9.....:.....<.....H.....X.....i.....{.............................X.......................|...........4.....J.................M.....d.................8.....G.......................).................8.....Y...........1.....h.................F.....{.................U.........................................\.................4.............................Y.......................-.....~.......................}.......................v.......................V.......................5.....a.....n...........*.....^.....m...........I.......................X.......................>....._.....v...........,.....T.....f...........8.....o.................=.....[.....o...........3.....e.....v...........H.....................................................E.....j...........5.....f.....{.................B.....R.................B.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):550453
                                                              Entropy (8bit):5.757462673735937
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:80C5893068C1D6CE9AEF23525ECAD83C
                                                              SHA1:A2A7ADEE70503771483A2500786BF0D707B3DF6B
                                                              SHA-256:0069648995532EFD5E8D01CC6F7DD75BD6D072E86C3AE06791088A1A9B6DACC4
                                                              SHA-512:3D1C41A851E1CF7247539B196AD7D8EE909B4F47C3CFB5BA5166D82CDA1C38049B81A109C23FA6D887490E42EE587CC2A6BD96A3EA890267C089AC74710C755F
                                                              Malicious:false
                                                              Preview:........6$..e.b...h.j...i.{...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|."...}.4.....<.....A.....I.....Q.....Y.....`.....g.....n.....o.....p.....r.............................X...........S.....o...........=.....w...................................i...............................................z.................$.................1.....W...........M.................*.......................@.......................l...........0.....L...........].................9.....v.......................E.....h.....x.................,.....:.................<.....P.................>.....P.................6.....F.......................-.........................................e.....}.................4.....K.......................;.................+.....@.................a.................+.....I.....`.................9.....U...........2.....}...................................w...........'.....R.................9.....J.............................v.............
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):516256
                                                              Entropy (8bit):5.426294949123783
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3BA426E91C34E1C33F13912974835F7D
                                                              SHA1:467A1B05BAD23252A08EE22E6B9EBB4404F6A0F0
                                                              SHA-256:CB66D88D3B3938FE1E42C50ECB85CEDB0D57E0F0AB2FA2A5FC0E4CDEA640E2B7
                                                              SHA-512:824A4301DC4D935FF34CE88FAA0354440FC1A3A8E79B0F4B0B2DCC8F12542ECEF65828FB930EDF5B35BF16863296BBAE39E9306962B4D3CFA9F6495AC05BDEF4
                                                              Malicious:false
                                                              Preview:........9$..e.h...h.p...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.$...|.*...}.<.....D.....I.....Q.....Y.....a.....h.....o.....v.....w.....x.....}.............................d...........L.....h.........../.....h.....x.............................w.................(.....y.......................^...................................:.....j..........._.................:......................._...................................K.....d...........p.................5.............................q.......................n.......................w.......................p.......................O.....}.................).....W.....a.................V.....g...........b................. .....j.......................;.....a.................=.....U...........N.................2.....W.....p...........8.....p.................S.................@.................0...........1.....{.................X.......................0.....V.....k...........C...................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):518861
                                                              Entropy (8bit):5.4029194034596575
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:4D7D724BE592BD0280ED28388EAA8D43
                                                              SHA1:8E3C46B77639EB480A90AD27383FBB14C4176960
                                                              SHA-256:4724D82866C0A693C2B02D1FFA67D880B59CDB0D3334317B34EC0C91C3D3E2A2
                                                              SHA-512:D05388F66C50E039F7D3393515740F6B2593F9C0EF8651F9CDE910C5FF06656E0D22FDB066B22665289EE495837EA16CC085ECB3F85B0F6FB498AECDAA19ADF7
                                                              Malicious:false
                                                              Preview:........I$p.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v."...w./...y.5...z.D...|.J...}.\.....d.....i.....q.....y.......................................................................u...........Z.....u...........@.................).................$.................S.....w.................D.....T.................(.....:...........(.....j.................x.................H.......................g...................................9.....N...........D.......................p.......................^.......................a.......................q.......................r.......................U.............................[.....e.................P.....a...........?.......................O.....y.............................?.................0.....J...........#.....p.................9.....c.....u...........#.....Y.....n.........../.....}...............................................G.....k...........N.......................B.....g.....|...........J.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):537125
                                                              Entropy (8bit):5.4566742297332596
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:4F1C0A8632218F6FEF6BAB0917BEB84F
                                                              SHA1:05E497C8525CB1ADE6A0DAEFE09370EC45176E35
                                                              SHA-256:9C19835F237B1427000D72C93703311CFCBEFF6C2B709474B16DB93E629BC928
                                                              SHA-512:A7CDF94F79CD888BB81FD167F6B09BF1BEF2C749218869E5A12A0A3B2C2506D1A63F64B63D8E48EA49375636041C639082563BF9D526FE44003FC5A5E8D50E9D
                                                              Malicious:false
                                                              Preview:........0$..e.V...h.^...i.o...j.y...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.(.....0.....5.....=.....E.....M.....T.....[.....b.....c.....d.....f.....u.......................3.................+.................%.....9...........@.................1.......................Q.......................4.......................C...................................>.....b...........@.......................d.........................................p...........@.....n.................+.....H.............................h.......................M.......................J.......................7.............................].......................E.....t...................................?.............................W.....w.................\.................).......................f.......................W.........................................'...........$.....y...................................f.......................j.......................l...........+.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):878725
                                                              Entropy (8bit):4.848685093578222
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3A3D0D865A78399306924D3ED058274E
                                                              SHA1:AA1A42DB6021666B2297A65094D29978792CE29B
                                                              SHA-256:EAB4C32FEBE084CC7A3A272CDA008B69D6617ED6D042376B0316BE185B9E66FE
                                                              SHA-512:ACA8C87D0B2BB35A325726F7774F8A0232B99C8EFE0F948AB68210958E23B95E9D9026A9430D96FC2D5CEBA94815F4217896EF877C9A6E1D0E56F73533FB1D12
                                                              Malicious:false
                                                              Preview:.........#/.e.....h.....i.#...j./...k.>...l.I...n.Q...o.V...p.c...q.i...r.u...s.....t.....v.....w.....y.....z.....|.....}.........................................................................9.....V.....n...........V.......................g...........i...........l.....).................g...........,.....f.......................@.................6.....M......................./....."...........l..........._...........D.....y..... .................&.......................5.....9.....3.............................B.................r.................D...................................=.....b.........................................E.....\...........Y.................'...................................D.....n...........j.................9.......................a...........i...........v...........t...........a........................ ....,!....l!.....!....j"....."....R#....|#....O$.....%.....%.....%.....&....x'.....(....Q(.....(....z).....).....)....]*.....*.....+....$+.....+.....,.....-
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):553886
                                                              Entropy (8bit):5.812150703289796
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:A9656846F66A36BB399B65F7B702B47D
                                                              SHA1:4B2D6B391C7C2B376534C0AF9AA6779755B4B74E
                                                              SHA-256:02B65F48375911C821786D91698E31D908A4C0F5F4F1460DE29980A71124480E
                                                              SHA-512:7E23CAA89FF80BF799AC5353CEAF344CBED0393F23D15FCBE8DC24EE55757F417CEA3BFC30889FD2CB41951F9FA5629C2E64B46DD9617D4A85EFEF0A255246F6
                                                              Malicious:false
                                                              Preview:........5$..e.`...h.h...i.|...j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.%...}.7.....?.....D.....L.....T.....\.....c.....j.....q.....r.....s.....u.............................h...............................................[.........../.....I.................S.....j...........9.....h.....{...........4.....].....q...........J.................?.............................%.....`.....y...........\................./.............................%.....v.................G.....g.....|...........=.....c.....u...........6.....].....o...........O.........................................".......................3.......................R.............................-.....x.................0.....K....._.................0.....E.................G.....W...........T.................).....w.................-.......................M.............................O.................J.........................................'.........................................E.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):532410
                                                              Entropy (8bit):5.486224954097277
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:BE49BB186EF62F55E27FF6B5FD5933F4
                                                              SHA1:84CFD05C52A09B4E6FA62ADCAF71585538CF688E
                                                              SHA-256:833F2E1B13381AA874E90B747931945B1637E53F2396A7409CCDA0A19CBE7A84
                                                              SHA-512:1808631559D3C28589D3F5A4B95554CEBC342DE3D71B05DDC213F34851BF802967BFFAC3D7668C487265EE245D1E26EFCE5D317EDBFBBEEB4BC2C9F122980585
                                                              Malicious:false
                                                              Preview:.........$..e.....h.6...i.G...j.Q...k.`...l.k...n.s...o.x...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................%.....,.....3.....:.....;.....<.....>.....P.....^.....n...................................y.................&...........2.....}.................h.......................g.......................Z.......................v.................O...................................3.....I.................T.....h...........b.................S...........$.....J.......................(.............................n.......................z...........$.....8.................2.....C...........).....j.................;.....i.....|...........?.....q.................[.......................g.......................L.....j.................G.......................~.................I.......................B.......................b.............................^.............................o.........................................j.......................x.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):818089
                                                              Entropy (8bit):4.779985663253385
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:AFA2DFBA3BD71FE0307BFFB647CDCD98
                                                              SHA1:CD7A5C54246E891981AEEEAA88D39EC9E3F2C594
                                                              SHA-256:1375353837629A20102C69BF62701EE5401BED84D3DC4845BED5EE43E4D322CF
                                                              SHA-512:CE8BBBDDC33CB6B8DF4AEE127A8987E6D8C1D0761AC5BD25D685310BAA2D377F239BDF06F2C04B54295CF8FD440697A69A040644D5A7C0395C4F71A0252B8E87
                                                              Malicious:false
                                                              Preview:........=$|.e.p...h.x...i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.,...|.2...}.D.....L.....Q.....Y.....a.....i.....p.....w.....~.........................................).................W...........O...........\...........z.....E...................................3...........b.................a.................5.......................1.....1...........v...........|...........{...........`...........Y.....~.....d...................................S........... .......................{...........(.....K...........H.................c...........d...........3.................)...........B.................D.................(...........W.......................E.................~...........'.....O...........^.................~ .....!....]!....z!....J"....."....=#.....#....0$.....$.....$.....%.....%....P&.....&.....&.....'....1(.....(.....(.....).....*....5+....S+....A,.....,....Z-.....-....^...........=/....^/...../....Y0.....0.....0.....1....'2.....2
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):479512
                                                              Entropy (8bit):5.541069475898216
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:09592A0D35100CD9707C278C9FFC7618
                                                              SHA1:B23EEF11D7521721A7D6742202209E4FE0539566
                                                              SHA-256:9C080A2F6D4EDF0E2E94F78550B9DB59ADF5B1B9166DE2BAE496E6ABB6733304
                                                              SHA-512:E0760B3F227A3E7EAEB4816B8E02BEE51C62730D24403724D66B36BCCBC0BDCD56DF9EAB28B073AB727EE12C8856A858E52A9803E1A1C9164FCD3CF2F716D8AF
                                                              Malicious:false
                                                              Preview:.........$..e.....h.....i.....j.%...k.4...l.?...n.G...o.L...p.Y...q._...r.k...s.|...t.....v.....w.....y.....z.....|.....}.........................................................................#.....5.....I.....]...........b.................).......................e...........2.....K.................T.....p...........&.....U.....e...........%.....V.....f...........J.........................................O.......................Y..................................._.....u.............................n.......................J.......................'...............................................(.............................z.......................j.......................h.......................|.................$.....w.......................M.....k.......................?.....Q...........).....f.................J.....i.................;.....c.....x...........1.....l...................................q.................?.................;.....N.............................p.............
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):504856
                                                              Entropy (8bit):5.34516819438501
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:9E038A0D222055FED6F1883992DCA5A8
                                                              SHA1:8FA17648492D7F093F89E8E98BF29C3725E3B4B5
                                                              SHA-256:DDCA575D659545D80E715EB4176BBBBFBD3F75E24B223537B53740B0DCB282BD
                                                              SHA-512:FB70F97E08191DFEB18E8F1A09A3AB61687E326265B1349AB2EFF5055F57E177A496BF0EA3592B61C71FE1F73C9143CA1495B05226F36EB481024827CAE6DCC4
                                                              Malicious:false
                                                              Preview:........4$..e.^...h.f...i.q...j.}...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.,.....4.....9.....A.....I.....Q.....X....._.....f.....g.....h.....m.............................?.................$.................2.....D...........7.......................P.......................A.....l.....{...........&.....U.....c...........0.....d..................................._.......................m.......................n.............................*.......................J.....r.......................>.....G.........................................A.....O.................4.....F.................G.....R.................).....6.................).....2.................\.....u...........(.....T.....p...........2.....c.................D.......................l.................B.............................j.................+.......................j...........?.....S...........5.....x...................................P.......................r...........%.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1298313
                                                              Entropy (8bit):4.058495187693592
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:36104CB0D5E26E0BBB313E529C14F4B4
                                                              SHA1:69A509DEE8419DA719DCF6DE78BFE0A6737508C5
                                                              SHA-256:DC28C869A143424F71EDCFDB08B56DA31C2EC96E9D608535FFA7DC0B0842B7D8
                                                              SHA-512:D46ED1AA19EB298BC4C3D61EFC28D80753D6B551F01808E6158A0869FAAE8755DF61D4B4BAFF1310DD09FCFC385ABA67E1AA7D61BBE399DF7BB2D483EBE0FEFF
                                                              Malicious:false
                                                              Preview:.........$..e.(...h.0...i.A...j.M...k.\...l.g...n.o...o.t...p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}...............................!.....(...../.....6.....7.....8.....=.....k.................:...........5...........$.....v...........`...........(...........Z.................%.............................O...........j.....L.........................................m...........u...................................;.....c...........7.................................................................8 ..... ....m!....I".....".....".....#.....$.....%....9%....d&....n'.....(....L(....C)....4*.....*.....*.....+.....,....3-....a-....Z.....J/...../...../.....0.....1....Z2.....2.....3....:5.....6....Z6....U7....=8.....8.....8.....9.....:.....:....F;.....<.....=.....=.....>....E?....S@.....@....[A....3B.....B....IC.....C.....D.....E....[F.....F....+H....>I.....J....pJ....\L....FN.....O.....O....DQ....QR.....S....{S.....T.....V.....V....'W....+X.....Y.....Y.....Y.....[....9\.....\
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1199612
                                                              Entropy (8bit):4.314031920337284
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:98714389748A98ECC536CD2F17859BDF
                                                              SHA1:07761AA31588F30C2CED4A1E31FE99DDC43A5E8D
                                                              SHA-256:8A81B1A5457407E49D6372677938E7A2D28DFCA69F555FEDC8A2C9C09C333A65
                                                              SHA-512:38CC4F064BD874EEC9DBFAB4C2A83A487FBCD89CEFB40BE4213C42231BC48AF9255341C9D325EE059BC50EE533898C5FA22CD3B3927A8E045049DEF3C5DFB2C6
                                                              Malicious:false
                                                              Preview:........N$k.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.....s.....t. ...v.5...w.B...y.H...z.W...|.]...}.o.....w.....|.......................................................................X...........J...........|...............................................f.........................................~.............................Y.............................A.............................d.....X.........../.....k.....b...........5...............................................'.......................L.....u ....:!.....!.....!.....".....#....*$....k$.....%.....&....6'.....'.....(.....).....*...._*.....+....P,.....,.....-....'...........m/...../.....0.....1...."2....f2.....3.....4....R5.....5.....6....G7.....7.....7.....8....I9.....9.....9....{:....0;.....;....)<.....=.....>.....?.....?.....@....bA.....A.....B....JC....(D.....D.....D....DF.....F.....G.....G.....I....@K....qL.....L....4N....EO.....O....pP.....Q.....R....?S.....S.....T....^U.....U.....V....`W....[X.....Y
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1008989
                                                              Entropy (8bit):4.356501290091745
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:56F29DE3465795E781A52FCF736BBE08
                                                              SHA1:EAA406E5ED938468760A29D18C8C3F16CF142472
                                                              SHA-256:529C561747BF8B6206BE4F8BCF287A1D15E1B14A33113242DDAD5E035CA37BE6
                                                              SHA-512:519B5B3CC7032B2AF856456EEC25019B3A6A7F2A6DB7A0318CF87C41E08C6F6BFA73E239939B0DA16972C1D357FF06177765D875E19742D23E99A95FD4AC5416
                                                              Malicious:false
                                                              Preview:........i#P.e.....h.....i.....j.....k.....l.....o.....p.....q.....r.....s.0...t.9...v.N...w.[...y.a...z.p...|.v...}.....................................................................................'.....{.......................^...........e...........f.................s...........I...........]...........P...........r.................{...........D.....]...........;...........$.................,.....}.....K...........v...........e...........r...........m.....................................................E.......................P.......................:.......................B.......................b.......................s.......................X.......................S..................!.....".....".....".....#....0$....|$.....$....j%.....%....5&....l&.....'....z'.....'....!(....A).....).....*.....*.....+.....,....H,....x,....M-.....-....6.....l.....k/...../....o0.....0.....1.....2....>3...._3.....4.....5....c6.....6.....7....n8.....8.....9.....9....f:.....:.....:.....;.....<....D=
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):515329
                                                              Entropy (8bit):5.616482888977033
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:46CA9EE922C3C175DE466066F40B29CE
                                                              SHA1:5563E236A15CD9CC44AE859165DF1E4E722936C7
                                                              SHA-256:BD8B1441FD2057F0B61512CC0AA23DFD2619560CF886B4D453FA7472E7153A3F
                                                              SHA-512:45AA2D6896568751C2F986ABD281EA07CB731880DF8F28F2F0AEFD95736F41B1E005D8DFB6F0AEF0CED6CEF94154D34FD0DA2CB7F0B0C66D9C085F5C47F32605
                                                              Malicious:false
                                                              Preview:........c$V.e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.%...s.6...t.?...v.T...w.a...y.g...z.v...|.|...}...........................................................................................)...........L.................+.......................e........... .....;.................7.....J.......................)......................................... .....B...........5.....x.................Z.......................Q.....{.................w.................Q.................!.......................'.......................&....................... ................."...../.................5.....F.................9.....F.................2.....>.................7.....D...........I.......................v.......................i.......................P.......................q.................-.....z.......................m.................,.............................*.................B................."...........(.....n.................N.....~.................l.......
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):876131
                                                              Entropy (8bit):4.88404350774067
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:1365ABDD1EFB44720EA3975E4A472530
                                                              SHA1:8421FC4905C592EB1269C5D524AA46866D617D3C
                                                              SHA-256:29AB0F7EE69FB7A1E1E54DD2A3746D2CFEAAA71AE5971EE30AA8E2E0F6556FA5
                                                              SHA-512:2E806A9BEA864E689BBD1D78B800DFDBC6E4109320F9A4790E52010BFDEC20C7644655A6FE3BABDE0B84D9580208CB78EF1FA0DB3476F8676C17A13D130296C7
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.'...s.8...t.A...v.V...w.c...y.i...z.x...|.~...}.....................................................................................1.....s.....W.......................r...........x...........m.....!.......................<.............................n...........,.................-...........|.............................=.....y.....+...........%.....K...................................w.............................N...................................r.................O...........N.................^...........\...............................................h...............................................R.....m.....f.....6.............................W.....y...........O.....x...........K...........j...........z .....!.....!.....".....".....#....R#.....#....&$.....$.....$.....%.....%....s&.....&.... '.....(.....(....~).....).....*....Q+.....+.....,.....,....Z-.....-.....-....[............/....4/.....0.....0....$1
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):765853
                                                              Entropy (8bit):5.17061834928747
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:3FED15E64BEAFBA75DE61B08A45AE106
                                                              SHA1:E24953271D8C0254AD011D3A65B2C2FA57903681
                                                              SHA-256:B6E250C3F4FBAC3AF5FB8BB1C61CACAD8685D7F2A97063DE23BC22E91B7F2E27
                                                              SHA-512:3948D080135AFEB240815D43F7B5B8D407BA2830FF701D9B8343F2A72E610827EDAAB643444CDCEB86812ADFC9FB3FBA3AAD6DB7488843C2A04E92A3E63FE40D
                                                              Malicious:false
                                                              Preview:........1$..e.X...h.`...i.h...j.t...k.....l.....n.....o.....p.....q.....r.....s.....t.....v.....w.....y.....z.....|.....}.#.....+.....0.....8.....@.....H.....O.....V.....].....^....._.....d.....|.............................n.....................................................).....^.......................<...........G.................J.................9...........E.................~...........{...........\...........L.....k.......................,.................9.....e.....C.......................>...................................8.....Z...........C.................;.................-...........L.................N.................1...........-.....y.........................................s.......................*.....p........... .......................i...........).....J.......................L...........M ..... ..... ....Y!.....!....4"....Z"....,#.....#....&$....W$....'%.....%....^&.....&....f'.....(.....(.....(.....)....3*.....*.....*....]+.....+.....,....F,.....,....z-.....-
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):609259
                                                              Entropy (8bit):5.796202390024141
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:CD741C24AF7597E0DC11069D3AC324E0
                                                              SHA1:2A883DFBCF48D5093D70D4B77BBFFFA521287334
                                                              SHA-256:13E982DC4B2B1AEE093E96BA27E02258C2B815CBB062006A4396BB3A3E6A84B1
                                                              SHA-512:6D27998E25B57FF0CE08C3590B69031038CBA390E68333A83514022B2C56B689AF8AD9715302824027864B5320852E9AB77D74E3B8A90DC66DF59F48CEB528C9
                                                              Malicious:false
                                                              Preview:.........#..e.....h.....i.....j.....k.....l.....n.....o.....p.....q.....r.*...s.;...t.D...v.Y...w.f...y.l...z.{...|.....}...........................................................................................;.......................-...........A.................[...........O.....u...........v.................6.......................+.......................}...........G.....y.....9...........K.....y.............................z...........?.....V...................................T.................X.......................r...................................9.....J...........H.......................}.................'.......................<.......................O.............................Z................._.................*.................)........... .....V.....v.......................j...........N.................3...................................O.....v................./.....C.......................@...........) ....^ ....w ..... ....J!....}!.....!..../".....".....#....8#
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):441207
                                                              Entropy (8bit):6.685712707138377
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:99E6ACFB46923C4F8B29058E9EE6166B
                                                              SHA1:AF06C42E5F3578ADBC4F0BD7262DC6775FDD351F
                                                              SHA-256:9D8498875263B19552A982D1850F2F942FF44AF4E323BC5A3A67C34413994D95
                                                              SHA-512:4FDF5186FC2FC68210C2BE91F5B821F0979CA67D6C9B8915C14E7A20D3CE2548EB2660D5F9F398CF6C585A5C0725FA34FD3670F416F7C8A4F009C729BCF02988
                                                              Malicious:false
                                                              Preview:.........#..e.T...h.\...i.d...j.g...k.v...l.}...m.....o.....p.....q.....r.....s.....t.....v.....w.....|.....}...............................(.....-.....5.....<.....C.....E.....J.....S....._.....q.................v.................1......................./.......................:.......................>.............................c.......................D.....j................._.......................n.......................T.....}.................@.....o.................V.......................5.....O.....i................."...........x.......................U.......................].......................=.......................".....s.......................L.....u.................g.......................W.....w.................3.....X.....o...........&.....J.....\.................=.....].............................y.......................y...................................N.....`...........,.....d.....y...........).....O.....^.............................|.......................x.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):439630
                                                              Entropy (8bit):6.6906570508767995
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:BB7C995F257B9125457381BB01856D72
                                                              SHA1:21C55FF5CBC4F223C23D5A2FBCC9E051DB78A44C
                                                              SHA-256:F2299E03E99B0E9A9CACE3B1C72E6C8C5FE089487CA1C82F2AAF4273B62E37A2
                                                              SHA-512:5247C5DA6F00DF6241500524DDB162041A03649FA0AFCC11AD40E820814958768A2E11CE34E1250FDBF42B2459F8C06B00AE7442B537F0731A62C6724FC8D890
                                                              Malicious:false
                                                              Preview:.........#,.e.....h.....i.)...j.-...k.<...l.G...n.O...o.T...p.\...q.b...r.n...s.....t.....v.....w.....y.....z.....|.....}...................................................................%.....4.....C...........3.....q.................+.....T.....`........... .....R.....d.................M.....b.................3.....?.............................g.......................[.......................S.......................;.......................*.......................@.......................F.............................D.....d.....p.................2.....A.............................q.......................T.......................<.............................i.......................f.......................A.....[.....o.................!.............................u.......................^.............................h.......................P.........................................H.......................Z.......................$.....e.....z.................1.....X.....j...........#.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):275968
                                                              Entropy (8bit):5.778490068583466
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:7EA1429E71D83A1CCAA0942C4D7F1C41
                                                              SHA1:4CE6ACF4D735354B98F416B3D94D89AF0611E563
                                                              SHA-256:EDEC54DA1901E649588E8CB52B001AB2AEC76ED0430824457A904FCC0ABD4299
                                                              SHA-512:91C90845A12A377B617140B67639CFA71A0648300336D5EDD422AFC362E65C6CCD3A4FF4936D4262B0EAF7BAE2B9624BCD3C7EEC79F7E7CA18ABE1EC62C4C869
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....L.X...........!.....,..........~K... ...`....... ..............................H.....@.................................$K..W....`...............................I............................................... ............... ..H............text....+... ...,.................. ..`.rsrc........`......................@..@.reloc...............4..............@..B................`K......H...........<x...............-..P .......................................i.)V.#c....e../.`...V....j>..*..?.LbrzKV.x.}...........[.f)..dD`..66.61[.z....W^....>F..r...#. ..g...T...P....Ss)ii.a.v.(0.....(1...o2...s....}....*...0..7........{....-%~....r...p.{....r9..p(3...(.....(.......(4....*.........//........{....*"..}....*..{....*....0..4..........%...(5....-.~....r?..p(....+...}.......,..(6....*........')........{....*..{....*"..}....*.*..{....*"..}....*.0..........
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1547797
                                                              Entropy (8bit):4.370092880615517
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:32AB4E0A9A82245EE3B474EF811F558F
                                                              SHA1:9F2C4C9EEB5720D765F2321ACD0FF9F8DD11E6A4
                                                              SHA-256:9BBF4D15F8FB11F7D2C032BD920D2A33B2C2CB8EF62E7E023049AF6132F5D6C1
                                                              SHA-512:A0574A170F69F9926C32BAF6119A16A381FEC9E881B304082859EE7CFF463570C78984EE14369C59CDB19E532B3ABF193D02B462F1B40D07214B6244150CD63F
                                                              Malicious:false
                                                              Preview:<?xml version="1.0"?>..<doc>.. <assembly>.. <name>log4net</name>.. </assembly>.. <members>.. <member name="T:log4net.Appender.AdoNetAppender">.. <summary>.. Appender that logs to a database... </summary>.. <remarks>.. <para>.. <see cref="T:log4net.Appender.AdoNetAppender"/> appends logging events to a table within a.. database. The appender can be configured to specify the connection .. string by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionString"/> property. .. The connection type (provider) can be specified by setting the <see cref="P:log4net.Appender.AdoNetAppender.ConnectionType"/>.. property. For more information on database connection strings for.. your specific database see <a href="http://www.connectionstrings.com/">http://www.connectionstrings.com/</a>... </para>.. <para>.. Record
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):342741
                                                              Entropy (8bit):5.496697631795104
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:A58DB728B50E6B82CBDCAA0DB61D36B1
                                                              SHA1:7CD76526CB29A0FF5350A2B52D48D1886360458B
                                                              SHA-256:BA2F2AC6AE9BC67399728F25772A0EB3E840695395CC747ADF4B2F8B5D6D9A46
                                                              SHA-512:0DB9AFBDADA44364521D89BAB6055458125F4F3C8C1B09048EAFA4055A194231CCFFD82FCDADA9360AB2B19F472B893330EBFCB027391E7A0C2B1100FC51E673
                                                              Malicious:false
                                                              Preview:..mirrors....(function(a,b){."use strict";.var c=a.Array;.var d=a.isNaN;.var e=a.JSON.stringify;.var f;.var g;.var h=b.ImportNow("promise_state_symbol");.var i=b.ImportNow("promise_result_symbol");.var j;.var k;.b.Import(function(l){.f=l.MapEntries;.g=l.MapIteratorNext;.j=l.SetIteratorNext;.k=l.SetValues;.});.var m={.UNDEFINED_TYPE:'undefined',.NULL_TYPE:'null',.BOOLEAN_TYPE:'boolean',.NUMBER_TYPE:'number',.STRING_TYPE:'string',.SYMBOL_TYPE:'symbol',.OBJECT_TYPE:'object',.FUNCTION_TYPE:'function',.REGEXP_TYPE:'regexp',.ERROR_TYPE:'error',.PROPERTY_TYPE:'property',.INTERNAL_PROPERTY_TYPE:'internalProperty',.FRAME_TYPE:'frame',.SCRIPT_TYPE:'script',.CONTEXT_TYPE:'context',.SCOPE_TYPE:'scope',.PROMISE_TYPE:'promise',.MAP_TYPE:'map',.SET_TYPE:'set',.ITERATOR_TYPE:'iterator',.GENERATOR_TYPE:'generator',.}.var n=0;.var o=-1;.var p=[];.var q=true;.function MirrorCacheIsEmpty(){.return n==0&&p.length==0;.}.function ToggleMirrorCache(r){.q=r;.ClearMirrorCache();.}.function ClearMirrorCache(r){.
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):8226870
                                                              Entropy (8bit):7.996842728494533
                                                              Encrypted:true
                                                              SSDEEP:
                                                              MD5:F7EC58AEA756F3FD8A055AC582103A78
                                                              SHA1:086B63691F5E5375A537E99E062345F56512A22C
                                                              SHA-256:517418184EA974C33FFE67B03732D19B1234DCB9E5C1C2E9E94ED41B3BC1D064
                                                              SHA-512:C620C6E16BBCEE9BC607E6CA75D602C756276AC69E5F3761D82DE7728164133656A71A69043EB1A86CE3051FDE4327A47EFD41D1FF47C8385699CA67C423AD7B
                                                              Malicious:false
                                                              Preview:............f.6:..{..D..|..G..~. K.....]....._....=.....c...........9.....B.............................F.....K/.....2....54....r5.....6.....?.....@....jB.....C....hD.....E.....H....nj.....k.....r....@~...."..........W.....................;..../;'...2;P...7;....8;....C;....D;U...E;....F;....G;A,..H;.;..I;gK..J;.Z..K;.h..L;.}..M;y...N;{...O;z...P;....Q;8...R;....S;....T;C'..U;.=..V;.W..W;.m..X;....Y;....Z;D...[;....\;....];.....<.....<x....<.....<-....<\....<.....<.....<.....<.....<*(...< /...<+3...<.3..I=.3..J=.7..K=.9..R= >..S=.G..T=}V..[=;w..\=.x..]=.}..^=R..._=....`=....a=....b=....c=....e=:...f=.....=....=.....=....=`....=p....=.....=.....=.....=.....=.....=K....=.....=t....=.....=.....=.....=\....=Z....=.....=T....=[....=x....=.....=.....=D....=.....=.....=.....=l....=F....=.'...=j)...>.+...>l,...>_0...>.2...>.6...>.8..N>.\..O>~^..P>._..Q>%d..R>.k..S>.l..T>Tn..U>.p..b>.u..c>/y..d>.|..B@....C@....D@o...E@....F@W...L@Z...M@(...N@...O@....D.....D ....D ....D;....D.....D....D..
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):276319
                                                              Entropy (8bit):4.242318669799302
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:8234983533FA47D2A1D7710FF8274299
                                                              SHA1:E4C5793B6FE6A6C6C9D8E3921B3BC341AE3448D8
                                                              SHA-256:F95553D8066144CBB8A05EED1735C94A4B97A2E44E49F624C2302990A13017C9
                                                              SHA-512:1E7E201B0FF9AFA7821B5FFD0A36548A49CD4DBBABA5858E13DA35058670A5053723DD3544B2FD85C619F2B8FC9E5DB48DF977BB293E7BA7DE6F22CC8DAB28CA
                                                              Malicious:false
                                                              Preview:.........X./j1N.11.8.172.9.......................................................@...y...........@..`....`....`....`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.8731406795131327
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:2C66F3C2190A84FAFD4449DAF6440EAC
                                                              SHA1:7B9E4C94329FE26C34E63AB8336227FD5EB553E9
                                                              SHA-256:58EB97E30289A3FCAE270DBCC01258A862936350CB0EF781AE76D6A9444C0155
                                                              SHA-512:62713209575426CE503605C6F451E9DFB025BE0295F0A453614862CE390F5987F0E16BAE6B37B4B1A7330A7CB5AA31249F8CF58DE37B8B701C16881E4E4E61C1
                                                              Malicious:false
                                                              Preview:start GamePall.exe OuWe5kl
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:MSVC program database ver 7.00, 512*4023 bytes
                                                              Category:dropped
                                                              Size (bytes):2059776
                                                              Entropy (8bit):4.067542396670122
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:70F9EAEA8A2A604E59F72EDE66F83AB4
                                                              SHA1:0AB9EA1BFFDFF471EC22AB289C7FBC5E0CDF48BF
                                                              SHA-256:38A07BA75CC2BBDF715CA87D380A4E5A0DCFAF9C30C5ECD30F6107871D51825B
                                                              SHA-512:47DE4DAD93385A4907FADE307040FE026ED66989C0C9915AFC96CB2BC93DE5E106DC1274E4AD2382021C758C60FEDE06D68998CF3591E23E2951778CE09D6D4C
                                                              Malicious:false
                                                              Preview:Microsoft C/C++ MSF 7.00...DS................J..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):346624
                                                              Entropy (8bit):6.54104466243173
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:7A53AD3E5D2E65C982450E7B7453DE8A
                                                              SHA1:99F27E54F1F61207C02110CAC476405557A8AD54
                                                              SHA-256:24FDDD6A367792A9D86D9060FC9AA459B5FB0F67804CB7D139A100D86BBDAFF8
                                                              SHA-512:2B5E5DB46FDC787CB46CDAEBFFC01586E248FBB864677B27AF03CDC33E956DEF51B3F836597E7092C4175CF605C44728C6F96B74BB2C9870E9715D4AF4C531A1
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.........T............................................................@A....................................P....p...........................3..4.......................8........G...............................................text............................... ..`.rdata..............................@..@.data....4..........................@....00cfg.......@......................@..@.tls.........P......................@....voltbl......`...........................rsrc........p......................@..@.reloc...3.......4..................@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):2445312
                                                              Entropy (8bit):6.750207745422387
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:334C3157E63A34B22CCE25A44A04835F
                                                              SHA1:C6B05BD55BE9FED3B0C5077C5649E2A41C10DC08
                                                              SHA-256:3E307570B574469EC8BCF1CE6D5291DF8D627CA3812F05AACFEBBD3F00B17F89
                                                              SHA-512:11F538ADD05515861891892EBB90163B6540B72FEB380D64B4A0AA56C6415E3B71374557BF50D0B936712B1006F2B94D59BEBFBF18CBF93BB883D9055CAAEEE9
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......_.........."!.....4 .................................................p*...........@A..........................#.. ....$.d....P)......................`).......#.......................#......."...............$.P............................text.../2 ......4 ................. ..`.rdata..\....P ......8 .............@..@.data...L....@$...... $.............@....00cfg....... )......>$.............@..@.tls.........0)......@$.............@....voltbl.M....@)......B$..................rsrc........P)......D$.............@..@.reloc.......`)......H$.............@..B........................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):631017
                                                              Entropy (8bit):5.144793130466209
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:0794DF29DF8DFC3ECE5C443F864F5AEB
                                                              SHA1:BFD4A9A34BEB9751BC4203FB9A9172F1F05E5B16
                                                              SHA-256:3EE2237E9B14871165B051CCF892C8375E45B5F12841E02F4B9D37F5D5A03283
                                                              SHA-512:0D34E36F7455B977F086F04840FBA679284A619A7164A56B5C7FC2ADCB23A231B67A62101540EB07CF5C8192790266B08D2CC232D291621C331FE77C1F5E52C0
                                                              Malicious:false
                                                              Preview:..........d..<..11.8.172.9......................................................@...]!...S..y...-[..........`....`....`T...`b...`....`............B..............b........."..............B..............b...(Jb...)L.....@..F^.1..5.`.....(Jb...-P.....@..F^..`.....H...IDa........Db............D`.....-.D`.....D]D....D`......WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa...........WIa............L...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):4400640
                                                              Entropy (8bit):6.667314807988382
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:7F913E31D00082338F073EF60D67B335
                                                              SHA1:AC831B45F2A32E23BA9046044508E47E04CDA3A4
                                                              SHA-256:B60E9818C4EA9396D0D2D2A4AC79C7DC40D0DFF6BB8BC734D0AB14ADC30FBF30
                                                              SHA-512:E1AC79C775CF9137283CD2C1AE1A45EC597E0351CDB9C11D483E2E1F8B00CC2BBC5807A50DED13A3A5E76F06C1A565EFF1233F4EC727B0C5F7AA3BEAEA906750
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....$5.........P.-......................................PD...........@A........................8=?.~....\?.P.... B......................0B.X.....?.....................H.?......@5.............._?..............................text...T#5......$5................. ..`.rdata...a...@5..b...(5.............@..@.data...@N....?..x....?.............@....00cfg........B.......A.............@..@.tls....5.....B.......A.............@....rsrc........ B.......A.............@..@.reloc..X....0B.......A.............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:JSON data
                                                              Category:dropped
                                                              Size (bytes):106
                                                              Entropy (8bit):4.724752649036734
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:8642DD3A87E2DE6E991FAE08458E302B
                                                              SHA1:9C06735C31CEC00600FD763A92F8112D085BD12A
                                                              SHA-256:32D83FF113FEF532A9F97E0D2831F8656628AB1C99E9060F0332B1532839AFD9
                                                              SHA-512:F5D37D1B45B006161E4CEFEEBBA1E33AF879A3A51D16EE3FF8C3968C0C36BBAFAE379BF9124C13310B77774C9CBB4FA53114E83F5B48B5314132736E5BB4496F
                                                              Malicious:false
                                                              Preview:{"file_format_version": "1.0.0", "ICD": {"library_path": ".\\vk_swiftshader.dll", "api_version": "1.0.5"}}
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):826368
                                                              Entropy (8bit):6.78646032943732
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:A031EB19C61942A26EF74500AD4B42DF
                                                              SHA1:FDC6EA473234F153639E963E8EFB8D028DA1BE20
                                                              SHA-256:207706A3A3FAA8500F88CB034B26413074EFC67221A07C5F70558F3C40985A91
                                                              SHA-512:80F843E47FC2B41B17EF6EA1BB2BB04119B2417311599EC52120D9F9DF316B4D7B1DAF97EE5CDF2AE78CDB9475E5C65255A7F2AB2A9231804F6A82C83303FD19
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....e.........."!.....|..........@.....................................................@A...........................<!..$...P....p..............................l..............................................P................................text....z.......|.................. ..`.rdata..tr.......t..................@..@.data....7..........................@....00cfg.......P......................@..@.tls.........`......................@....rsrc........p......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):211456
                                                              Entropy (8bit):6.566524833521835
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:6D7FD214164C858BBCF4AA050C114E8C
                                                              SHA1:B8868DA6BB9A79EE7C9901A9BFAC580D5BAFCC96
                                                              SHA-256:3F58FB22BD1A1159C351D125BEE122A16BB97BABB5FCA67FDBD9AAAED3B302E6
                                                              SHA-512:0F8F2523C3A616AC7C72A1239B7E353F6A684FF75DA79D1CAF9B98A47FF6FE06329165825704C67C04E92073BA2C17D0FF339C57731DDF0F1489C2E97D1D0A14
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............^...^...^..._...^..._q..^..._..^..._..^..._..^..._..^k.._...^..._...^...^...^k.._...^k.._...^n..^...^k.._...^Rich...^........................PE..L...Ua.X.........."!.........(......c........0............................................@.................................x...<....@.......................P..T"......8...............................@............0..0............................text............................... ..`.rdata..`....0....... ..............@..@.data...............................@....gfids.......0......................@..@.rsrc........@......................@..@.reloc..T"...P...$..................@..B........................................................................................................................................................................................................................................
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):165888
                                                              Entropy (8bit):6.623406791719473
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:AC7FD6661AE787BA13C4599C8AEF8807
                                                              SHA1:BF28BF1D44E190E4CEA10DDAD1992FD3671ED13A
                                                              SHA-256:487D893F6D85731EC5E27E65C863163DE9CB7BF8C2F0F18118CAA6449C96C922
                                                              SHA-512:6938D6824213B5F3903E6857D5372731534DC8EBA8BEB0A1747B1270CAF5800E581B5E7490CA68728DCCB700E0E0B15B6034713409E1894BC651ED1DE7C905F4
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 47%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.................d.......u.......c.x...?"..........t.....j.......t.......q.....Rich....................PE..L.../P.c.................h....0...................@..........................`1................................................P.....0.................................................................................x............................text....g.......h.................. ..`.rdata..H ......."...l..............@..@.data...H...........................@....rsrc.........0.....................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):6.623406791719473
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe
                                                              File size:165'888 bytes
                                                              MD5:ac7fd6661ae787ba13c4599c8aef8807
                                                              SHA1:bf28bf1d44e190e4cea10ddad1992fd3671ed13a
                                                              SHA256:487d893f6d85731ec5e27e65c863163de9cb7bf8c2f0f18118caa6449c96c922
                                                              SHA512:6938d6824213b5f3903e6857d5372731534dc8eba8beb0a1747b1270caf5800e581b5e7490ca68728dccb700e0e0b15b6034713409e1894bc651ed1de7c905f4
                                                              SSDEEP:3072:Od5ZLXxnf6NG3TXQEhGImR8TwXRHHhPaH54YLY7HKm1KuU3:I5ZLhnSNqTg1nmsRZjpqX7
                                                              TLSH:73F3495076F69D26F3F78A342A74A790DF3BB8637F3081AE2650325E4D226D18E51713
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.................d.......u.......c.x...?"..........t.....j.......t.......q.....Rich....................PE..L.../P.c...........
                                                              Icon Hash:cb97334d5151599a
                                                              Entrypoint:0x401908
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x63E4502F [Thu Feb 9 01:45:19 2023 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:9d25817cccafbd9c57dfa5bcc3f6ce9c
                                                              Instruction
                                                              call 00007FDB108EB015h
                                                              jmp 00007FDB108E72DEh
                                                              mov edi, edi
                                                              push ebp
                                                              mov ebp, esp
                                                              sub esp, 00000328h
                                                              mov dword ptr [0041C918h], eax
                                                              mov dword ptr [0041C914h], ecx
                                                              mov dword ptr [0041C910h], edx
                                                              mov dword ptr [0041C90Ch], ebx
                                                              mov dword ptr [0041C908h], esi
                                                              mov dword ptr [0041C904h], edi
                                                              mov word ptr [0041C930h], ss
                                                              mov word ptr [0041C924h], cs
                                                              mov word ptr [0041C900h], ds
                                                              mov word ptr [0041C8FCh], es
                                                              mov word ptr [0041C8F8h], fs
                                                              mov word ptr [0041C8F4h], gs
                                                              pushfd
                                                              pop dword ptr [0041C928h]
                                                              mov eax, dword ptr [ebp+00h]
                                                              mov dword ptr [0041C91Ch], eax
                                                              mov eax, dword ptr [ebp+04h]
                                                              mov dword ptr [0041C920h], eax
                                                              lea eax, dword ptr [ebp+08h]
                                                              mov dword ptr [0041C92Ch], eax
                                                              mov eax, dword ptr [ebp-00000320h]
                                                              mov dword ptr [0041C868h], 00010001h
                                                              mov eax, dword ptr [0041C920h]
                                                              mov dword ptr [0041C81Ch], eax
                                                              mov dword ptr [0041C810h], C0000409h
                                                              mov dword ptr [0041C814h], 00000001h
                                                              mov eax, dword ptr [0041B004h]
                                                              mov dword ptr [ebp-00000328h], eax
                                                              mov eax, dword ptr [0041B008h]
                                                              mov dword ptr [ebp-00000324h], eax
                                                              call dword ptr [000000A4h]
                                                              Programming Language:
                                                              • [C++] VS2008 build 21022
                                                              • [ASM] VS2008 build 21022
                                                              • [ C ] VS2008 build 21022
                                                              • [IMP] VS2005 build 50727
                                                              • [RES] VS2008 build 21022
                                                              • [LNK] VS2008 build 21022
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x197ec0x50.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x23080000xdbe8.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x180000x178.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x167d80x16800cf093a04b74da38dec2946e3f0bef3b0False0.8037977430555555data7.509021892697256IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x180000x20480x2200abc5dba0acbb32644bceb2a1f83d5363False0.349609375data5.37696087773953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0x1b0000x22ec5480x1e00a178d238c14235a34d2629fd7a46b825unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x23080000xdbe80xdc00db25707e69a5deb028e3929416046aa2False0.5246803977272727data5.205599083617965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              NUSUTUMA0x230eed80x3faASCII text, with very long lines (1018), with no line terminatorsTurkishTurkey0.6277013752455796
                                                              RT_CURSOR0x230f2d80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                                              RT_ICON0x23086a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.6114072494669509
                                                              RT_ICON0x23095480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6935920577617328
                                                              RT_ICON0x2309df00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.756336405529954
                                                              RT_ICON0x230a4b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7940751445086706
                                                              RT_ICON0x230aa200x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5955394190871369
                                                              RT_ICON0x230cfc80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.726782363977486
                                                              RT_ICON0x230e0700x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.7389344262295082
                                                              RT_ICON0x230e9f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.8865248226950354
                                                              RT_STRING0x230f5d00xaadata0.611764705882353
                                                              RT_STRING0x230f6800x6edata0.6
                                                              RT_STRING0x230f6f00x6b2data0.4305717619603267
                                                              RT_STRING0x230fda80x688data0.4342105263157895
                                                              RT_STRING0x23104300x6a4data0.42764705882352944
                                                              RT_STRING0x2310ad80x202data0.5019455252918288
                                                              RT_STRING0x2310ce00x6a4data0.42705882352941177
                                                              RT_STRING0x23113880x6d8data0.4297945205479452
                                                              RT_STRING0x2311a600x7e0data0.42162698412698413
                                                              RT_STRING0x23122400x71adata0.42684268426842686
                                                              RT_STRING0x23129600x698data0.4277251184834123
                                                              RT_STRING0x2312ff80x798data0.4202674897119342
                                                              RT_STRING0x23137900x6dcdata0.4299544419134396
                                                              RT_STRING0x2313e700x82cdata0.41634799235181646
                                                              RT_STRING0x23146a00x672data0.44
                                                              RT_STRING0x2314d180x752data0.4247598719316969
                                                              RT_STRING0x23154700x720data0.42598684210526316
                                                              RT_STRING0x2315b900x52data0.6585365853658537
                                                              RT_GROUP_CURSOR0x230f4080x14data1.15
                                                              RT_GROUP_ICON0x230ee600x76dataTurkishTurkey0.6610169491525424
                                                              RT_VERSION0x230f4200x1b0data0.5879629629629629
                                                              DLLImport
                                                              KERNEL32.dllZombifyActCtx, CreateJobObjectW, GetModuleHandleExW, SetVolumeMountPointW, SleepEx, GetModuleHandleW, GetTickCount, GetConsoleAliasesA, ReadConsoleOutputA, GlobalAlloc, GetConsoleAliasExesLengthW, lstrcpynW, WriteConsoleW, OpenJobObjectA, SetLastError, GetProcAddress, BuildCommDCBW, GetAtomNameA, LoadLibraryA, UnhandledExceptionFilter, InterlockedExchangeAdd, SetFileApisToANSI, AddAtomA, FoldStringA, lstrcatW, EnumDateFormatsW, FindFirstVolumeA, GetModuleFileNameW, GetComputerNameA, CreateFileA, GetConsoleOutputCP, MultiByteToWideChar, GetLastError, HeapReAlloc, HeapAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, EnterCriticalSection, LeaveCriticalSection, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, Sleep, HeapSize, ExitProcess, HeapCreate, VirtualFree, HeapFree, VirtualAlloc, WriteFile, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringA, WideCharToMultiByte, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, ReadFile, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, SetStdHandle, CloseHandle, WriteConsoleA
                                                              GDI32.dllGetBoundsRect
                                                              ole32.dllCoTaskMemRealloc
                                                              Language of compilation systemCountry where language is spokenMap
                                                              TurkishTurkey
                                                              Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:06:30:57
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.Trojan.FWF.gen.Eldorado.15788.4670.exe"
                                                              Imagebase:0x400000
                                                              File size:165'888 bytes
                                                              MD5 hash:AC7FD6661AE787BA13C4599C8AEF8807
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1743187245.0000000004381000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000000.00000002.1742262393.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:1
                                                              Start time:06:31:03
                                                              Start date:03/07/2024
                                                              Path:C:\Windows\explorer.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\Explorer.EXE
                                                              Imagebase:0x7ff72b770000
                                                              File size:5'141'208 bytes
                                                              MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:5
                                                              Start time:06:31:22
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\utdciaf
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Roaming\utdciaf
                                                              Imagebase:0x400000
                                                              File size:165'888 bytes
                                                              MD5 hash:AC7FD6661AE787BA13C4599C8AEF8807
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1980324644.0000000002870000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000005.00000002.1980555628.0000000004371000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.1980398468.00000000028AC000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000005.00000002.1980277613.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              Antivirus matches:
                                                              • Detection: 47%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:06:31:36
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\25B5.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Local\Temp\25B5.exe
                                                              Imagebase:0xb60000
                                                              File size:6'642'176 bytes
                                                              MD5 hash:BD2EAC64CBDED877608468D86786594A
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2089670424.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2112281033.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2091390577.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2129331441.0000000001C99000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2129573415.0000000001CAA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2143846961.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2144040448.0000000001CED000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2129573415.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2129331441.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2089946661.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2102081465.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000003.2112281033.0000000001CE9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 68%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:06:31:48
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                              Imagebase:0x400000
                                                              File size:293'869 bytes
                                                              MD5 hash:60172CA946DE57C3529E9F05CC502870
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 21%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:06:31:55
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\91EE.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Local\Temp\91EE.exe
                                                              Imagebase:0xf70000
                                                              File size:578'048 bytes
                                                              MD5 hash:DA4B6F39FC024D2383D4BFE7F67F1EE1
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000008.00000002.3011588668.000000000114C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PovertyStealer, Description: Yara detected Poverty Stealer, Source: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 54%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:06:33:10
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\setup.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\setup.exe"
                                                              Imagebase:0x400000
                                                              File size:107'232'830 bytes
                                                              MD5 hash:FF2293FBFF53F4BD2BFF91780FABFD60
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 3%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:06:33:40
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Imagebase:0xf90000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 100%, Avira
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 3%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:13
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x200000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:14
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=gpu-process --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3428 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:2
                                                              Imagebase:0xf50000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:15
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=3760 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                                                              Imagebase:0x570000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --mojo-platform-channel-handle=4140 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:8
                                                              Imagebase:0x310000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:17
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --first-renderer-process --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524454310 --mojo-platform-channel-handle=4164 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                                                              Imagebase:0x4d0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:18
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe" --type=renderer --log-severity=disable --user-agent="Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Mobile Safari/537.36 EdgA/126.0.0.0" --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\user\AppData\Roaming\GamePall\debug.log" --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --time-ticks-at-unix-epoch=-1719997901860163 --launch-time-ticks=5524725830 --mojo-platform-channel-handle=4216 --field-trial-handle=3432,i,11279355246958339173,14448078390671235414,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI /prefetch:1
                                                              Imagebase:0x50000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:19
                                                              Start time:06:33:46
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x120000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:20
                                                              Start time:06:33:47
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x690000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:21
                                                              Start time:06:33:48
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x8d0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:22
                                                              Start time:06:33:49
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xca0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:23
                                                              Start time:06:33:49
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xa0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:24
                                                              Start time:06:33:49
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x6d0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:25
                                                              Start time:06:33:50
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x6a0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:26
                                                              Start time:06:33:50
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x970000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:27
                                                              Start time:06:33:51
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x910000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:28
                                                              Start time:06:33:51
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x5c0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:29
                                                              Start time:06:33:51
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x960000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:30
                                                              Start time:06:33:51
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xb70000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:31
                                                              Start time:06:33:52
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xb90000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:32
                                                              Start time:06:33:53
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xb70000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:33
                                                              Start time:06:33:53
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x9f0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:34
                                                              Start time:06:33:54
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xe70000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:35
                                                              Start time:06:33:54
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x580000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:36
                                                              Start time:06:33:54
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xba0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:37
                                                              Start time:06:33:54
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xfd0000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Target ID:38
                                                              Start time:06:33:55
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x410000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:39
                                                              Start time:06:33:55
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0xa60000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:false

                                                              Target ID:40
                                                              Start time:06:33:55
                                                              Start date:03/07/2024
                                                              Path:C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Roaming\GamePall\GamePall.exe"
                                                              Imagebase:0x190000
                                                              File size:296'448 bytes
                                                              MD5 hash:7A3502C1119795D35569535DE243B6FE
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:8.6%
                                                                Dynamic/Decrypted Code Coverage:20.6%
                                                                Signature Coverage:45.4%
                                                                Total number of Nodes:141
                                                                Total number of Limit Nodes:5
                                                                execution_graph 3965 417261 3966 417265 3965->3966 3967 41726b VirtualProtect 3966->3967 3968 41726d 3966->3968 3967->3968 3899 401543 3902 401546 3899->3902 3900 4015e6 NtDuplicateObject 3901 401603 NtCreateSection 3900->3901 3909 401702 3900->3909 3903 401683 NtCreateSection 3901->3903 3904 401629 NtMapViewOfSection 3901->3904 3902->3900 3902->3909 3905 4016af 3903->3905 3903->3909 3904->3903 3906 40164c NtMapViewOfSection 3904->3906 3907 4016b9 NtMapViewOfSection 3905->3907 3905->3909 3906->3903 3908 40166a 3906->3908 3907->3909 3910 4016e0 NtMapViewOfSection 3907->3910 3908->3903 3910->3909 3969 402e63 3971 402e67 3969->3971 3970 401918 8 API calls 3972 402f44 3970->3972 3971->3970 3971->3972 3959 401924 3960 401929 3959->3960 3961 40195e Sleep 3960->3961 3962 401979 3961->3962 3963 401538 7 API calls 3962->3963 3964 40198a 3962->3964 3963->3964 3757 4177c4 3758 4177cc 3757->3758 3760 417530 3758->3760 3761 417533 3760->3761 3762 41755f lstrcatW InterlockedExchangeAdd WriteConsoleW 3761->3762 3770 41765c 3761->3770 3763 41759a 7 API calls 3762->3763 3768 417622 GetBoundsRect 3763->3768 3769 41762b 3763->3769 3764 417679 GetTickCount SetLastError 3766 417692 ZombifyActCtx 3764->3766 3767 417699 GetConsoleAliasesA 3764->3767 3765 41766a GlobalAlloc AddAtomA 3765->3764 3766->3767 3767->3770 3768->3769 3771 417634 GetModuleHandleExW 3769->3771 3772 41764e 3769->3772 3770->3764 3770->3765 3773 4176b9 FoldStringA 3770->3773 3778 4176cd 3770->3778 3771->3772 3772->3770 3773->3770 3775 417715 LoadLibraryA 3785 417273 3775->3785 3784 417236 GlobalAlloc 3778->3784 3781 417773 3790 417490 3781->3790 3783 417778 3783->3758 3784->3775 3786 4172b2 3785->3786 3787 4172be GetModuleHandleW GetProcAddress 3786->3787 3788 417394 3786->3788 3787->3786 3789 417255 VirtualProtect 3788->3789 3789->3781 3797 4173b9 3790->3797 3793 4174b3 GetConsoleAliasExesLengthW UnhandledExceptionFilter FindFirstVolumeA 3794 4174cb 3793->3794 3802 417410 3794->3802 3798 4173d6 3797->3798 3799 4173ce CreateJobObjectW 3797->3799 3800 417405 3798->3800 3801 4173ea OpenJobObjectA BuildCommDCBW LoadLibraryA 3798->3801 3799->3798 3800->3793 3800->3794 3801->3800 3803 41742a 3802->3803 3804 41746d 3802->3804 3803->3804 3805 41744a GetComputerNameA SleepEx 3803->3805 3804->3783 3805->3803 3828 274003c 3829 2740049 3828->3829 3841 2740e0f SetErrorMode SetErrorMode 3829->3841 3834 2740265 3835 27402ce VirtualProtect 3834->3835 3837 274030b 3835->3837 3836 2740439 VirtualFree 3840 27404be LoadLibraryA 3836->3840 3837->3836 3839 27408c7 3840->3839 3842 2740223 3841->3842 3843 2740d90 3842->3843 3844 2740dad 3843->3844 3845 2740dbb GetPEB 3844->3845 3846 2740238 VirtualAlloc 3844->3846 3845->3846 3846->3834 3847 402fe9 3848 403140 3847->3848 3849 403013 3847->3849 3849->3848 3850 4030ce RtlCreateUserThread NtTerminateProcess 3849->3850 3850->3848 3881 401496 3882 401447 3881->3882 3882->3881 3883 4015e6 NtDuplicateObject 3882->3883 3891 40152f 3882->3891 3884 401603 NtCreateSection 3883->3884 3883->3891 3885 401683 NtCreateSection 3884->3885 3886 401629 NtMapViewOfSection 3884->3886 3887 4016af 3885->3887 3885->3891 3886->3885 3888 40164c NtMapViewOfSection 3886->3888 3889 4016b9 NtMapViewOfSection 3887->3889 3887->3891 3888->3885 3890 40166a 3888->3890 3889->3891 3892 4016e0 NtMapViewOfSection 3889->3892 3890->3885 3892->3891 3806 402eb7 3807 402eb8 3806->3807 3809 402f44 3807->3809 3810 401918 3807->3810 3811 401929 3810->3811 3812 40195e Sleep 3811->3812 3813 401979 3812->3813 3815 40198a 3813->3815 3816 401538 3813->3816 3815->3809 3817 401539 3816->3817 3818 4015e6 NtDuplicateObject 3817->3818 3826 401702 3817->3826 3819 401603 NtCreateSection 3818->3819 3818->3826 3820 401683 NtCreateSection 3819->3820 3821 401629 NtMapViewOfSection 3819->3821 3822 4016af 3820->3822 3820->3826 3821->3820 3823 40164c NtMapViewOfSection 3821->3823 3824 4016b9 NtMapViewOfSection 3822->3824 3822->3826 3823->3820 3825 40166a 3823->3825 3824->3826 3827 4016e0 NtMapViewOfSection 3824->3827 3825->3820 3826->3815 3827->3826 3851 276f02b 3854 276f03c 3851->3854 3855 276f04b 3854->3855 3858 276f7dc 3855->3858 3860 276f7f7 3858->3860 3859 276f800 CreateToolhelp32Snapshot 3859->3860 3861 276f81c Module32First 3859->3861 3860->3859 3860->3861 3862 276f82b 3861->3862 3864 276f03b 3861->3864 3865 276f49b 3862->3865 3866 276f4c6 3865->3866 3867 276f4d7 VirtualAlloc 3866->3867 3868 276f50f 3866->3868 3867->3868 3868->3868 3869 4014de 3870 401447 3869->3870 3871 4015e6 NtDuplicateObject 3870->3871 3879 40152f 3870->3879 3872 401603 NtCreateSection 3871->3872 3871->3879 3873 401683 NtCreateSection 3872->3873 3874 401629 NtMapViewOfSection 3872->3874 3875 4016af 3873->3875 3873->3879 3874->3873 3876 40164c NtMapViewOfSection 3874->3876 3877 4016b9 NtMapViewOfSection 3875->3877 3875->3879 3876->3873 3878 40166a 3876->3878 3877->3879 3880 4016e0 NtMapViewOfSection 3877->3880 3878->3873 3880->3879 3981 274092b GetPEB 3982 2740972 3981->3982

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 138 401496-4014a5 139 4014a7 138->139 140 40151b-40152d 138->140 141 4014a9-4014b5 139->141 142 4014cf 139->142 149 4014ba 140->149 150 40152f-401535 140->150 144 401471-401472 141->144 145 4014b7-4014b8 141->145 147 4014d6 142->147 151 401473-401484 144->151 148 401449 145->148 145->149 147->147 152 4014d8 147->152 153 40147b-40148e call 4011b7 148->153 154 40144b 148->154 155 401447-401456 149->155 156 4014bc-4014c3 149->156 151->153 152->140 153->138 158 40144c-401470 154->158 155->158 159 4014c5-4014c8 156->159 160 401539-401567 156->160 158->151 159->142 172 401558-401563 160->172 173 40156a-401590 call 4011b7 160->173 172->173 180 401592 173->180 181 401595-40159a 173->181 180->181 183 4015a0-4015b1 181->183 184 4018b8-4018c0 181->184 188 4018b6-4018c5 183->188 189 4015b7-4015e0 183->189 184->181 192 4018da 188->192 193 4018cb-4018d6 188->193 189->188 197 4015e6-4015fd NtDuplicateObject 189->197 192->193 194 4018dd-401915 call 4011b7 192->194 193->194 197->188 199 401603-401627 NtCreateSection 197->199 201 401683-4016a9 NtCreateSection 199->201 202 401629-40164a NtMapViewOfSection 199->202 201->188 204 4016af-4016b3 201->204 202->201 205 40164c-401668 NtMapViewOfSection 202->205 204->188 207 4016b9-4016da NtMapViewOfSection 204->207 205->201 208 40166a-401680 205->208 207->188 210 4016e0-4016fc NtMapViewOfSection 207->210 208->201 210->188 213 401702 call 401707 210->213
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectView
                                                                • String ID:
                                                                • API String ID: 1652636561-0
                                                                • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                                                • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                                                                • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                                                • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 216 401538-401567 222 401558-401563 216->222 223 40156a-401590 call 4011b7 216->223 222->223 230 401592 223->230 231 401595-40159a 223->231 230->231 233 4015a0-4015b1 231->233 234 4018b8-4018c0 231->234 238 4018b6-4018c5 233->238 239 4015b7-4015e0 233->239 234->231 242 4018da 238->242 243 4018cb-4018d6 238->243 239->238 247 4015e6-4015fd NtDuplicateObject 239->247 242->243 244 4018dd-401915 call 4011b7 242->244 243->244 247->238 249 401603-401627 NtCreateSection 247->249 251 401683-4016a9 NtCreateSection 249->251 252 401629-40164a NtMapViewOfSection 249->252 251->238 254 4016af-4016b3 251->254 252->251 255 40164c-401668 NtMapViewOfSection 252->255 254->238 257 4016b9-4016da NtMapViewOfSection 254->257 255->251 258 40166a-401680 255->258 257->238 260 4016e0-4016fc NtMapViewOfSection 257->260 258->251 260->238 263 401702 call 401707 260->263
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                                                • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                                                                • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                                                • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 266 4014de-4014ed 267 401563 266->267 268 4014ef 266->268 269 40156a-401590 call 4011b7 267->269 270 401551-401552 268->270 271 4014f1-401502 268->271 290 401592 269->290 291 401595-40159a 269->291 270->267 273 401504-401516 271->273 274 40151d-40152d 271->274 277 40151b-40151c 273->277 278 4014ba 274->278 279 40152f-401535 274->279 277->274 281 401447-401456 278->281 282 4014bc-4014c3 278->282 288 40144c-401470 281->288 284 4014c5-4014c8 282->284 285 401539-401567 282->285 289 4014cf 284->289 285->269 304 401558-401560 285->304 305 401473-401484 288->305 294 4014d6 289->294 290->291 302 4015a0-4015b1 291->302 303 4018b8-4018c0 291->303 294->294 297 4014d8 294->297 297->277 311 4018b6-4018c5 302->311 312 4015b7-4015e0 302->312 303->291 304->267 310 40147b-4014a5 call 4011b7 305->310 310->277 324 4014a7 310->324 317 4018da 311->317 318 4018cb-4018d6 311->318 312->311 326 4015e6-4015fd NtDuplicateObject 312->326 317->318 320 4018dd-401915 call 4011b7 317->320 318->320 324->289 325 4014a9-4014b5 324->325 328 401471-401472 325->328 329 4014b7-4014b8 325->329 326->311 330 401603-401627 NtCreateSection 326->330 328->305 329->278 332 401449 329->332 333 401683-4016a9 NtCreateSection 330->333 334 401629-40164a NtMapViewOfSection 330->334 332->310 336 40144b 332->336 333->311 337 4016af-4016b3 333->337 334->333 338 40164c-401668 NtMapViewOfSection 334->338 336->288 337->311 340 4016b9-4016da NtMapViewOfSection 337->340 338->333 341 40166a-401680 338->341 340->311 343 4016e0-4016fc NtMapViewOfSection 340->343 341->333 343->311 346 401702 call 401707 343->346
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectView
                                                                • String ID:
                                                                • API String ID: 1652636561-0
                                                                • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                                                • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                                                                • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                                                • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 349 401543-401544 350 401546-401567 349->350 351 4015af-4015b1 349->351 357 401558-401563 350->357 358 40156a-401590 call 4011b7 350->358 352 4018b6-4018c5 351->352 353 4015b7-4015e0 351->353 360 4018da 352->360 361 4018cb-4018d6 352->361 353->352 369 4015e6-4015fd NtDuplicateObject 353->369 357->358 379 401592 358->379 380 401595-40159a 358->380 360->361 364 4018dd-401915 call 4011b7 360->364 361->364 369->352 372 401603-401627 NtCreateSection 369->372 375 401683-4016a9 NtCreateSection 372->375 376 401629-40164a NtMapViewOfSection 372->376 375->352 378 4016af-4016b3 375->378 376->375 381 40164c-401668 NtMapViewOfSection 376->381 378->352 383 4016b9-4016da NtMapViewOfSection 378->383 379->380 392 4015a0-4015ad 380->392 393 4018b8-4018c0 380->393 381->375 384 40166a-401680 381->384 383->352 386 4016e0-4016fc NtMapViewOfSection 383->386 384->375 386->352 390 401702 call 401707 386->390 392->351 393->380
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                                                • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                                                                • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                                                • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 397 401565-401590 call 4011b7 402 401592 397->402 403 401595-40159a 397->403 402->403 405 4015a0-4015b1 403->405 406 4018b8-4018c0 403->406 410 4018b6-4018c5 405->410 411 4015b7-4015e0 405->411 406->403 414 4018da 410->414 415 4018cb-4018d6 410->415 411->410 419 4015e6-4015fd NtDuplicateObject 411->419 414->415 416 4018dd-401915 call 4011b7 414->416 415->416 419->410 421 401603-401627 NtCreateSection 419->421 423 401683-4016a9 NtCreateSection 421->423 424 401629-40164a NtMapViewOfSection 421->424 423->410 426 4016af-4016b3 423->426 424->423 427 40164c-401668 NtMapViewOfSection 424->427 426->410 429 4016b9-4016da NtMapViewOfSection 426->429 427->423 430 40166a-401680 427->430 429->410 432 4016e0-4016fc NtMapViewOfSection 429->432 430->423 432->410 435 401702 call 401707 432->435
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                                                • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                                                                • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                                                • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 438 401579-401590 call 4011b7 444 401592 438->444 445 401595-40159a 438->445 444->445 447 4015a0-4015b1 445->447 448 4018b8-4018c0 445->448 452 4018b6-4018c5 447->452 453 4015b7-4015e0 447->453 448->445 456 4018da 452->456 457 4018cb-4018d6 452->457 453->452 461 4015e6-4015fd NtDuplicateObject 453->461 456->457 458 4018dd-401915 call 4011b7 456->458 457->458 461->452 463 401603-401627 NtCreateSection 461->463 465 401683-4016a9 NtCreateSection 463->465 466 401629-40164a NtMapViewOfSection 463->466 465->452 468 4016af-4016b3 465->468 466->465 469 40164c-401668 NtMapViewOfSection 466->469 468->452 471 4016b9-4016da NtMapViewOfSection 468->471 469->465 472 40166a-401680 469->472 471->452 474 4016e0-4016fc NtMapViewOfSection 471->474 472->465 474->452 477 401702 call 401707 474->477
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                                                • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                                                                • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                                                • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 480 40157c-401590 call 4011b7 484 401592 480->484 485 401595-40159a 480->485 484->485 487 4015a0-4015b1 485->487 488 4018b8-4018c0 485->488 492 4018b6-4018c5 487->492 493 4015b7-4015e0 487->493 488->485 496 4018da 492->496 497 4018cb-4018d6 492->497 493->492 501 4015e6-4015fd NtDuplicateObject 493->501 496->497 498 4018dd-401915 call 4011b7 496->498 497->498 501->492 503 401603-401627 NtCreateSection 501->503 505 401683-4016a9 NtCreateSection 503->505 506 401629-40164a NtMapViewOfSection 503->506 505->492 508 4016af-4016b3 505->508 506->505 509 40164c-401668 NtMapViewOfSection 506->509 508->492 511 4016b9-4016da NtMapViewOfSection 508->511 509->505 512 40166a-401680 509->512 511->492 514 4016e0-4016fc NtMapViewOfSection 511->514 512->505 514->492 517 401702 call 401707 514->517
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                                                • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                                                                • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                                                • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 520 402fe9-40300d 521 403140-403145 520->521 522 403013-40302b 520->522 522->521 523 403031-403042 522->523 524 403044-40304d 523->524 525 403052-403060 524->525 525->525 526 403062-403069 525->526 527 40308b-403092 526->527 528 40306b-40308a 526->528 529 4030b4-4030b7 527->529 530 403094-4030b3 527->530 528->527 531 4030c0 529->531 532 4030b9-4030bc 529->532 530->529 531->524 534 4030c2-4030c7 531->534 532->531 533 4030be 532->533 533->534 534->521 535 4030c9-4030cc 534->535 535->521 536 4030ce-40313d RtlCreateUserThread NtTerminateProcess 535->536 536->521
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: CreateProcessTerminateThreadUser
                                                                • String ID:
                                                                • API String ID: 1921587553-0
                                                                • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                                                                • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 537 276f7dc-276f7f5 538 276f7f7-276f7f9 537->538 539 276f800-276f80c CreateToolhelp32Snapshot 538->539 540 276f7fb 538->540 541 276f80e-276f814 539->541 542 276f81c-276f829 Module32First 539->542 540->539 541->542 547 276f816-276f81a 541->547 543 276f832-276f83a 542->543 544 276f82b-276f82c call 276f49b 542->544 548 276f831 544->548 547->538 547->542 548->543
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0276F804
                                                                • Module32First.KERNEL32(00000000,00000224), ref: 0276F824
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276C000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_276c000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 3833638111-0
                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction ID: 7183f2693dc621e48c8a562da34ba6df3ab9f7955c93c967996bd51a1180d8dd
                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction Fuzzy Hash: AEF09C311007126FD7207BF5BC8DB7E76E8AF49724F604578EA43D18C0D770E8454652

                                                                Control-flow Graph

                                                                APIs
                                                                • lstrcatW.KERNEL32(?,053DC033), ref: 00417567
                                                                • InterlockedExchangeAdd.KERNEL32(?,053DC033), ref: 00417575
                                                                • WriteConsoleW.KERNEL32(053DC033,?,053DC033,?,053DC033), ref: 0041758C
                                                                • lstrcpynW.KERNEL32(?,053DC033,053DC033), ref: 004175A3
                                                                • GetAtomNameA.KERNEL32(053DC033,053DC033,053DC033), ref: 004175AC
                                                                • SetFileApisToANSI.KERNEL32 ref: 004175B2
                                                                • ReadConsoleOutputA.KERNEL32(053DC033,?,?,?,?), ref: 004175F3
                                                                • SetVolumeMountPointW.KERNEL32(053DC033,053DC033), ref: 004175FB
                                                                • GetModuleFileNameW.KERNEL32(053DC033,?,053DC033), ref: 0041760A
                                                                • EnumDateFormatsW.KERNEL32(053DC033,053DC033,053DC033), ref: 00417613
                                                                • GetBoundsRect.GDI32(053DC033,053DC033,053DC033), ref: 00417625
                                                                • GetModuleHandleExW.KERNEL32(053DC033,0041931C,?), ref: 00417641
                                                                • GlobalAlloc.KERNEL32(053DC033,053DC033), ref: 0041766C
                                                                • AddAtomA.KERNEL32(053DC033), ref: 00417673
                                                                • GetTickCount.KERNEL32 ref: 00417679
                                                                • SetLastError.KERNEL32(053DC033), ref: 00417680
                                                                • ZombifyActCtx.KERNEL32(053DC033), ref: 00417693
                                                                • GetConsoleAliasesA.KERNEL32(?,053DC033,053DC033), ref: 004176A2
                                                                • FoldStringA.KERNEL32(053DC033,053DC033,053DC033,053DC033,053DC033), ref: 004176BE
                                                                • LoadLibraryA.KERNELBASE(004193A0), ref: 00417767
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Console$AtomFileModuleName$AliasesAllocApisBoundsCountDateEnumErrorExchangeFoldFormatsGlobalHandleInterlockedLastLibraryLoadMountOutputPointReadRectStringTickVolumeWriteZombifylstrcatlstrcpyn
                                                                • String ID: k`$tl_$}$
                                                                • API String ID: 2727110864-211918992
                                                                • Opcode ID: c230c7c7f8d817496b3ab33709c50c3f67bb841a91fa5a354f7ff5efc1a70da3
                                                                • Instruction ID: fcc95189a6b4839f51c11c8fe39f4033a972062fff2321e615867624b4ce948e
                                                                • Opcode Fuzzy Hash: c230c7c7f8d817496b3ab33709c50c3f67bb841a91fa5a354f7ff5efc1a70da3
                                                                • Instruction Fuzzy Hash: CB516E71841528EED7219B65DC88CDF7B78FF0A355B11846AF105E1151CF388A858FAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 53 274003c-2740047 54 274004c-2740263 call 2740a3f call 2740e0f call 2740d90 VirtualAlloc 53->54 55 2740049 53->55 70 2740265-2740289 call 2740a69 54->70 71 274028b-2740292 54->71 55->54 75 27402ce-27403c2 VirtualProtect call 2740cce call 2740ce7 70->75 73 27402a1-27402b0 71->73 74 27402b2-27402cc 73->74 73->75 74->73 82 27403d1-27403e0 75->82 83 27403e2-2740437 call 2740ce7 82->83 84 2740439-27404b8 VirtualFree 82->84 83->82 86 27405f4-27405fe 84->86 87 27404be-27404cd 84->87 88 2740604-274060d 86->88 89 274077f-2740789 86->89 91 27404d3-27404dd 87->91 88->89 92 2740613-2740637 88->92 95 27407a6-27407b0 89->95 96 274078b-27407a3 89->96 91->86 94 27404e3-2740505 91->94 99 274063e-2740648 92->99 103 2740517-2740520 94->103 104 2740507-2740515 94->104 97 27407b6-27407cb 95->97 98 274086e-27408be LoadLibraryA 95->98 96->95 101 27407d2-27407d5 97->101 108 27408c7-27408f9 98->108 99->89 102 274064e-274065a 99->102 105 2740824-2740833 101->105 106 27407d7-27407e0 101->106 102->89 107 2740660-274066a 102->107 111 2740526-2740547 103->111 104->111 115 2740839-274083c 105->115 112 27407e4-2740822 106->112 113 27407e2 106->113 114 274067a-2740689 107->114 109 2740902-274091d 108->109 110 27408fb-2740901 108->110 110->109 116 274054d-2740550 111->116 112->101 113->105 117 2740750-274077a 114->117 118 274068f-27406b2 114->118 115->98 119 274083e-2740847 115->119 121 2740556-274056b 116->121 122 27405e0-27405ef 116->122 117->99 123 27406b4-27406ed 118->123 124 27406ef-27406fc 118->124 125 2740849 119->125 126 274084b-274086c 119->126 127 274056d 121->127 128 274056f-274057a 121->128 122->91 123->124 129 27406fe-2740748 124->129 130 274074b 124->130 125->98 126->115 127->122 131 274057c-2740599 128->131 132 274059b-27405bb 128->132 129->130 130->114 137 27405bd-27405db 131->137 132->137 137->116
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0274024D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2740000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: cess$kernel32.dll
                                                                • API String ID: 4275171209-1230238691
                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction ID: 42aabaa1e70d2f6ffd630ad4c005417da12345a2509f65d942aadd5818301568
                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction Fuzzy Hash: F7526974A01229DFDB64CF68C985BACBBB1BF09304F1480D9E94DAB351DB30AA85DF15

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 550 2740e0f-2740e24 SetErrorMode * 2 551 2740e26 550->551 552 2740e2b-2740e2c 550->552 551->552
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00000400,?,?,02740223,?,?), ref: 02740E19
                                                                • SetErrorMode.KERNELBASE(00000000,?,?,02740223,?,?), ref: 02740E1E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2740000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction ID: fdeee57af89029a09c22fedf6fa711502ae553cde1b268739bb7a153ea205ffe
                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction Fuzzy Hash: 9CD0123114512877D7003A94DC09BCD7B1CDF05B66F008011FB0DD9080CB70954046E5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 553 417261-417263 554 417265 553->554 555 417267-417269 553->555 554->555 556 41726b VirtualProtect 555->556 557 41726d-417272 555->557 556->557
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(00000040,?), ref: 0041726B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: edb65285c22d606139e282b350792270a45ff417db56b3c7e0e4ae7122eae3aa
                                                                • Instruction ID: 60cecf79b7f1d9d7607203fd7feae80ce1f2e64b42e4a18a650d02a069ea4c0b
                                                                • Opcode Fuzzy Hash: edb65285c22d606139e282b350792270a45ff417db56b3c7e0e4ae7122eae3aa
                                                                • Instruction Fuzzy Hash: 0CC02B70D48006A7D50047207CC18C73B6DF1013D632044467C3680500863844D70B79

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 558 417255-417272 VirtualProtect
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(00000040,?), ref: 0041726B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                                                                • Instruction ID: 4c62818881ac23e86d27b7ad5f6e3bb285c85b39ac0806b91a2128f0277fdf34
                                                                • Opcode Fuzzy Hash: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                                                                • Instruction Fuzzy Hash: 8CC08CB194020DFFDB018B91FC41E8D7BACF300248F808020B716A1060CAB1AD289F68
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                                                • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                                                                • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                                                • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                                                • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                                                                • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                                                • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 0276F4EC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276C000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_276c000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction ID: bb6ce20497ca0dbddb4b9df4fc7542f1fd1cfb2e62053a14a54fd02df5958080
                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction Fuzzy Hash: FC113C79A00208EFDB01DF98C989E98BBF5EF08351F058094F9499B362D371EA50DF81
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                                                • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                                                                • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                                                • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                                                • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                                                                • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                                                • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1740990352.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                                                • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                                                                • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                                                • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2740000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .$GetProcAddress.$l
                                                                • API String ID: 0-2784972518
                                                                • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                • Instruction ID: f0a264ceba53e4a1e09718a06f85b859e05f14d1814446cf33727fc5966f58a6
                                                                • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                                                • Instruction Fuzzy Hash: 4E314AB6910609DFDB14CF99C884AAEBBF9FF48328F15404AD941A7310DB71EA45CFA4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742150730.000000000276C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0276C000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_276c000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                • Instruction ID: 422ed2ef5d1e6f6479cb308d8b8c750af9613c5b9db8ca83585b1f3f5d52cf47
                                                                • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                • Instruction Fuzzy Hash: 2911CE72340100AFDB14CF55EC85FA273EAEB98364B298069ED05CB702D676E842CB60
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1742010643.0000000002740000.00000040.00001000.00020000.00000000.sdmp, Offset: 02740000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2740000_SecuriteInfo.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                • Instruction ID: aaeb444136f486ef0cd0102110fefa9acd913b7d6097daf7d43efc672c2df6f7
                                                                • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                                                • Instruction Fuzzy Hash: 1601F272A106108FDF25DF20CC04BBA33F5FF86206F0540B4DA0A97282EB70A9458F80
                                                                APIs
                                                                • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004173D0
                                                                • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 004173ED
                                                                • BuildCommDCBW.KERNEL32(00000000,?), ref: 004173F8
                                                                • LoadLibraryA.KERNEL32(00000000), ref: 004173FF
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Object$BuildCommCreateLibraryLoadOpen
                                                                • String ID:
                                                                • API String ID: 2043902199-0
                                                                • Opcode ID: 22d375c7685d614c2e767f9d77a3bae846fed0ceaca9cc11a963bcee4c6ddcf9
                                                                • Instruction ID: 538a1098ab18fdcd7f5c89deeca578abe8e39d64f6f8ffa6e11bd328fb467d45
                                                                • Opcode Fuzzy Hash: 22d375c7685d614c2e767f9d77a3bae846fed0ceaca9cc11a963bcee4c6ddcf9
                                                                • Instruction Fuzzy Hash: 7DE0A531802628EF87116B65EC488DF7EACFF0A399B41C425F80591105EB784A4ACFE9
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(02705280), ref: 0041733F
                                                                • GetProcAddress.KERNEL32(00000000,0041D350), ref: 0041737C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID:
                                                                • API String ID: 1646373207-3916222277
                                                                • Opcode ID: 693097cdd84ba9854c5dbe997ef4c84b1086e9171fec20937db4cb2167ac3d77
                                                                • Instruction ID: ba4d6c142ba7ccf009f6c0096dda4db49fcd10d01fa393c79593df2f4b69b48b
                                                                • Opcode Fuzzy Hash: 693097cdd84ba9854c5dbe997ef4c84b1086e9171fec20937db4cb2167ac3d77
                                                                • Instruction Fuzzy Hash: 1E318EB5D893C4DCF30187A4B8497B23BA1AB16B04F48846AD954CB2A5D7FA0458CB6F
                                                                APIs
                                                                • GetComputerNameA.KERNEL32(?,?), ref: 00417458
                                                                • SleepEx.KERNEL32(00000000,00000000), ref: 00417462
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1741022666.000000000040B000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_40b000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ComputerNameSleep
                                                                • String ID: -
                                                                • API String ID: 3354815184-2547889144
                                                                • Opcode ID: 97ed86ef0d1d3dcd1672e9104d971e6efe8f92cb71a9fd58bed177ce68b1d4fe
                                                                • Instruction ID: 5019951e24b89559604e4b6ab8fbef410b58f40e9a8043ba9cdfc04514e30fef
                                                                • Opcode Fuzzy Hash: 97ed86ef0d1d3dcd1672e9104d971e6efe8f92cb71a9fd58bed177ce68b1d4fe
                                                                • Instruction Fuzzy Hash: 3401D6B0804218D6D7209F64D9C17DEBFB8EB08314F4141ADE745B6185CE385ACACFAC

                                                                Execution Graph

                                                                Execution Coverage:8.6%
                                                                Dynamic/Decrypted Code Coverage:20.6%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:141
                                                                Total number of Limit Nodes:5
                                                                execution_graph 3930 417261 3931 417265 3930->3931 3932 41726b VirtualProtect 3931->3932 3933 41726d 3931->3933 3932->3933 3864 401543 3865 401546 3864->3865 3866 4015e6 NtDuplicateObject 3865->3866 3874 401702 3865->3874 3867 401603 NtCreateSection 3866->3867 3866->3874 3868 401683 NtCreateSection 3867->3868 3869 401629 NtMapViewOfSection 3867->3869 3871 4016af 3868->3871 3868->3874 3869->3868 3870 40164c NtMapViewOfSection 3869->3870 3870->3868 3872 40166a 3870->3872 3873 4016b9 NtMapViewOfSection 3871->3873 3871->3874 3872->3868 3873->3874 3875 4016e0 NtMapViewOfSection 3873->3875 3875->3874 3934 402e63 3935 402e67 3934->3935 3936 402f44 3935->3936 3937 401918 8 API calls 3935->3937 3937->3936 3924 401924 3925 401929 3924->3925 3926 40195e Sleep 3925->3926 3927 401979 3926->3927 3928 401538 7 API calls 3927->3928 3929 40198a 3927->3929 3928->3929 3722 4177c4 3723 4177cc 3722->3723 3725 417530 3723->3725 3726 417533 3725->3726 3727 41755f lstrcatW InterlockedExchangeAdd WriteConsoleW 3726->3727 3737 41765c 3726->3737 3730 41759a 7 API calls 3727->3730 3728 417679 GetTickCount SetLastError 3733 417692 ZombifyActCtx 3728->3733 3734 417699 GetConsoleAliasesA 3728->3734 3729 41766a GlobalAlloc AddAtomA 3729->3728 3731 417622 GetBoundsRect 3730->3731 3732 41762b 3730->3732 3731->3732 3735 417634 GetModuleHandleExW 3732->3735 3736 41764e 3732->3736 3733->3734 3734->3737 3735->3736 3736->3737 3737->3728 3737->3729 3738 4176b9 FoldStringA 3737->3738 3739 4176cd 3737->3739 3738->3737 3749 417236 GlobalAlloc 3739->3749 3741 417715 LoadLibraryA 3750 417273 3741->3750 3746 417773 3755 417490 3746->3755 3748 417778 3748->3723 3749->3741 3751 4172b2 3750->3751 3752 4172be GetModuleHandleW GetProcAddress 3751->3752 3753 417394 3751->3753 3752->3751 3754 417255 VirtualProtect 3753->3754 3754->3746 3762 4173b9 3755->3762 3758 4174b3 GetConsoleAliasExesLengthW UnhandledExceptionFilter FindFirstVolumeA 3759 4174cb 3758->3759 3767 417410 3759->3767 3763 4173d6 3762->3763 3764 4173ce CreateJobObjectW 3762->3764 3765 417405 3763->3765 3766 4173ea OpenJobObjectA BuildCommDCBW LoadLibraryA 3763->3766 3764->3763 3765->3758 3765->3759 3766->3765 3768 41742a 3767->3768 3770 41746d 3767->3770 3769 41744a GetComputerNameA SleepEx 3768->3769 3768->3770 3769->3768 3770->3748 3811 402fe9 3812 403140 3811->3812 3813 403013 3811->3813 3813->3812 3813->3813 3814 4030ce RtlCreateUserThread NtTerminateProcess 3813->3814 3814->3812 3946 281092b GetPEB 3947 2810972 3946->3947 3846 401496 3847 401447 3846->3847 3847->3846 3848 4015e6 NtDuplicateObject 3847->3848 3855 40152f 3847->3855 3849 401603 NtCreateSection 3848->3849 3848->3855 3850 401683 NtCreateSection 3849->3850 3851 401629 NtMapViewOfSection 3849->3851 3853 4016af 3850->3853 3850->3855 3851->3850 3852 40164c NtMapViewOfSection 3851->3852 3852->3850 3854 40166a 3852->3854 3853->3855 3856 4016b9 NtMapViewOfSection 3853->3856 3854->3850 3856->3855 3857 4016e0 NtMapViewOfSection 3856->3857 3857->3855 3771 402eb7 3773 402eb8 3771->3773 3774 402f44 3773->3774 3775 401918 3773->3775 3776 401929 3775->3776 3777 40195e Sleep 3776->3777 3778 401979 3777->3778 3780 40198a 3778->3780 3781 401538 3778->3781 3780->3774 3782 401539 3781->3782 3783 4015e6 NtDuplicateObject 3782->3783 3790 401702 3782->3790 3784 401603 NtCreateSection 3783->3784 3783->3790 3785 401683 NtCreateSection 3784->3785 3786 401629 NtMapViewOfSection 3784->3786 3788 4016af 3785->3788 3785->3790 3786->3785 3787 40164c NtMapViewOfSection 3786->3787 3787->3785 3789 40166a 3787->3789 3788->3790 3791 4016b9 NtMapViewOfSection 3788->3791 3789->3785 3790->3780 3791->3790 3792 4016e0 NtMapViewOfSection 3791->3792 3792->3790 3793 28ae2f3 3796 28ae304 3793->3796 3797 28ae313 3796->3797 3800 28aeaa4 3797->3800 3805 28aeabf 3800->3805 3801 28aeac8 CreateToolhelp32Snapshot 3802 28aeae4 Module32First 3801->3802 3801->3805 3803 28ae303 3802->3803 3804 28aeaf3 3802->3804 3807 28ae763 3804->3807 3805->3801 3805->3802 3808 28ae78e 3807->3808 3809 28ae7d7 3808->3809 3810 28ae79f VirtualAlloc 3808->3810 3809->3809 3810->3809 3815 281003c 3816 2810049 3815->3816 3828 2810e0f SetErrorMode SetErrorMode 3816->3828 3821 2810265 3822 28102ce VirtualProtect 3821->3822 3823 281030b 3822->3823 3824 2810439 VirtualFree 3823->3824 3827 28104be LoadLibraryA 3824->3827 3826 28108c7 3827->3826 3829 2810223 3828->3829 3830 2810d90 3829->3830 3831 2810dad 3830->3831 3832 2810dbb GetPEB 3831->3832 3833 2810238 VirtualAlloc 3831->3833 3832->3833 3833->3821 3834 4014de 3835 401447 3834->3835 3836 4015e6 NtDuplicateObject 3835->3836 3843 40152f 3835->3843 3837 401603 NtCreateSection 3836->3837 3836->3843 3838 401683 NtCreateSection 3837->3838 3839 401629 NtMapViewOfSection 3837->3839 3841 4016af 3838->3841 3838->3843 3839->3838 3840 40164c NtMapViewOfSection 3839->3840 3840->3838 3842 40166a 3840->3842 3841->3843 3844 4016b9 NtMapViewOfSection 3841->3844 3842->3838 3844->3843 3845 4016e0 NtMapViewOfSection 3844->3845 3845->3843

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 138 401496-4014a5 139 4014a7 138->139 140 40151b-40152d 138->140 141 4014a9-4014b5 139->141 142 4014cf 139->142 151 4014ba 140->151 152 40152f-401535 140->152 144 401471-401472 141->144 145 4014b7-4014b8 141->145 147 4014d6 142->147 148 401473-401484 144->148 150 401449 145->150 145->151 147->147 149 4014d8 147->149 154 40147b-40148e call 4011b7 148->154 149->140 150->154 155 40144b 150->155 156 401447-401456 151->156 157 4014bc-4014c3 151->157 154->138 160 40144c-401470 155->160 156->160 161 4014c5-4014c8 157->161 162 401539-401567 157->162 160->148 161->142 172 401558-401563 162->172 173 40156a-401590 call 4011b7 162->173 172->173 180 401592 173->180 181 401595-40159a 173->181 180->181 183 4015a0-4015b1 181->183 184 4018b8-4018c0 181->184 188 4018b6-4018c5 183->188 189 4015b7-4015e0 183->189 184->181 192 4018da 188->192 193 4018cb-4018d6 188->193 189->188 197 4015e6-4015fd NtDuplicateObject 189->197 192->193 194 4018dd-401915 call 4011b7 192->194 193->194 197->188 199 401603-401627 NtCreateSection 197->199 201 401683-4016a9 NtCreateSection 199->201 202 401629-40164a NtMapViewOfSection 199->202 201->188 205 4016af-4016b3 201->205 202->201 204 40164c-401668 NtMapViewOfSection 202->204 204->201 207 40166a-401680 204->207 205->188 209 4016b9-4016da NtMapViewOfSection 205->209 207->201 209->188 211 4016e0-4016fc NtMapViewOfSection 209->211 211->188 214 401702 call 401707 211->214
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectView
                                                                • String ID:
                                                                • API String ID: 1652636561-0
                                                                • Opcode ID: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                                                • Instruction ID: 8e4940cc2d5d294876689a6a874cb0cc3c399929e81e9dec1e5d288c8cd9e9dd
                                                                • Opcode Fuzzy Hash: 5edb7204c22a8cfb94061bf161a88c3eca98da374ec15d8cd8ba2bf42dcd3747
                                                                • Instruction Fuzzy Hash: F481B375500244BBEB209F91CC44FAB7BB8FF85704F10412AF952BA2F1E7749901CB69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 216 401538-401567 222 401558-401563 216->222 223 40156a-401590 call 4011b7 216->223 222->223 230 401592 223->230 231 401595-40159a 223->231 230->231 233 4015a0-4015b1 231->233 234 4018b8-4018c0 231->234 238 4018b6-4018c5 233->238 239 4015b7-4015e0 233->239 234->231 242 4018da 238->242 243 4018cb-4018d6 238->243 239->238 247 4015e6-4015fd NtDuplicateObject 239->247 242->243 244 4018dd-401915 call 4011b7 242->244 243->244 247->238 249 401603-401627 NtCreateSection 247->249 251 401683-4016a9 NtCreateSection 249->251 252 401629-40164a NtMapViewOfSection 249->252 251->238 255 4016af-4016b3 251->255 252->251 254 40164c-401668 NtMapViewOfSection 252->254 254->251 257 40166a-401680 254->257 255->238 259 4016b9-4016da NtMapViewOfSection 255->259 257->251 259->238 261 4016e0-4016fc NtMapViewOfSection 259->261 261->238 264 401702 call 401707 261->264
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                                                • Instruction ID: 71a4d0092025beca94809e07d65936591d52f1bb8effc294688e3fcd05e54c36
                                                                • Opcode Fuzzy Hash: 4af5c640631db37ac51d1c1afd1ab74928840835cbc445bb96c3204467379d38
                                                                • Instruction Fuzzy Hash: E0615171900204FBEB209F95CC89FAF7BB8FF85700F10412AF912BA2E5D6759905DB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 266 4014de-4014ed 267 401563 266->267 268 4014ef 266->268 269 40156a-401590 call 4011b7 267->269 270 401551-401552 268->270 271 4014f1-401502 268->271 289 401592 269->289 290 401595-40159a 269->290 270->267 273 401504-401516 271->273 274 40151d-40152d 271->274 276 40151b-40151c 273->276 279 4014ba 274->279 280 40152f-401535 274->280 276->274 282 401447-401456 279->282 283 4014bc-4014c3 279->283 291 40144c-401470 282->291 286 4014c5-4014c8 283->286 287 401539-401567 283->287 292 4014cf 286->292 287->269 304 401558-401560 287->304 289->290 301 4015a0-4015b1 290->301 302 4018b8-4018c0 290->302 305 401473-401484 291->305 295 4014d6 292->295 295->295 296 4014d8 295->296 296->276 312 4018b6-4018c5 301->312 313 4015b7-4015e0 301->313 302->290 304->267 309 40147b-4014a5 call 4011b7 305->309 309->276 324 4014a7 309->324 317 4018da 312->317 318 4018cb-4018d6 312->318 313->312 325 4015e6-4015fd NtDuplicateObject 313->325 317->318 320 4018dd-401915 call 4011b7 317->320 318->320 324->292 327 4014a9-4014b5 324->327 325->312 328 401603-401627 NtCreateSection 325->328 330 401471-401472 327->330 331 4014b7-4014b8 327->331 332 401683-4016a9 NtCreateSection 328->332 333 401629-40164a NtMapViewOfSection 328->333 330->305 331->279 335 401449 331->335 332->312 338 4016af-4016b3 332->338 333->332 336 40164c-401668 NtMapViewOfSection 333->336 335->309 337 40144b 335->337 336->332 340 40166a-401680 336->340 337->291 338->312 342 4016b9-4016da NtMapViewOfSection 338->342 340->332 342->312 344 4016e0-4016fc NtMapViewOfSection 342->344 344->312 347 401702 call 401707 344->347
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectView
                                                                • String ID:
                                                                • API String ID: 1652636561-0
                                                                • Opcode ID: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                                                • Instruction ID: 6a824664258ffec6fdf95c516407446232c8a84219ad61b9fd4b8efeb52f3576
                                                                • Opcode Fuzzy Hash: c3f6308678fe624b1287adcb7156a2cf5c07ee8b7810a15753646c5694e98bc6
                                                                • Instruction Fuzzy Hash: 9B615C75900245BFEB219F91CC88FEBBBB8FF85710F10016AF951BA2A5E7749901CB24

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 349 401543-401544 350 401546-401567 349->350 351 4015af-4015b1 349->351 360 401558-401563 350->360 361 40156a-401590 call 4011b7 350->361 353 4018b6-4018c5 351->353 354 4015b7-4015e0 351->354 358 4018da 353->358 359 4018cb-4018d6 353->359 354->353 369 4015e6-4015fd NtDuplicateObject 354->369 358->359 363 4018dd-401915 call 4011b7 358->363 359->363 360->361 378 401592 361->378 379 401595-40159a 361->379 369->353 372 401603-401627 NtCreateSection 369->372 375 401683-4016a9 NtCreateSection 372->375 376 401629-40164a NtMapViewOfSection 372->376 375->353 381 4016af-4016b3 375->381 376->375 380 40164c-401668 NtMapViewOfSection 376->380 378->379 390 4015a0-4015ad 379->390 391 4018b8-4018c0 379->391 380->375 383 40166a-401680 380->383 381->353 385 4016b9-4016da NtMapViewOfSection 381->385 383->375 385->353 388 4016e0-4016fc NtMapViewOfSection 385->388 388->353 393 401702 call 401707 388->393 390->351 391->379
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                                                • Instruction ID: 1fc6fb52bb36dddf8f971a96ecfe927bdbae9887f6286775c14151e9c1d92244
                                                                • Opcode Fuzzy Hash: f4faf4f0efc4cc5c307795d20c298965336779ff7452863f8b2b81be2522acaa
                                                                • Instruction Fuzzy Hash: 13512B71900245BBEB209F91CC88FAF7BB8EF85B00F14416AF912BA2E5D6749945CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 397 401565-401590 call 4011b7 402 401592 397->402 403 401595-40159a 397->403 402->403 405 4015a0-4015b1 403->405 406 4018b8-4018c0 403->406 410 4018b6-4018c5 405->410 411 4015b7-4015e0 405->411 406->403 414 4018da 410->414 415 4018cb-4018d6 410->415 411->410 419 4015e6-4015fd NtDuplicateObject 411->419 414->415 416 4018dd-401915 call 4011b7 414->416 415->416 419->410 421 401603-401627 NtCreateSection 419->421 423 401683-4016a9 NtCreateSection 421->423 424 401629-40164a NtMapViewOfSection 421->424 423->410 427 4016af-4016b3 423->427 424->423 426 40164c-401668 NtMapViewOfSection 424->426 426->423 429 40166a-401680 426->429 427->410 431 4016b9-4016da NtMapViewOfSection 427->431 429->423 431->410 433 4016e0-4016fc NtMapViewOfSection 431->433 433->410 436 401702 call 401707 433->436
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                                                • Instruction ID: d88667ffe02cbbb2798d41d5ad0cf6527765788d972b82ac88077c7d238bff09
                                                                • Opcode Fuzzy Hash: 40d7219ce39e026dd98d18ec02294656054e4da488103e740ba1602fb3a5db7c
                                                                • Instruction Fuzzy Hash: 54511A71900205BFEF209F91CC89FAFBBB8FF85B10F104259F911AA2A5D7759941CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 438 401579-401590 call 4011b7 444 401592 438->444 445 401595-40159a 438->445 444->445 447 4015a0-4015b1 445->447 448 4018b8-4018c0 445->448 452 4018b6-4018c5 447->452 453 4015b7-4015e0 447->453 448->445 456 4018da 452->456 457 4018cb-4018d6 452->457 453->452 461 4015e6-4015fd NtDuplicateObject 453->461 456->457 458 4018dd-401915 call 4011b7 456->458 457->458 461->452 463 401603-401627 NtCreateSection 461->463 465 401683-4016a9 NtCreateSection 463->465 466 401629-40164a NtMapViewOfSection 463->466 465->452 469 4016af-4016b3 465->469 466->465 468 40164c-401668 NtMapViewOfSection 466->468 468->465 471 40166a-401680 468->471 469->452 473 4016b9-4016da NtMapViewOfSection 469->473 471->465 473->452 475 4016e0-4016fc NtMapViewOfSection 473->475 475->452 478 401702 call 401707 475->478
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                                                • Instruction ID: 7169477154cf1621f4f222e223ad54e678f31395e99d0ffd613e12cb64d905d3
                                                                • Opcode Fuzzy Hash: 44bf211d5ecd49b3cfb3996dc98baa0f9fc545abe5e070ef87effc0df1f686f8
                                                                • Instruction Fuzzy Hash: 2B511A75900245BBEF209F91CC88FEF7BB8FF85B10F104119F911BA2A5D6759941CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 480 40157c-401590 call 4011b7 484 401592 480->484 485 401595-40159a 480->485 484->485 487 4015a0-4015b1 485->487 488 4018b8-4018c0 485->488 492 4018b6-4018c5 487->492 493 4015b7-4015e0 487->493 488->485 496 4018da 492->496 497 4018cb-4018d6 492->497 493->492 501 4015e6-4015fd NtDuplicateObject 493->501 496->497 498 4018dd-401915 call 4011b7 496->498 497->498 501->492 503 401603-401627 NtCreateSection 501->503 505 401683-4016a9 NtCreateSection 503->505 506 401629-40164a NtMapViewOfSection 503->506 505->492 509 4016af-4016b3 505->509 506->505 508 40164c-401668 NtMapViewOfSection 506->508 508->505 511 40166a-401680 508->511 509->492 513 4016b9-4016da NtMapViewOfSection 509->513 511->505 513->492 515 4016e0-4016fc NtMapViewOfSection 513->515 515->492 518 401702 call 401707 515->518
                                                                APIs
                                                                • NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                • NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004), ref: 00401663
                                                                • NtCreateSection.NTDLL(?,0000000E,00000000,?,00000040,08000000,00000000), ref: 004016A4
                                                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 004016D5
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,00000000,00000001,00000000,00000020), ref: 004016F7
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$View$Create$DuplicateObject
                                                                • String ID:
                                                                • API String ID: 1546783058-0
                                                                • Opcode ID: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                                                • Instruction ID: 14f4b29c405daff92d21e2b3eea283823ae405efc36948ac0d92101f557811aa
                                                                • Opcode Fuzzy Hash: c4110b1088d5ef41785dfe7ea8eaa09ab46741a105747cbb29c974859abd6495
                                                                • Instruction Fuzzy Hash: DE51F9B5900245BBEF209F91CC88FEFBBB8FF85B10F104259F911AA2A5D6709944CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 520 402fe9-40300d 521 403140-403145 520->521 522 403013-40302b 520->522 522->521 523 403031-403042 522->523 524 403044-40304d 523->524 525 403052-403060 524->525 525->525 526 403062-403069 525->526 527 40308b-403092 526->527 528 40306b-40308a 526->528 529 4030b4-4030b7 527->529 530 403094-4030b3 527->530 528->527 531 4030c0 529->531 532 4030b9-4030bc 529->532 530->529 531->524 534 4030c2-4030c7 531->534 532->531 533 4030be 532->533 533->534 534->521 535 4030c9-4030cc 534->535 535->521 536 4030ce-40313d RtlCreateUserThread NtTerminateProcess 535->536 536->521
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: CreateProcessTerminateThreadUser
                                                                • String ID:
                                                                • API String ID: 1921587553-0
                                                                • Opcode ID: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                • Instruction ID: 3e1675bac70c022a4e457ffe6b5fa54937b73e0116388ba90aec32851b4d9964
                                                                • Opcode Fuzzy Hash: 8dd8c1b6c2a2e81b31e5df05537a0a765b57e58f23bcff5050bac5d1a8738f05
                                                                • Instruction Fuzzy Hash: A1412431228E088FD768EF5CA885762B7D5F798311F6643AAE809D7389EA34DC1183C5

                                                                Control-flow Graph

                                                                APIs
                                                                • lstrcatW.KERNEL32(?,053DC033), ref: 00417567
                                                                • InterlockedExchangeAdd.KERNEL32(?,053DC033), ref: 00417575
                                                                • WriteConsoleW.KERNEL32(053DC033,?,053DC033,?,053DC033), ref: 0041758C
                                                                • lstrcpynW.KERNEL32(?,053DC033,053DC033), ref: 004175A3
                                                                • GetAtomNameA.KERNEL32(053DC033,053DC033,053DC033), ref: 004175AC
                                                                • SetFileApisToANSI.KERNEL32 ref: 004175B2
                                                                • ReadConsoleOutputA.KERNEL32(053DC033,?,?,?,?), ref: 004175F3
                                                                • SetVolumeMountPointW.KERNEL32(053DC033,053DC033), ref: 004175FB
                                                                • GetModuleFileNameW.KERNEL32(053DC033,?,053DC033), ref: 0041760A
                                                                • EnumDateFormatsW.KERNEL32(053DC033,053DC033,053DC033), ref: 00417613
                                                                • GetBoundsRect.GDI32(053DC033,053DC033,053DC033), ref: 00417625
                                                                • GetModuleHandleExW.KERNEL32(053DC033,0041931C,?), ref: 00417641
                                                                • GlobalAlloc.KERNEL32(053DC033,053DC033), ref: 0041766C
                                                                • AddAtomA.KERNEL32(053DC033), ref: 00417673
                                                                • GetTickCount.KERNEL32 ref: 00417679
                                                                • SetLastError.KERNEL32(053DC033), ref: 00417680
                                                                • ZombifyActCtx.KERNEL32(053DC033), ref: 00417693
                                                                • GetConsoleAliasesA.KERNEL32(?,053DC033,053DC033), ref: 004176A2
                                                                • FoldStringA.KERNEL32(053DC033,053DC033,053DC033,053DC033,053DC033), ref: 004176BE
                                                                • LoadLibraryA.KERNELBASE(004193A0), ref: 00417767
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Console$AtomFileModuleName$AliasesAllocApisBoundsCountDateEnumErrorExchangeFoldFormatsGlobalHandleInterlockedLastLibraryLoadMountOutputPointReadRectStringTickVolumeWriteZombifylstrcatlstrcpyn
                                                                • String ID: k`$tl_$}$
                                                                • API String ID: 2727110864-211918992
                                                                • Opcode ID: c230c7c7f8d817496b3ab33709c50c3f67bb841a91fa5a354f7ff5efc1a70da3
                                                                • Instruction ID: fcc95189a6b4839f51c11c8fe39f4033a972062fff2321e615867624b4ce948e
                                                                • Opcode Fuzzy Hash: c230c7c7f8d817496b3ab33709c50c3f67bb841a91fa5a354f7ff5efc1a70da3
                                                                • Instruction Fuzzy Hash: CB516E71841528EED7219B65DC88CDF7B78FF0A355B11846AF105E1151CF388A858FAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 53 281003c-2810047 54 2810049 53->54 55 281004c-2810263 call 2810a3f call 2810e0f call 2810d90 VirtualAlloc 53->55 54->55 70 2810265-2810289 call 2810a69 55->70 71 281028b-2810292 55->71 76 28102ce-28103c2 VirtualProtect call 2810cce call 2810ce7 70->76 73 28102a1-28102b0 71->73 75 28102b2-28102cc 73->75 73->76 75->73 82 28103d1-28103e0 76->82 83 28103e2-2810437 call 2810ce7 82->83 84 2810439-28104b8 VirtualFree 82->84 83->82 86 28105f4-28105fe 84->86 87 28104be-28104cd 84->87 90 2810604-281060d 86->90 91 281077f-2810789 86->91 89 28104d3-28104dd 87->89 89->86 93 28104e3-2810505 89->93 90->91 96 2810613-2810637 90->96 94 28107a6-28107b0 91->94 95 281078b-28107a3 91->95 104 2810517-2810520 93->104 105 2810507-2810515 93->105 97 28107b6-28107cb 94->97 98 281086e-28108be LoadLibraryA 94->98 95->94 99 281063e-2810648 96->99 101 28107d2-28107d5 97->101 103 28108c7-28108f9 98->103 99->91 102 281064e-281065a 99->102 106 2810824-2810833 101->106 107 28107d7-28107e0 101->107 102->91 108 2810660-281066a 102->108 111 2810902-281091d 103->111 112 28108fb-2810901 103->112 113 2810526-2810547 104->113 105->113 110 2810839-281083c 106->110 114 28107e2 107->114 115 28107e4-2810822 107->115 109 281067a-2810689 108->109 116 2810750-281077a 109->116 117 281068f-28106b2 109->117 110->98 118 281083e-2810847 110->118 112->111 119 281054d-2810550 113->119 114->106 115->101 116->99 120 28106b4-28106ed 117->120 121 28106ef-28106fc 117->121 122 2810849 118->122 123 281084b-281086c 118->123 125 28105e0-28105ef 119->125 126 2810556-281056b 119->126 120->121 129 281074b 121->129 130 28106fe-2810748 121->130 122->98 123->110 125->89 127 281056d 126->127 128 281056f-281057a 126->128 127->125 131 281059b-28105bb 128->131 132 281057c-2810599 128->132 129->109 130->129 137 28105bd-28105db 131->137 132->137 137->119
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0281024D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1980277613.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2810000_utdciaf.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: cess$kernel32.dll
                                                                • API String ID: 4275171209-1230238691
                                                                • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction ID: f4ec62c4d129d2e658f4702112ec1a846add4b308be7e49c314ac1af42bcde23
                                                                • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                • Instruction Fuzzy Hash: F5526C78A01229DFDB64CF58C984BACBBB5BF09304F1480D9E94DAB351DB30AA85CF15

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 537 28aeaa4-28aeabd 538 28aeabf-28aeac1 537->538 539 28aeac8-28aead4 CreateToolhelp32Snapshot 538->539 540 28aeac3 538->540 541 28aead6-28aeadc 539->541 542 28aeae4-28aeaf1 Module32First 539->542 540->539 541->542 548 28aeade-28aeae2 541->548 543 28aeafa-28aeb02 542->543 544 28aeaf3-28aeaf4 call 28ae763 542->544 549 28aeaf9 544->549 548->538 548->542 549->543
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 028AEACC
                                                                • Module32First.KERNEL32(00000000,00000224), ref: 028AEAEC
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1980398468.00000000028AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 028AC000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28ac000_utdciaf.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 3833638111-0
                                                                • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction ID: 81a1b1b893645b0530557191296f05b57c83997be66f380cb565d82b3fe574ab
                                                                • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                • Instruction Fuzzy Hash: E1F04F3D5007116FE7206AE99898B6E76E8BF59625F140939E647D10C0DFB0F8458A61

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 550 2810e0f-2810e24 SetErrorMode * 2 551 2810e26 550->551 552 2810e2b-2810e2c 550->552 551->552
                                                                APIs
                                                                • SetErrorMode.KERNELBASE(00000400,?,?,02810223,?,?), ref: 02810E19
                                                                • SetErrorMode.KERNELBASE(00000000,?,?,02810223,?,?), ref: 02810E1E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1980277613.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2810000_utdciaf.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorMode
                                                                • String ID:
                                                                • API String ID: 2340568224-0
                                                                • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction ID: 2990e7859dc59adbfe0ae8cfe0c40638cdeba9547af7afc42933400fb5fde7f1
                                                                • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                • Instruction Fuzzy Hash: B5D0123514512877DB002A95DC09BCD7B1CDF05B66F008011FB0DD9080C770954046E5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 553 417261-417263 554 417265 553->554 555 417267-417269 553->555 554->555 556 41726b VirtualProtect 555->556 557 41726d-417272 555->557 556->557
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(00000040,?), ref: 0041726B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: edb65285c22d606139e282b350792270a45ff417db56b3c7e0e4ae7122eae3aa
                                                                • Instruction ID: 60cecf79b7f1d9d7607203fd7feae80ce1f2e64b42e4a18a650d02a069ea4c0b
                                                                • Opcode Fuzzy Hash: edb65285c22d606139e282b350792270a45ff417db56b3c7e0e4ae7122eae3aa
                                                                • Instruction Fuzzy Hash: 0CC02B70D48006A7D50047207CC18C73B6DF1013D632044467C3680500863844D70B79

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 558 417255-417272 VirtualProtect
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(00000040,?), ref: 0041726B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                                                                • Instruction ID: 4c62818881ac23e86d27b7ad5f6e3bb285c85b39ac0806b91a2128f0277fdf34
                                                                • Opcode Fuzzy Hash: 2b88e49853c53da7588208df039261d9438041cc52994e21c16ec495ebbe39ff
                                                                • Instruction Fuzzy Hash: 8CC08CB194020DFFDB018B91FC41E8D7BACF300248F808020B716A1060CAB1AD289F68
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                                                • Instruction ID: 41df8370e0b5f9a47a14a91e784646d83bdfa422f97ac69dcfec837627d5bcb0
                                                                • Opcode Fuzzy Hash: be810bd81fc1513bf14dac74237aa616a3cfbc48422f9378a192f31e1e69cca3
                                                                • Instruction Fuzzy Hash: 6D018CF520C148E7EB016A948DB1EBA36299B45324F300233B647B91F4C57C8A03E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                                                • Instruction ID: 34fc3aff5e218d4630d956a4f9c4c41b7245144a44faa4fd8074b33eba8f9d72
                                                                • Opcode Fuzzy Hash: 3ad2d4b3403b833ed421c634174be831538fe621ff724946387ec8f91c54f5fa
                                                                • Instruction Fuzzy Hash: 43017CF5208145E7EB015A948DB0EBA26299B45314F300237B617BA1F4C57D8602E76F
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 028AE7B4
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1980398468.00000000028AC000.00000040.00000020.00020000.00000000.sdmp, Offset: 028AC000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28ac000_utdciaf.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction ID: ffbcf39ef1a2affb5b93573528cd974b34c7a0332773f45eed67995adcbf4384
                                                                • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                • Instruction Fuzzy Hash: C4113C79A00208EFDB01DF98C995E99BFF5AF08351F0580A4FA489B361D771EA50DF81
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                                                • Instruction ID: 53d82b158b021bc4b6cde56962adc0b8c8d23177238c0d6ee964112a53f005ae
                                                                • Opcode Fuzzy Hash: 6acc595331c6a8be6e6657ef398eef7c869974a8ecae4d1fde63dfd35a725e44
                                                                • Instruction Fuzzy Hash: 38F0AFB6308249F7DB01AA908DB1EBA36299B54315F300633B617B91F5C57C8A12E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                                                • Instruction ID: f7568a5a22988f4b084f7ac8228f9b89e575eda69d31bfffabc36cd9cbe45c64
                                                                • Opcode Fuzzy Hash: 0dfbee2e4a1c62836b2bd3ba6284fddb5b43d5507a7098400a51ac80bc720613
                                                                • Instruction Fuzzy Hash: BDF0C2B6208144F7DB019AA18DB1FBA36299B44314F300233BA17B90F5C67C8612E76F
                                                                APIs
                                                                • Sleep.KERNELBASE(00001388), ref: 00401966
                                                                  • Part of subcall function 00401538: NtDuplicateObject.NTDLL(?,000000FF,000000FF,?,00000000,00000000,00000002), ref: 004015F5
                                                                  • Part of subcall function 00401538: NtCreateSection.NTDLL(?,00000006,00000000,?,00000004,08000000,00000000), ref: 00401622
                                                                  • Part of subcall function 00401538: NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,00000000,00000001,00000000,00000004,?), ref: 00401645
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978894580.0000000000400000.00000040.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_400000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Section$CreateDuplicateObjectSleepView
                                                                • String ID:
                                                                • API String ID: 1885482327-0
                                                                • Opcode ID: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                                                • Instruction ID: 9d6088553fbd849a34ffa1589a5f9bffd683413c7e042594889390f4c4f3f426
                                                                • Opcode Fuzzy Hash: f575feb9a37452ed4573e207967fb92b714552aa85f9b6ebf0a13cec3e485039
                                                                • Instruction Fuzzy Hash: 08F0C2B2208144F7DB019A958DA0FBA36299B44314F300633B617B91F5C57C8A02E72F
                                                                APIs
                                                                • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004173D0
                                                                • OpenJobObjectA.KERNEL32(00000000,00000000,00000000), ref: 004173ED
                                                                • BuildCommDCBW.KERNEL32(00000000,?), ref: 004173F8
                                                                • LoadLibraryA.KERNEL32(00000000), ref: 004173FF
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: Object$BuildCommCreateLibraryLoadOpen
                                                                • String ID:
                                                                • API String ID: 2043902199-0
                                                                • Opcode ID: 22d375c7685d614c2e767f9d77a3bae846fed0ceaca9cc11a963bcee4c6ddcf9
                                                                • Instruction ID: 538a1098ab18fdcd7f5c89deeca578abe8e39d64f6f8ffa6e11bd328fb467d45
                                                                • Opcode Fuzzy Hash: 22d375c7685d614c2e767f9d77a3bae846fed0ceaca9cc11a963bcee4c6ddcf9
                                                                • Instruction Fuzzy Hash: 7DE0A531802628EF87116B65EC488DF7EACFF0A399B41C425F80591105EB784A4ACFE9
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(02705280), ref: 0041733F
                                                                • GetProcAddress.KERNEL32(00000000,0041D350), ref: 0041737C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID:
                                                                • API String ID: 1646373207-3916222277
                                                                • Opcode ID: 693097cdd84ba9854c5dbe997ef4c84b1086e9171fec20937db4cb2167ac3d77
                                                                • Instruction ID: ba4d6c142ba7ccf009f6c0096dda4db49fcd10d01fa393c79593df2f4b69b48b
                                                                • Opcode Fuzzy Hash: 693097cdd84ba9854c5dbe997ef4c84b1086e9171fec20937db4cb2167ac3d77
                                                                • Instruction Fuzzy Hash: 1E318EB5D893C4DCF30187A4B8497B23BA1AB16B04F48846AD954CB2A5D7FA0458CB6F
                                                                APIs
                                                                • GetComputerNameA.KERNEL32(?,?), ref: 00417458
                                                                • SleepEx.KERNEL32(00000000,00000000), ref: 00417462
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.1978917754.000000000040B000.00000020.00000001.01000000.00000006.sdmp, Offset: 0040B000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_40b000_utdciaf.jbxd
                                                                Similarity
                                                                • API ID: ComputerNameSleep
                                                                • String ID: -
                                                                • API String ID: 3354815184-2547889144
                                                                • Opcode ID: 97ed86ef0d1d3dcd1672e9104d971e6efe8f92cb71a9fd58bed177ce68b1d4fe
                                                                • Instruction ID: 5019951e24b89559604e4b6ab8fbef410b58f40e9a8043ba9cdfc04514e30fef
                                                                • Opcode Fuzzy Hash: 97ed86ef0d1d3dcd1672e9104d971e6efe8f92cb71a9fd58bed177ce68b1d4fe
                                                                • Instruction Fuzzy Hash: 3401D6B0804218D6D7209F64D9C17DEBFB8EB08314F4141ADE745B6185CE385ACACFAC

                                                                Execution Graph

                                                                Execution Coverage:18.5%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:19.6%
                                                                Total number of Nodes:1454
                                                                Total number of Limit Nodes:33
                                                                execution_graph 4044 401ec5 4045 402c17 17 API calls 4044->4045 4046 401ecb 4045->4046 4047 402c17 17 API calls 4046->4047 4048 401ed7 4047->4048 4049 401ee3 ShowWindow 4048->4049 4050 401eee EnableWindow 4048->4050 4051 402ac5 4049->4051 4050->4051 3366 401746 3367 402c39 17 API calls 3366->3367 3368 40174d 3367->3368 3372 405f4a 3368->3372 3370 401754 3371 405f4a 2 API calls 3370->3371 3371->3370 3373 405f55 GetTickCount GetTempFileNameA 3372->3373 3374 405f82 3373->3374 3375 405f86 3373->3375 3374->3373 3374->3375 3375->3370 4052 401947 4053 402c39 17 API calls 4052->4053 4054 40194e lstrlenA 4053->4054 4055 402628 4054->4055 4059 401fcb 4060 402c39 17 API calls 4059->4060 4061 401fd2 4060->4061 4062 4066ff 2 API calls 4061->4062 4063 401fd8 4062->4063 4065 401fea 4063->4065 4066 4062e6 wsprintfA 4063->4066 4066->4065 3412 4034cc SetErrorMode GetVersionExA 3413 40351e GetVersionExA 3412->3413 3415 40355d 3412->3415 3414 40353a 3413->3414 3413->3415 3414->3415 3416 4035e1 3415->3416 3417 406794 5 API calls 3415->3417 3504 406726 GetSystemDirectoryA 3416->3504 3417->3416 3419 4035f7 lstrlenA 3419->3416 3420 403607 3419->3420 3507 406794 GetModuleHandleA 3420->3507 3423 406794 5 API calls 3424 403615 3423->3424 3425 406794 5 API calls 3424->3425 3426 403621 #17 OleInitialize SHGetFileInfoA 3425->3426 3513 406388 lstrcpynA 3426->3513 3429 40366f GetCommandLineA 3514 406388 lstrcpynA 3429->3514 3431 403681 3432 405d45 CharNextA 3431->3432 3433 4036a8 CharNextA 3432->3433 3439 4036b7 3433->3439 3434 40377d 3435 403791 GetTempPathA 3434->3435 3515 40349b 3435->3515 3437 4037a9 3440 403803 DeleteFileA 3437->3440 3441 4037ad GetWindowsDirectoryA lstrcatA 3437->3441 3438 405d45 CharNextA 3438->3439 3439->3434 3439->3438 3445 40377f 3439->3445 3525 402f5c GetTickCount GetModuleFileNameA 3440->3525 3442 40349b 12 API calls 3441->3442 3444 4037c9 3442->3444 3444->3440 3447 4037cd GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3444->3447 3612 406388 lstrcpynA 3445->3612 3446 403816 3448 4038ae ExitProcess OleUninitialize 3446->3448 3451 40389b 3446->3451 3458 405d45 CharNextA 3446->3458 3450 40349b 12 API calls 3447->3450 3452 4038c5 3448->3452 3453 4039e8 3448->3453 3456 4037fb 3450->3456 3555 403b6e 3451->3555 3459 405a9e MessageBoxIndirectA 3452->3459 3454 4039f0 GetCurrentProcess OpenProcessToken 3453->3454 3455 403a66 ExitProcess 3453->3455 3460 403a36 3454->3460 3461 403a07 LookupPrivilegeValueA AdjustTokenPrivileges 3454->3461 3456->3440 3456->3448 3463 403830 3458->3463 3465 4038d2 ExitProcess 3459->3465 3466 406794 5 API calls 3460->3466 3461->3460 3467 403875 3463->3467 3468 4038da 3463->3468 3469 403a3d 3466->3469 3613 405e08 3467->3613 3629 405a09 3468->3629 3472 403a52 ExitWindowsEx 3469->3472 3475 403a5f 3469->3475 3472->3455 3472->3475 3649 40140b 3475->3649 3476 4038f0 lstrcatA 3477 4038fb lstrcatA lstrcmpiA 3476->3477 3477->3448 3479 403917 3477->3479 3481 403923 3479->3481 3482 40391c 3479->3482 3637 4059ec CreateDirectoryA 3481->3637 3632 40596f CreateDirectoryA 3482->3632 3483 403890 3628 406388 lstrcpynA 3483->3628 3488 403928 SetCurrentDirectoryA 3489 403943 3488->3489 3490 403938 3488->3490 3641 406388 lstrcpynA 3489->3641 3640 406388 lstrcpynA 3490->3640 3493 40641b 17 API calls 3494 403985 DeleteFileA 3493->3494 3495 403993 CopyFileA 3494->3495 3501 403950 3494->3501 3495->3501 3496 4039dc 3498 406161 36 API calls 3496->3498 3499 4039e3 3498->3499 3499->3448 3500 40641b 17 API calls 3500->3501 3501->3493 3501->3496 3501->3500 3503 4039c7 CloseHandle 3501->3503 3642 406161 MoveFileExA 3501->3642 3646 405a21 CreateProcessA 3501->3646 3503->3501 3505 406748 wsprintfA LoadLibraryExA 3504->3505 3505->3419 3508 4067b0 3507->3508 3509 4067ba GetProcAddress 3507->3509 3510 406726 3 API calls 3508->3510 3511 40360e 3509->3511 3512 4067b6 3510->3512 3511->3423 3512->3509 3512->3511 3513->3429 3514->3431 3516 406666 5 API calls 3515->3516 3518 4034a7 3516->3518 3517 4034b1 3517->3437 3518->3517 3652 405d1a lstrlenA CharPrevA 3518->3652 3521 4059ec 2 API calls 3522 4034bf 3521->3522 3523 405f4a 2 API calls 3522->3523 3524 4034ca 3523->3524 3524->3437 3655 405f1b GetFileAttributesA CreateFileA 3525->3655 3527 402f9f 3554 402fac 3527->3554 3656 406388 lstrcpynA 3527->3656 3529 402fc2 3657 405d61 lstrlenA 3529->3657 3533 402fd3 GetFileSize 3534 4030cd 3533->3534 3553 402fea 3533->3553 3662 402ebd 3534->3662 3538 403112 GlobalAlloc 3540 403129 3538->3540 3539 40316a 3543 402ebd 32 API calls 3539->3543 3545 405f4a 2 API calls 3540->3545 3542 4030f3 3544 40346e ReadFile 3542->3544 3543->3554 3546 4030fe 3544->3546 3548 40313a CreateFileA 3545->3548 3546->3538 3546->3554 3547 402ebd 32 API calls 3547->3553 3549 403174 3548->3549 3548->3554 3677 403484 SetFilePointer 3549->3677 3551 403182 3678 4031fd 3551->3678 3553->3534 3553->3539 3553->3547 3553->3554 3693 40346e 3553->3693 3554->3446 3556 406794 5 API calls 3555->3556 3557 403b82 3556->3557 3558 403b88 3557->3558 3559 403b9a 3557->3559 3737 4062e6 wsprintfA 3558->3737 3560 40626f 3 API calls 3559->3560 3561 403bc5 3560->3561 3562 403be3 lstrcatA 3561->3562 3565 40626f 3 API calls 3561->3565 3564 403b98 3562->3564 3729 403e33 3564->3729 3565->3562 3568 405e08 18 API calls 3569 403c15 3568->3569 3570 403c9e 3569->3570 3572 40626f 3 API calls 3569->3572 3571 405e08 18 API calls 3570->3571 3574 403ca4 3571->3574 3575 403c41 3572->3575 3573 403cb4 LoadImageA 3577 403d5a 3573->3577 3578 403cdb RegisterClassA 3573->3578 3574->3573 3576 40641b 17 API calls 3574->3576 3575->3570 3579 403c5d lstrlenA 3575->3579 3582 405d45 CharNextA 3575->3582 3576->3573 3581 40140b 2 API calls 3577->3581 3580 403d11 SystemParametersInfoA CreateWindowExA 3578->3580 3611 4038ab 3578->3611 3583 403c91 3579->3583 3584 403c6b lstrcmpiA 3579->3584 3580->3577 3585 403d60 3581->3585 3586 403c5b 3582->3586 3588 405d1a 3 API calls 3583->3588 3584->3583 3587 403c7b GetFileAttributesA 3584->3587 3590 403e33 18 API calls 3585->3590 3585->3611 3586->3579 3589 403c87 3587->3589 3591 403c97 3588->3591 3589->3583 3592 405d61 2 API calls 3589->3592 3593 403d71 3590->3593 3738 406388 lstrcpynA 3591->3738 3592->3583 3595 403e00 3593->3595 3596 403d7d ShowWindow 3593->3596 3739 40557b OleInitialize 3595->3739 3598 406726 3 API calls 3596->3598 3600 403d95 3598->3600 3599 403e06 3602 403e22 3599->3602 3603 403e0a 3599->3603 3601 403da3 GetClassInfoA 3600->3601 3604 406726 3 API calls 3600->3604 3606 403db7 GetClassInfoA RegisterClassA 3601->3606 3607 403dcd DialogBoxParamA 3601->3607 3605 40140b 2 API calls 3602->3605 3609 40140b 2 API calls 3603->3609 3603->3611 3604->3601 3605->3611 3606->3607 3608 40140b 2 API calls 3607->3608 3610 403df5 3608->3610 3609->3611 3610->3611 3611->3448 3612->3435 3757 406388 lstrcpynA 3613->3757 3615 405e19 3758 405db3 CharNextA CharNextA 3615->3758 3618 403881 3618->3448 3627 406388 lstrcpynA 3618->3627 3619 406666 5 API calls 3625 405e2f 3619->3625 3620 405e5a lstrlenA 3621 405e65 3620->3621 3620->3625 3622 405d1a 3 API calls 3621->3622 3624 405e6a GetFileAttributesA 3622->3624 3624->3618 3625->3618 3625->3620 3626 405d61 2 API calls 3625->3626 3764 4066ff FindFirstFileA 3625->3764 3626->3620 3627->3483 3628->3451 3630 406794 5 API calls 3629->3630 3631 4038df lstrcatA 3630->3631 3631->3476 3631->3477 3633 4059c0 GetLastError 3632->3633 3634 403921 3632->3634 3633->3634 3635 4059cf SetFileSecurityA 3633->3635 3634->3488 3635->3634 3636 4059e5 GetLastError 3635->3636 3636->3634 3638 405a00 GetLastError 3637->3638 3639 4059fc 3637->3639 3638->3639 3639->3488 3640->3489 3641->3501 3643 406182 3642->3643 3644 406175 3642->3644 3643->3501 3767 405ff1 3644->3767 3647 405a60 3646->3647 3648 405a54 CloseHandle 3646->3648 3647->3501 3648->3647 3650 401389 2 API calls 3649->3650 3651 401420 3650->3651 3651->3455 3653 405d34 lstrcatA 3652->3653 3654 4034b9 3652->3654 3653->3654 3654->3521 3655->3527 3656->3529 3658 405d6e 3657->3658 3659 405d73 CharPrevA 3658->3659 3660 402fc8 3658->3660 3659->3658 3659->3660 3661 406388 lstrcpynA 3660->3661 3661->3533 3663 402ee3 3662->3663 3664 402ecb 3662->3664 3667 402ef3 GetTickCount 3663->3667 3668 402eeb 3663->3668 3665 402ed4 DestroyWindow 3664->3665 3666 402edb 3664->3666 3665->3666 3666->3538 3666->3554 3696 403484 SetFilePointer 3666->3696 3667->3666 3670 402f01 3667->3670 3697 4067d0 3668->3697 3671 402f36 CreateDialogParamA ShowWindow 3670->3671 3672 402f09 3670->3672 3671->3666 3672->3666 3701 402ea1 3672->3701 3674 402f17 wsprintfA 3675 4054a9 24 API calls 3674->3675 3676 402f34 3675->3676 3676->3666 3677->3551 3679 403228 3678->3679 3680 40320c SetFilePointer 3678->3680 3704 403305 GetTickCount 3679->3704 3680->3679 3685 403305 42 API calls 3686 40325f 3685->3686 3687 4032c5 3686->3687 3688 4032cb ReadFile 3686->3688 3689 40326e 3686->3689 3687->3554 3688->3687 3689->3687 3691 405f93 ReadFile 3689->3691 3719 405fc2 WriteFile 3689->3719 3691->3689 3694 405f93 ReadFile 3693->3694 3695 403481 3694->3695 3695->3553 3696->3542 3698 4067ed PeekMessageA 3697->3698 3699 4067e3 DispatchMessageA 3698->3699 3700 4067fd 3698->3700 3699->3698 3700->3666 3702 402eb0 3701->3702 3703 402eb2 MulDiv 3701->3703 3702->3703 3703->3674 3705 403333 3704->3705 3706 40345d 3704->3706 3721 403484 SetFilePointer 3705->3721 3707 402ebd 32 API calls 3706->3707 3713 40322f 3707->3713 3709 40333e SetFilePointer 3714 403363 3709->3714 3710 40346e ReadFile 3710->3714 3712 402ebd 32 API calls 3712->3714 3713->3687 3717 405f93 ReadFile 3713->3717 3714->3710 3714->3712 3714->3713 3715 405fc2 WriteFile 3714->3715 3716 40343e SetFilePointer 3714->3716 3722 4068d9 3714->3722 3715->3714 3716->3706 3718 403248 3717->3718 3718->3685 3718->3687 3720 405fe0 3719->3720 3720->3689 3721->3709 3723 4068fe 3722->3723 3728 406906 3722->3728 3723->3714 3724 406996 GlobalAlloc 3724->3723 3724->3728 3725 40698d GlobalFree 3725->3724 3726 406a04 GlobalFree 3727 406a0d GlobalAlloc 3726->3727 3727->3723 3727->3728 3728->3723 3728->3724 3728->3725 3728->3726 3728->3727 3730 403e47 3729->3730 3746 4062e6 wsprintfA 3730->3746 3732 403eb8 3747 403eec 3732->3747 3734 403bf3 3734->3568 3735 403ebd 3735->3734 3736 40641b 17 API calls 3735->3736 3736->3735 3737->3564 3738->3570 3750 404451 3739->3750 3741 40559e 3745 4055c5 3741->3745 3753 401389 3741->3753 3742 404451 SendMessageA 3743 4055d7 OleUninitialize 3742->3743 3743->3599 3745->3742 3746->3732 3748 40641b 17 API calls 3747->3748 3749 403efa SetWindowTextA 3748->3749 3749->3735 3751 404469 3750->3751 3752 40445a SendMessageA 3750->3752 3751->3741 3752->3751 3755 401390 3753->3755 3754 4013fe 3754->3741 3755->3754 3756 4013cb MulDiv SendMessageA 3755->3756 3756->3755 3757->3615 3759 405dde 3758->3759 3760 405dce 3758->3760 3762 405d45 CharNextA 3759->3762 3763 405dfe 3759->3763 3760->3759 3761 405dd9 CharNextA 3760->3761 3761->3763 3762->3759 3763->3618 3763->3619 3765 406715 FindClose 3764->3765 3766 406720 3764->3766 3765->3766 3766->3625 3768 406017 3767->3768 3769 40603d GetShortPathNameA 3767->3769 3794 405f1b GetFileAttributesA CreateFileA 3768->3794 3771 406052 3769->3771 3772 40615c 3769->3772 3771->3772 3774 40605a wsprintfA 3771->3774 3772->3643 3773 406021 CloseHandle GetShortPathNameA 3773->3772 3776 406035 3773->3776 3775 40641b 17 API calls 3774->3775 3777 406082 3775->3777 3776->3769 3776->3772 3795 405f1b GetFileAttributesA CreateFileA 3777->3795 3779 40608f 3779->3772 3780 40609e GetFileSize GlobalAlloc 3779->3780 3781 4060c0 3780->3781 3782 406155 CloseHandle 3780->3782 3783 405f93 ReadFile 3781->3783 3782->3772 3784 4060c8 3783->3784 3784->3782 3796 405e80 lstrlenA 3784->3796 3787 4060f3 3789 405e80 4 API calls 3787->3789 3788 4060df lstrcpyA 3790 406101 3788->3790 3789->3790 3791 406138 SetFilePointer 3790->3791 3792 405fc2 WriteFile 3791->3792 3793 40614e GlobalFree 3792->3793 3793->3782 3794->3773 3795->3779 3797 405ec1 lstrlenA 3796->3797 3798 405ec9 3797->3798 3799 405e9a lstrcmpiA 3797->3799 3798->3787 3798->3788 3799->3798 3800 405eb8 CharNextA 3799->3800 3800->3797 4067 404850 4068 404860 4067->4068 4069 404886 4067->4069 4074 404405 4068->4074 4077 40446c 4069->4077 4072 40486d SetDlgItemTextA 4072->4069 4075 40641b 17 API calls 4074->4075 4076 404410 SetDlgItemTextA 4075->4076 4076->4072 4078 40452f 4077->4078 4079 404484 GetWindowLongA 4077->4079 4079->4078 4080 404499 4079->4080 4080->4078 4081 4044c6 GetSysColor 4080->4081 4082 4044c9 4080->4082 4081->4082 4083 4044d9 SetBkMode 4082->4083 4084 4044cf SetTextColor 4082->4084 4085 4044f1 GetSysColor 4083->4085 4086 4044f7 4083->4086 4084->4083 4085->4086 4087 4044fe SetBkColor 4086->4087 4088 404508 4086->4088 4087->4088 4088->4078 4089 404522 CreateBrushIndirect 4088->4089 4090 40451b DeleteObject 4088->4090 4089->4078 4090->4089 4098 4014d6 4099 402c17 17 API calls 4098->4099 4100 4014dc Sleep 4099->4100 4102 402ac5 4100->4102 3896 401759 3897 402c39 17 API calls 3896->3897 3898 401760 3897->3898 3899 401786 3898->3899 3900 40177e 3898->3900 3936 406388 lstrcpynA 3899->3936 3935 406388 lstrcpynA 3900->3935 3903 401784 3907 406666 5 API calls 3903->3907 3904 401791 3905 405d1a 3 API calls 3904->3905 3906 401797 lstrcatA 3905->3906 3906->3903 3922 4017a3 3907->3922 3908 4066ff 2 API calls 3908->3922 3909 405ef6 2 API calls 3909->3922 3911 4017ba CompareFileTime 3911->3922 3912 40187e 3913 4054a9 24 API calls 3912->3913 3915 401888 3913->3915 3914 401855 3916 4054a9 24 API calls 3914->3916 3923 40186a 3914->3923 3917 4031fd 44 API calls 3915->3917 3916->3923 3918 40189b 3917->3918 3919 4018af SetFileTime 3918->3919 3921 4018c1 FindCloseChangeNotification 3918->3921 3919->3921 3920 40641b 17 API calls 3920->3922 3921->3923 3924 4018d2 3921->3924 3922->3908 3922->3909 3922->3911 3922->3912 3922->3914 3922->3920 3925 406388 lstrcpynA 3922->3925 3930 405a9e MessageBoxIndirectA 3922->3930 3934 405f1b GetFileAttributesA CreateFileA 3922->3934 3926 4018d7 3924->3926 3927 4018ea 3924->3927 3925->3922 3928 40641b 17 API calls 3926->3928 3929 40641b 17 API calls 3927->3929 3931 4018df lstrcatA 3928->3931 3932 4018f2 3929->3932 3930->3922 3931->3932 3933 405a9e MessageBoxIndirectA 3932->3933 3933->3923 3934->3922 3935->3903 3936->3904 4103 401659 4104 402c39 17 API calls 4103->4104 4105 40165f 4104->4105 4106 4066ff 2 API calls 4105->4106 4107 401665 4106->4107 4108 401959 4109 402c17 17 API calls 4108->4109 4110 401960 4109->4110 4111 402c17 17 API calls 4110->4111 4112 40196d 4111->4112 4113 402c39 17 API calls 4112->4113 4114 401984 lstrlenA 4113->4114 4116 401994 4114->4116 4115 4019d4 4116->4115 4120 406388 lstrcpynA 4116->4120 4118 4019c4 4118->4115 4119 4019c9 lstrlenA 4118->4119 4119->4115 4120->4118 4121 401a5e 4122 402c17 17 API calls 4121->4122 4123 401a67 4122->4123 4124 402c17 17 API calls 4123->4124 4125 401a0e 4124->4125 4126 401563 4127 402a42 4126->4127 4130 4062e6 wsprintfA 4127->4130 4129 402a47 4130->4129 4131 401b63 4132 402c39 17 API calls 4131->4132 4133 401b6a 4132->4133 4134 402c17 17 API calls 4133->4134 4135 401b73 wsprintfA 4134->4135 4136 402ac5 4135->4136 4137 100013a4 4144 10001426 4137->4144 4145 100013d0 4144->4145 4147 1000142f 4144->4147 4149 100010d0 GetVersionExA 4145->4149 4146 1000145f GlobalFree 4146->4145 4147->4145 4147->4146 4148 1000144b lstrcpynA 4147->4148 4148->4146 4150 10001106 4149->4150 4165 100010fc 4149->4165 4151 10001122 LoadLibraryW 4150->4151 4152 1000110e 4150->4152 4154 1000113b GetProcAddress 4151->4154 4164 100011a5 4151->4164 4153 10001225 LoadLibraryA 4152->4153 4152->4165 4156 1000123d GetProcAddress GetProcAddress GetProcAddress 4153->4156 4153->4165 4155 1000114e LocalAlloc 4154->4155 4161 1000118e 4154->4161 4157 10001189 4155->4157 4159 10001323 FreeLibrary 4156->4159 4173 1000126b 4156->4173 4160 1000115c NtQuerySystemInformation 4157->4160 4157->4161 4158 1000119a FreeLibrary 4158->4164 4159->4165 4160->4158 4162 1000116f LocalFree 4160->4162 4161->4158 4162->4161 4166 10001180 LocalAlloc 4162->4166 4163 100011c1 WideCharToMultiByte lstrcmpiA 4163->4164 4164->4163 4164->4165 4167 10001217 LocalFree 4164->4167 4168 100011f7 4164->4168 4175 100014ba wsprintfA 4165->4175 4166->4157 4167->4165 4168->4164 4169 1000103f 8 API calls 4168->4169 4169->4168 4170 100012a2 lstrlenA 4170->4173 4171 1000131c CloseHandle 4171->4159 4172 100012c4 lstrcpynA lstrcmpiA 4172->4173 4173->4159 4173->4170 4173->4171 4173->4172 4174 1000103f 8 API calls 4173->4174 4174->4173 4178 10001475 4175->4178 4179 100013e3 4178->4179 4180 1000147e GlobalAlloc lstrcpynA 4178->4180 4180->4179 4181 401d65 4182 401d78 GetDlgItem 4181->4182 4183 401d6b 4181->4183 4184 401d72 4182->4184 4185 402c17 17 API calls 4183->4185 4186 401db9 GetClientRect LoadImageA SendMessageA 4184->4186 4187 402c39 17 API calls 4184->4187 4185->4184 4189 401e26 4186->4189 4190 401e1a 4186->4190 4187->4186 4190->4189 4191 401e1f DeleteObject 4190->4191 4191->4189 3376 10001426 3377 1000146f 3376->3377 3379 1000142f 3376->3379 3378 1000145f GlobalFree 3378->3377 3379->3377 3379->3378 3380 1000144b lstrcpynA 3379->3380 3380->3378 4192 402766 4193 40276c 4192->4193 4194 402774 FindClose 4193->4194 4195 402ac5 4193->4195 4194->4195 4196 4055e7 4197 405792 4196->4197 4198 405609 GetDlgItem GetDlgItem GetDlgItem 4196->4198 4200 40579a GetDlgItem CreateThread CloseHandle 4197->4200 4203 4057c2 4197->4203 4241 40443a SendMessageA 4198->4241 4200->4203 4201 405679 4207 405680 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4201->4207 4202 4057f0 4206 40584b 4202->4206 4209 405800 4202->4209 4210 405824 ShowWindow 4202->4210 4203->4202 4204 405811 4203->4204 4205 4057d8 ShowWindow ShowWindow 4203->4205 4211 40446c 8 API calls 4204->4211 4243 40443a SendMessageA 4205->4243 4206->4204 4216 405858 SendMessageA 4206->4216 4214 4056d2 SendMessageA SendMessageA 4207->4214 4215 4056ee 4207->4215 4244 4043de 4209->4244 4212 405844 4210->4212 4213 405836 4210->4213 4218 40581d 4211->4218 4220 4043de SendMessageA 4212->4220 4219 4054a9 24 API calls 4213->4219 4214->4215 4221 405701 4215->4221 4222 4056f3 SendMessageA 4215->4222 4216->4218 4223 405871 CreatePopupMenu 4216->4223 4219->4212 4220->4206 4225 404405 18 API calls 4221->4225 4222->4221 4224 40641b 17 API calls 4223->4224 4226 405881 AppendMenuA 4224->4226 4227 405711 4225->4227 4228 4058b2 TrackPopupMenu 4226->4228 4229 40589f GetWindowRect 4226->4229 4230 40571a ShowWindow 4227->4230 4231 40574e GetDlgItem SendMessageA 4227->4231 4228->4218 4233 4058ce 4228->4233 4229->4228 4234 405730 ShowWindow 4230->4234 4235 40573d 4230->4235 4231->4218 4232 405775 SendMessageA SendMessageA 4231->4232 4232->4218 4236 4058ed SendMessageA 4233->4236 4234->4235 4242 40443a SendMessageA 4235->4242 4236->4236 4237 40590a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4236->4237 4239 40592c SendMessageA 4237->4239 4239->4239 4240 40594e GlobalUnlock SetClipboardData CloseClipboard 4239->4240 4240->4218 4241->4201 4242->4231 4243->4202 4245 4043e5 4244->4245 4246 4043eb SendMessageA 4244->4246 4245->4246 4246->4204 4247 404be8 4248 404c14 4247->4248 4249 404bf8 4247->4249 4251 404c47 4248->4251 4252 404c1a SHGetPathFromIDListA 4248->4252 4258 405a82 GetDlgItemTextA 4249->4258 4254 404c31 SendMessageA 4252->4254 4255 404c2a 4252->4255 4253 404c05 SendMessageA 4253->4248 4254->4251 4256 40140b 2 API calls 4255->4256 4256->4254 4258->4253 4259 4023e8 4260 402c39 17 API calls 4259->4260 4261 4023f9 4260->4261 4262 402c39 17 API calls 4261->4262 4263 402402 4262->4263 4264 402c39 17 API calls 4263->4264 4265 40240c GetPrivateProfileStringA 4264->4265 4266 4027e8 4267 402c39 17 API calls 4266->4267 4268 4027f4 4267->4268 4269 40280a 4268->4269 4270 402c39 17 API calls 4268->4270 4271 405ef6 2 API calls 4269->4271 4270->4269 4272 402810 4271->4272 4294 405f1b GetFileAttributesA CreateFileA 4272->4294 4274 40281d 4275 4028d9 4274->4275 4276 4028c1 4274->4276 4277 402838 GlobalAlloc 4274->4277 4278 4028e0 DeleteFileA 4275->4278 4279 4028f3 4275->4279 4281 4031fd 44 API calls 4276->4281 4277->4276 4280 402851 4277->4280 4278->4279 4295 403484 SetFilePointer 4280->4295 4283 4028ce CloseHandle 4281->4283 4283->4275 4284 402857 4285 40346e ReadFile 4284->4285 4286 402860 GlobalAlloc 4285->4286 4287 402870 4286->4287 4288 4028aa 4286->4288 4290 4031fd 44 API calls 4287->4290 4289 405fc2 WriteFile 4288->4289 4291 4028b6 GlobalFree 4289->4291 4293 40287d 4290->4293 4291->4276 4292 4028a1 GlobalFree 4292->4288 4293->4292 4294->4274 4295->4284 4296 40166a 4297 402c39 17 API calls 4296->4297 4298 401671 4297->4298 4299 402c39 17 API calls 4298->4299 4300 40167a 4299->4300 4301 402c39 17 API calls 4300->4301 4302 401683 MoveFileA 4301->4302 4303 401696 4302->4303 4309 40168f 4302->4309 4305 4066ff 2 API calls 4303->4305 4307 4022ea 4303->4307 4304 401423 24 API calls 4304->4307 4306 4016a5 4305->4306 4306->4307 4308 406161 36 API calls 4306->4308 4308->4309 4309->4304 4317 4019ed 4318 402c39 17 API calls 4317->4318 4319 4019f4 4318->4319 4320 402c39 17 API calls 4319->4320 4321 4019fd 4320->4321 4322 401a04 lstrcmpiA 4321->4322 4323 401a16 lstrcmpA 4321->4323 4324 401a0a 4322->4324 4323->4324 4325 40156f 4326 401586 4325->4326 4327 40157f ShowWindow 4325->4327 4328 401594 ShowWindow 4326->4328 4329 402ac5 4326->4329 4327->4326 4328->4329 4330 404570 4331 404586 4330->4331 4336 404692 4330->4336 4334 404405 18 API calls 4331->4334 4332 404701 4333 4047cb 4332->4333 4335 40470b GetDlgItem 4332->4335 4342 40446c 8 API calls 4333->4342 4337 4045dc 4334->4337 4338 404721 4335->4338 4339 404789 4335->4339 4336->4332 4336->4333 4340 4046d6 GetDlgItem SendMessageA 4336->4340 4341 404405 18 API calls 4337->4341 4338->4339 4343 404747 SendMessageA LoadCursorA SetCursor 4338->4343 4339->4333 4344 40479b 4339->4344 4363 404427 EnableWindow 4340->4363 4346 4045e9 CheckDlgButton 4341->4346 4347 4047c6 4342->4347 4367 404814 4343->4367 4349 4047a1 SendMessageA 4344->4349 4350 4047b2 4344->4350 4361 404427 EnableWindow 4346->4361 4349->4350 4350->4347 4354 4047b8 SendMessageA 4350->4354 4351 4046fc 4364 4047f0 4351->4364 4354->4347 4356 404607 GetDlgItem 4362 40443a SendMessageA 4356->4362 4358 40461d SendMessageA 4359 404644 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4358->4359 4360 40463b GetSysColor 4358->4360 4359->4347 4360->4359 4361->4356 4362->4358 4363->4351 4365 404803 SendMessageA 4364->4365 4366 4047fe 4364->4366 4365->4332 4366->4365 4370 405a64 ShellExecuteExA 4367->4370 4369 40477a LoadCursorA SetCursor 4369->4339 4370->4369 4371 402173 4372 402c39 17 API calls 4371->4372 4373 40217a 4372->4373 4374 402c39 17 API calls 4373->4374 4375 402184 4374->4375 4376 402c39 17 API calls 4375->4376 4377 40218e 4376->4377 4378 402c39 17 API calls 4377->4378 4379 40219b 4378->4379 4380 402c39 17 API calls 4379->4380 4381 4021a5 4380->4381 4382 4021e7 CoCreateInstance 4381->4382 4383 402c39 17 API calls 4381->4383 4386 402206 4382->4386 4388 4022b4 4382->4388 4383->4382 4384 401423 24 API calls 4385 4022ea 4384->4385 4387 402294 MultiByteToWideChar 4386->4387 4386->4388 4387->4388 4388->4384 4388->4385 4389 4022f3 4390 402c39 17 API calls 4389->4390 4391 4022f9 4390->4391 4392 402c39 17 API calls 4391->4392 4393 402302 4392->4393 4394 402c39 17 API calls 4393->4394 4395 40230b 4394->4395 4396 4066ff 2 API calls 4395->4396 4397 402314 4396->4397 4398 402325 lstrlenA lstrlenA 4397->4398 4399 402318 4397->4399 4401 4054a9 24 API calls 4398->4401 4400 4054a9 24 API calls 4399->4400 4402 402320 4399->4402 4400->4402 4403 402361 SHFileOperationA 4401->4403 4403->4399 4403->4402 4404 4014f4 SetForegroundWindow 4405 402ac5 4404->4405 4406 402375 4407 40237c 4406->4407 4411 40238f 4406->4411 4408 40641b 17 API calls 4407->4408 4409 402389 4408->4409 4410 405a9e MessageBoxIndirectA 4409->4410 4410->4411 4412 402675 4413 402c17 17 API calls 4412->4413 4414 40267f 4413->4414 4415 405f93 ReadFile 4414->4415 4416 4026ef 4414->4416 4419 4026ff 4414->4419 4420 4026ed 4414->4420 4415->4414 4421 4062e6 wsprintfA 4416->4421 4418 402715 SetFilePointer 4418->4420 4419->4418 4419->4420 4421->4420 4422 4029f6 4423 402a49 4422->4423 4424 4029fd 4422->4424 4425 406794 5 API calls 4423->4425 4426 402c17 17 API calls 4424->4426 4432 402a47 4424->4432 4427 402a50 4425->4427 4428 402a0b 4426->4428 4429 402c39 17 API calls 4427->4429 4430 402c17 17 API calls 4428->4430 4431 402a59 4429->4431 4434 402a1a 4430->4434 4431->4432 4440 4063db 4431->4440 4439 4062e6 wsprintfA 4434->4439 4436 402a67 4436->4432 4444 4063c5 4436->4444 4439->4432 4442 4063e6 4440->4442 4441 406409 IIDFromString 4441->4436 4442->4441 4443 406402 4442->4443 4443->4436 4447 4063aa WideCharToMultiByte 4444->4447 4446 402a88 CoTaskMemFree 4446->4432 4447->4446 4448 401ef9 4449 402c39 17 API calls 4448->4449 4450 401eff 4449->4450 4451 402c39 17 API calls 4450->4451 4452 401f08 4451->4452 4453 402c39 17 API calls 4452->4453 4454 401f11 4453->4454 4455 402c39 17 API calls 4454->4455 4456 401f1a 4455->4456 4457 401423 24 API calls 4456->4457 4458 401f21 4457->4458 4465 405a64 ShellExecuteExA 4458->4465 4460 401f5c 4461 406809 5 API calls 4460->4461 4462 4027c8 4460->4462 4463 401f76 CloseHandle 4461->4463 4463->4462 4465->4460 3937 401f7b 3938 402c39 17 API calls 3937->3938 3939 401f81 3938->3939 3940 4054a9 24 API calls 3939->3940 3941 401f8b 3940->3941 3942 405a21 2 API calls 3941->3942 3943 401f91 3942->3943 3946 4027c8 3943->3946 3951 401fb2 CloseHandle 3943->3951 3952 406809 WaitForSingleObject 3943->3952 3947 401fa6 3948 401fb4 3947->3948 3949 401fab 3947->3949 3948->3951 3957 4062e6 wsprintfA 3949->3957 3951->3946 3953 406823 3952->3953 3954 406835 GetExitCodeProcess 3953->3954 3955 4067d0 2 API calls 3953->3955 3954->3947 3956 40682a WaitForSingleObject 3955->3956 3956->3953 3957->3951 4473 401ffb 4474 402c39 17 API calls 4473->4474 4475 402002 4474->4475 4476 406794 5 API calls 4475->4476 4477 402011 4476->4477 4478 402099 4477->4478 4479 402029 GlobalAlloc 4477->4479 4479->4478 4480 40203d 4479->4480 4481 406794 5 API calls 4480->4481 4482 402044 4481->4482 4483 406794 5 API calls 4482->4483 4484 40204e 4483->4484 4484->4478 4488 4062e6 wsprintfA 4484->4488 4486 402089 4489 4062e6 wsprintfA 4486->4489 4488->4486 4489->4478 3979 403a7c 3980 403a97 3979->3980 3981 403a8d CloseHandle 3979->3981 3982 403aa1 CloseHandle 3980->3982 3983 403aab 3980->3983 3981->3980 3982->3983 3988 403ad9 3983->3988 3986 405b4a 67 API calls 3987 403abc 3986->3987 3989 403ae7 3988->3989 3990 403ab0 3989->3990 3991 403aec FreeLibrary GlobalFree 3989->3991 3990->3986 3991->3990 3991->3991 4490 4018fd 4491 401934 4490->4491 4492 402c39 17 API calls 4491->4492 4493 401939 4492->4493 4494 405b4a 67 API calls 4493->4494 4495 401942 4494->4495 3992 40247e 3993 402c39 17 API calls 3992->3993 3994 402490 3993->3994 3995 402c39 17 API calls 3994->3995 3996 40249a 3995->3996 4009 402cc9 3996->4009 3999 402ac5 4000 4024cf 4002 4024db 4000->4002 4013 402c17 4000->4013 4001 402c39 17 API calls 4003 4024c8 lstrlenA 4001->4003 4005 4024fd RegSetValueExA 4002->4005 4006 4031fd 44 API calls 4002->4006 4003->4000 4007 402513 RegCloseKey 4005->4007 4006->4005 4007->3999 4010 402ce4 4009->4010 4016 40623c 4010->4016 4014 40641b 17 API calls 4013->4014 4015 402c2c 4014->4015 4015->4002 4017 40624b 4016->4017 4018 4024aa 4017->4018 4019 406256 RegCreateKeyExA 4017->4019 4018->3999 4018->4000 4018->4001 4019->4018 4496 401cfe 4497 402c17 17 API calls 4496->4497 4498 401d04 IsWindow 4497->4498 4499 401a0e 4498->4499 4500 401000 4501 401037 BeginPaint GetClientRect 4500->4501 4502 40100c DefWindowProcA 4500->4502 4504 4010f3 4501->4504 4505 401179 4502->4505 4506 401073 CreateBrushIndirect FillRect DeleteObject 4504->4506 4507 4010fc 4504->4507 4506->4504 4508 401102 CreateFontIndirectA 4507->4508 4509 401167 EndPaint 4507->4509 4508->4509 4510 401112 6 API calls 4508->4510 4509->4505 4510->4509 4511 401900 4512 402c39 17 API calls 4511->4512 4513 401907 4512->4513 4514 405a9e MessageBoxIndirectA 4513->4514 4515 401910 4514->4515 4516 402780 4517 402786 4516->4517 4518 40278a FindNextFileA 4517->4518 4519 40279c 4517->4519 4518->4519 4520 4027db 4518->4520 4522 406388 lstrcpynA 4520->4522 4522->4519 4523 401502 4524 40150a 4523->4524 4526 40151d 4523->4526 4525 402c17 17 API calls 4524->4525 4525->4526 3381 401b87 3382 401bd8 3381->3382 3387 401b94 3381->3387 3383 401c01 GlobalAlloc 3382->3383 3384 401bdc 3382->3384 3386 40641b 17 API calls 3383->3386 3395 40238f 3384->3395 3402 406388 lstrcpynA 3384->3402 3385 40641b 17 API calls 3388 402389 3385->3388 3390 401c1c 3386->3390 3387->3390 3391 401bab 3387->3391 3403 405a9e 3388->3403 3390->3385 3390->3395 3400 406388 lstrcpynA 3391->3400 3392 401bee GlobalFree 3392->3395 3396 401bba 3401 406388 lstrcpynA 3396->3401 3398 401bc9 3407 406388 lstrcpynA 3398->3407 3400->3396 3401->3398 3402->3392 3404 405ab3 3403->3404 3405 405aff 3404->3405 3406 405ac7 MessageBoxIndirectA 3404->3406 3405->3395 3406->3405 3407->3395 4527 406a88 4531 40690c 4527->4531 4528 407277 4529 406996 GlobalAlloc 4529->4528 4529->4531 4530 40698d GlobalFree 4530->4529 4531->4528 4531->4529 4531->4530 4532 406a04 GlobalFree 4531->4532 4533 406a0d GlobalAlloc 4531->4533 4532->4533 4533->4528 4533->4531 3408 401389 3410 401390 3408->3410 3409 4013fe 3410->3409 3411 4013cb MulDiv SendMessageA 3410->3411 3411->3410 4534 404e0a GetDlgItem GetDlgItem 4535 404e60 7 API calls 4534->4535 4542 405087 4534->4542 4536 404f08 DeleteObject 4535->4536 4537 404efc SendMessageA 4535->4537 4538 404f13 4536->4538 4537->4536 4540 404f4a 4538->4540 4543 40641b 17 API calls 4538->4543 4539 405169 4541 405215 4539->4541 4545 40507a 4539->4545 4551 4051c2 SendMessageA 4539->4551 4544 404405 18 API calls 4540->4544 4546 405227 4541->4546 4547 40521f SendMessageA 4541->4547 4542->4539 4566 4050f6 4542->4566 4588 404d58 SendMessageA 4542->4588 4548 404f2c SendMessageA SendMessageA 4543->4548 4549 404f5e 4544->4549 4553 40446c 8 API calls 4545->4553 4558 405240 4546->4558 4559 405239 ImageList_Destroy 4546->4559 4563 405250 4546->4563 4547->4546 4548->4538 4550 404405 18 API calls 4549->4550 4567 404f6f 4550->4567 4551->4545 4556 4051d7 SendMessageA 4551->4556 4552 40515b SendMessageA 4552->4539 4557 405416 4553->4557 4555 4053ca 4555->4545 4564 4053dc ShowWindow GetDlgItem ShowWindow 4555->4564 4561 4051ea 4556->4561 4562 405249 GlobalFree 4558->4562 4558->4563 4559->4558 4560 405049 GetWindowLongA SetWindowLongA 4565 405062 4560->4565 4573 4051fb SendMessageA 4561->4573 4562->4563 4563->4555 4568 40528b 4563->4568 4593 404dd8 4563->4593 4564->4545 4569 405067 ShowWindow 4565->4569 4570 40507f 4565->4570 4566->4539 4566->4552 4567->4560 4572 404fc1 SendMessageA 4567->4572 4574 405044 4567->4574 4576 405013 SendMessageA 4567->4576 4577 404fff SendMessageA 4567->4577 4581 4052b9 SendMessageA 4568->4581 4585 4052cf 4568->4585 4586 40443a SendMessageA 4569->4586 4587 40443a SendMessageA 4570->4587 4572->4567 4573->4541 4574->4560 4574->4565 4576->4567 4577->4567 4579 405395 4580 4053a0 InvalidateRect 4579->4580 4582 4053ac 4579->4582 4580->4582 4581->4585 4582->4555 4602 404d13 4582->4602 4584 405343 SendMessageA SendMessageA 4584->4585 4585->4579 4585->4584 4586->4545 4587->4542 4589 404db7 SendMessageA 4588->4589 4590 404d7b GetMessagePos ScreenToClient SendMessageA 4588->4590 4592 404daf 4589->4592 4591 404db4 4590->4591 4590->4592 4591->4589 4592->4566 4605 406388 lstrcpynA 4593->4605 4595 404deb 4606 4062e6 wsprintfA 4595->4606 4597 404df5 4598 40140b 2 API calls 4597->4598 4599 404dfe 4598->4599 4607 406388 lstrcpynA 4599->4607 4601 404e05 4601->4568 4608 404c4e 4602->4608 4604 404d28 4604->4555 4605->4595 4606->4597 4607->4601 4609 404c64 4608->4609 4610 40641b 17 API calls 4609->4610 4611 404cc8 4610->4611 4612 40641b 17 API calls 4611->4612 4613 404cd3 4612->4613 4614 40641b 17 API calls 4613->4614 4615 404ce9 lstrlenA wsprintfA SetDlgItemTextA 4614->4615 4615->4604 4616 40298a 4617 402c17 17 API calls 4616->4617 4619 402990 4617->4619 4618 40641b 17 API calls 4620 4027c8 4618->4620 4619->4618 4619->4620 4621 403f0b 4622 403f23 4621->4622 4623 404084 4621->4623 4622->4623 4624 403f2f 4622->4624 4625 4040d5 4623->4625 4626 404095 GetDlgItem GetDlgItem 4623->4626 4627 403f3a SetWindowPos 4624->4627 4628 403f4d 4624->4628 4630 40412f 4625->4630 4641 401389 2 API calls 4625->4641 4629 404405 18 API calls 4626->4629 4627->4628 4632 403f56 ShowWindow 4628->4632 4633 403f98 4628->4633 4634 4040bf SetClassLongA 4629->4634 4631 404451 SendMessageA 4630->4631 4635 40407f 4630->4635 4662 404141 4631->4662 4636 404042 4632->4636 4637 403f76 GetWindowLongA 4632->4637 4638 403fa0 DestroyWindow 4633->4638 4639 403fb7 4633->4639 4640 40140b 2 API calls 4634->4640 4642 40446c 8 API calls 4636->4642 4637->4636 4643 403f8f ShowWindow 4637->4643 4691 40438e 4638->4691 4644 403fbc SetWindowLongA 4639->4644 4645 403fcd 4639->4645 4640->4625 4646 404107 4641->4646 4642->4635 4643->4633 4644->4635 4645->4636 4650 403fd9 GetDlgItem 4645->4650 4646->4630 4647 40410b SendMessageA 4646->4647 4647->4635 4648 40140b 2 API calls 4648->4662 4649 404390 DestroyWindow EndDialog 4649->4691 4652 404007 4650->4652 4653 403fea SendMessageA IsWindowEnabled 4650->4653 4651 4043bf ShowWindow 4651->4635 4655 404014 4652->4655 4656 40405b SendMessageA 4652->4656 4657 404027 4652->4657 4665 40400c 4652->4665 4653->4635 4653->4652 4654 40641b 17 API calls 4654->4662 4655->4656 4655->4665 4656->4636 4660 404044 4657->4660 4661 40402f 4657->4661 4658 4043de SendMessageA 4658->4636 4659 404405 18 API calls 4659->4662 4664 40140b 2 API calls 4660->4664 4663 40140b 2 API calls 4661->4663 4662->4635 4662->4648 4662->4649 4662->4654 4662->4659 4666 404405 18 API calls 4662->4666 4682 4042d0 DestroyWindow 4662->4682 4663->4665 4664->4665 4665->4636 4665->4658 4667 4041bc GetDlgItem 4666->4667 4668 4041d1 4667->4668 4669 4041d9 ShowWindow EnableWindow 4667->4669 4668->4669 4692 404427 EnableWindow 4669->4692 4671 404203 EnableWindow 4676 404217 4671->4676 4672 40421c GetSystemMenu EnableMenuItem SendMessageA 4673 40424c SendMessageA 4672->4673 4672->4676 4673->4676 4675 403eec 18 API calls 4675->4676 4676->4672 4676->4675 4693 40443a SendMessageA 4676->4693 4694 406388 lstrcpynA 4676->4694 4678 40427b lstrlenA 4679 40641b 17 API calls 4678->4679 4680 40428c SetWindowTextA 4679->4680 4681 401389 2 API calls 4680->4681 4681->4662 4683 4042ea CreateDialogParamA 4682->4683 4682->4691 4684 40431d 4683->4684 4683->4691 4685 404405 18 API calls 4684->4685 4686 404328 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4685->4686 4687 401389 2 API calls 4686->4687 4688 40436e 4687->4688 4688->4635 4689 404376 ShowWindow 4688->4689 4690 404451 SendMessageA 4689->4690 4690->4691 4691->4635 4691->4651 4692->4671 4693->4676 4694->4678 4695 40260c 4696 402c39 17 API calls 4695->4696 4697 402613 4696->4697 4700 405f1b GetFileAttributesA CreateFileA 4697->4700 4699 40261f 4700->4699 3801 100010d0 GetVersionExA 3802 10001106 3801->3802 3817 100010fc 3801->3817 3803 10001122 LoadLibraryW 3802->3803 3804 1000110e 3802->3804 3806 1000113b GetProcAddress 3803->3806 3816 100011a5 3803->3816 3805 10001225 LoadLibraryA 3804->3805 3804->3817 3808 1000123d GetProcAddress GetProcAddress GetProcAddress 3805->3808 3805->3817 3807 1000114e LocalAlloc 3806->3807 3813 1000118e 3806->3813 3809 10001189 3807->3809 3811 10001323 FreeLibrary 3808->3811 3825 1000126b 3808->3825 3812 1000115c NtQuerySystemInformation 3809->3812 3809->3813 3810 1000119a FreeLibrary 3810->3816 3811->3817 3812->3810 3814 1000116f LocalFree 3812->3814 3813->3810 3814->3813 3818 10001180 LocalAlloc 3814->3818 3815 100011c1 WideCharToMultiByte lstrcmpiA 3815->3816 3816->3815 3816->3817 3819 10001217 LocalFree 3816->3819 3820 100011f7 3816->3820 3818->3809 3819->3817 3820->3816 3827 1000103f OpenProcess 3820->3827 3822 100012a2 lstrlenA 3822->3825 3823 1000131c CloseHandle 3823->3811 3824 100012c4 lstrcpynA lstrcmpiA 3824->3825 3825->3811 3825->3822 3825->3823 3825->3824 3826 1000103f 8 API calls 3825->3826 3826->3825 3828 10001060 3827->3828 3829 100010cb 3827->3829 3830 1000106b EnumWindows 3828->3830 3831 100010ac TerminateProcess 3828->3831 3829->3820 3830->3831 3832 1000107f GetExitCodeProcess 3830->3832 3837 10001007 GetWindowThreadProcessId 3830->3837 3833 100010be CloseHandle 3831->3833 3834 100010a7 3831->3834 3832->3834 3835 1000108e 3832->3835 3833->3829 3834->3833 3835->3834 3836 10001097 WaitForSingleObject 3835->3836 3836->3831 3836->3834 3838 10001024 PostMessageA 3837->3838 3839 10001036 3837->3839 3838->3839 4701 401490 4702 4054a9 24 API calls 4701->4702 4703 401497 4702->4703 4704 402590 4705 402c79 17 API calls 4704->4705 4706 40259a 4705->4706 4707 402c17 17 API calls 4706->4707 4708 4025a3 4707->4708 4709 4027c8 4708->4709 4710 4025ca RegEnumValueA 4708->4710 4711 4025be RegEnumKeyA 4708->4711 4712 4025df RegCloseKey 4710->4712 4711->4712 4712->4709 4714 406d91 4716 40690c 4714->4716 4715 407277 4716->4715 4716->4716 4717 406996 GlobalAlloc 4716->4717 4718 40698d GlobalFree 4716->4718 4719 406a04 GlobalFree 4716->4719 4720 406a0d GlobalAlloc 4716->4720 4717->4715 4717->4716 4718->4717 4719->4720 4720->4715 4720->4716 4721 404897 4722 4048c3 4721->4722 4723 4048d4 4721->4723 4782 405a82 GetDlgItemTextA 4722->4782 4725 4048e0 GetDlgItem 4723->4725 4726 40493f 4723->4726 4728 4048f4 4725->4728 4733 40641b 17 API calls 4726->4733 4742 404a23 4726->4742 4780 404bcd 4726->4780 4727 4048ce 4729 406666 5 API calls 4727->4729 4731 404908 SetWindowTextA 4728->4731 4732 405db3 4 API calls 4728->4732 4729->4723 4735 404405 18 API calls 4731->4735 4737 4048fe 4732->4737 4738 4049b3 SHBrowseForFolderA 4733->4738 4734 404a53 4739 405e08 18 API calls 4734->4739 4740 404924 4735->4740 4736 40446c 8 API calls 4741 404be1 4736->4741 4737->4731 4746 405d1a 3 API calls 4737->4746 4738->4742 4743 4049cb CoTaskMemFree 4738->4743 4744 404a59 4739->4744 4745 404405 18 API calls 4740->4745 4742->4780 4784 405a82 GetDlgItemTextA 4742->4784 4747 405d1a 3 API calls 4743->4747 4785 406388 lstrcpynA 4744->4785 4748 404932 4745->4748 4746->4731 4749 4049d8 4747->4749 4783 40443a SendMessageA 4748->4783 4752 404a0f SetDlgItemTextA 4749->4752 4757 40641b 17 API calls 4749->4757 4752->4742 4753 404938 4755 406794 5 API calls 4753->4755 4754 404a70 4756 406794 5 API calls 4754->4756 4755->4726 4763 404a77 4756->4763 4758 4049f7 lstrcmpiA 4757->4758 4758->4752 4761 404a08 lstrcatA 4758->4761 4759 404ab3 4786 406388 lstrcpynA 4759->4786 4761->4752 4762 404aba 4764 405db3 4 API calls 4762->4764 4763->4759 4767 405d61 2 API calls 4763->4767 4769 404b0b 4763->4769 4765 404ac0 GetDiskFreeSpaceA 4764->4765 4768 404ae4 MulDiv 4765->4768 4765->4769 4767->4763 4768->4769 4770 404b7c 4769->4770 4772 404d13 20 API calls 4769->4772 4771 404b9f 4770->4771 4773 40140b 2 API calls 4770->4773 4787 404427 EnableWindow 4771->4787 4774 404b69 4772->4774 4773->4771 4776 404b7e SetDlgItemTextA 4774->4776 4777 404b6e 4774->4777 4776->4770 4779 404c4e 20 API calls 4777->4779 4778 404bbb 4778->4780 4781 4047f0 SendMessageA 4778->4781 4779->4770 4780->4736 4781->4780 4782->4727 4783->4753 4784->4734 4785->4754 4786->4762 4787->4778 4788 40541d 4789 405441 4788->4789 4790 40542d 4788->4790 4793 405449 IsWindowVisible 4789->4793 4799 405460 4789->4799 4791 405433 4790->4791 4792 40548a 4790->4792 4794 404451 SendMessageA 4791->4794 4796 40548f CallWindowProcA 4792->4796 4793->4792 4795 405456 4793->4795 4797 40543d 4794->4797 4798 404d58 5 API calls 4795->4798 4796->4797 4798->4799 4799->4796 4800 404dd8 4 API calls 4799->4800 4800->4792 4801 40149d 4802 4014ab PostQuitMessage 4801->4802 4803 40238f 4801->4803 4802->4803 4804 40159d 4805 402c39 17 API calls 4804->4805 4806 4015a4 SetFileAttributesA 4805->4806 4807 4015b6 4806->4807 4020 40251e 4031 402c79 4020->4031 4023 402c39 17 API calls 4024 402531 4023->4024 4025 40253b RegQueryValueExA 4024->4025 4029 4027c8 4024->4029 4026 402561 RegCloseKey 4025->4026 4027 40255b 4025->4027 4026->4029 4027->4026 4036 4062e6 wsprintfA 4027->4036 4032 402c39 17 API calls 4031->4032 4033 402c90 4032->4033 4034 40620e RegOpenKeyExA 4033->4034 4035 402528 4034->4035 4035->4023 4036->4026 4808 401a1e 4809 402c39 17 API calls 4808->4809 4810 401a27 ExpandEnvironmentStringsA 4809->4810 4811 401a3b 4810->4811 4813 401a4e 4810->4813 4812 401a40 lstrcmpA 4811->4812 4811->4813 4812->4813 4819 40171f 4820 402c39 17 API calls 4819->4820 4821 401726 SearchPathA 4820->4821 4822 401741 4821->4822 4823 401d1f 4824 402c17 17 API calls 4823->4824 4825 401d26 4824->4825 4826 402c17 17 API calls 4825->4826 4827 401d32 GetDlgItem 4826->4827 4828 402628 4827->4828 4829 402aa0 SendMessageA 4830 402ac5 4829->4830 4831 402aba InvalidateRect 4829->4831 4831->4830 4832 10001363 4833 10001426 2 API calls 4832->4833 4834 1000138f 4833->4834 4835 100010d0 28 API calls 4834->4835 4836 10001399 4835->4836 4837 100014ba 3 API calls 4836->4837 4838 100013a2 4837->4838 4839 4023a4 4840 4023b2 4839->4840 4841 4023ac 4839->4841 4843 4023c2 4840->4843 4845 402c39 17 API calls 4840->4845 4842 402c39 17 API calls 4841->4842 4842->4840 4844 4023d0 4843->4844 4846 402c39 17 API calls 4843->4846 4847 402c39 17 API calls 4844->4847 4845->4843 4846->4844 4848 4023d9 WritePrivateProfileStringA 4847->4848 3286 4020a5 3287 4020b7 3286->3287 3288 402165 3286->3288 3304 402c39 3287->3304 3290 401423 24 API calls 3288->3290 3292 4022ea 3290->3292 3293 402c39 17 API calls 3294 4020c7 3293->3294 3295 4020dc LoadLibraryExA 3294->3295 3296 4020cf GetModuleHandleA 3294->3296 3295->3288 3297 4020ec GetProcAddress 3295->3297 3296->3295 3296->3297 3298 402138 3297->3298 3299 4020fb 3297->3299 3313 4054a9 3298->3313 3302 40210b 3299->3302 3310 401423 3299->3310 3302->3292 3303 402159 FreeLibrary 3302->3303 3303->3292 3305 402c45 3304->3305 3324 40641b 3305->3324 3307 4020be 3307->3293 3311 4054a9 24 API calls 3310->3311 3312 401431 3311->3312 3312->3302 3314 4054c4 3313->3314 3323 405567 3313->3323 3315 4054e1 lstrlenA 3314->3315 3316 40641b 17 API calls 3314->3316 3317 40550a 3315->3317 3318 4054ef lstrlenA 3315->3318 3316->3315 3320 405510 SetWindowTextA 3317->3320 3321 40551d 3317->3321 3319 405501 lstrcatA 3318->3319 3318->3323 3319->3317 3320->3321 3322 405523 SendMessageA SendMessageA SendMessageA 3321->3322 3321->3323 3322->3323 3323->3302 3325 406428 3324->3325 3326 40664d 3325->3326 3329 406627 lstrlenA 3325->3329 3330 40641b 10 API calls 3325->3330 3334 406543 GetSystemDirectoryA 3325->3334 3335 406556 GetWindowsDirectoryA 3325->3335 3336 406666 5 API calls 3325->3336 3337 40641b 10 API calls 3325->3337 3338 4065d0 lstrcatA 3325->3338 3339 40658a SHGetSpecialFolderLocation 3325->3339 3350 40626f 3325->3350 3355 4062e6 wsprintfA 3325->3355 3356 406388 lstrcpynA 3325->3356 3327 402c66 3326->3327 3357 406388 lstrcpynA 3326->3357 3327->3307 3341 406666 3327->3341 3329->3325 3330->3329 3334->3325 3335->3325 3336->3325 3337->3325 3338->3325 3339->3325 3340 4065a2 SHGetPathFromIDListA CoTaskMemFree 3339->3340 3340->3325 3348 406672 3341->3348 3342 4066da 3343 4066de CharPrevA 3342->3343 3345 4066f9 3342->3345 3343->3342 3344 4066cf CharNextA 3344->3342 3344->3348 3345->3307 3347 4066bd CharNextA 3347->3348 3348->3342 3348->3344 3348->3347 3349 4066ca CharNextA 3348->3349 3362 405d45 3348->3362 3349->3344 3358 40620e 3350->3358 3353 4062a3 RegQueryValueExA RegCloseKey 3354 4062d2 3353->3354 3354->3325 3355->3325 3356->3325 3357->3327 3359 40621d 3358->3359 3360 406221 3359->3360 3361 406226 RegOpenKeyExA 3359->3361 3360->3353 3360->3354 3361->3360 3363 405d4b 3362->3363 3364 405d5e 3363->3364 3365 405d51 CharNextA 3363->3365 3364->3348 3365->3363 4849 402e25 4850 402e34 SetTimer 4849->4850 4851 402e4d 4849->4851 4850->4851 4852 402e9b 4851->4852 4853 402ea1 MulDiv 4851->4853 4854 402e5b wsprintfA SetWindowTextA SetDlgItemTextA 4853->4854 4854->4852 4870 402429 4871 402430 4870->4871 4872 40245b 4870->4872 4873 402c79 17 API calls 4871->4873 4874 402c39 17 API calls 4872->4874 4875 402437 4873->4875 4876 402462 4874->4876 4878 402c39 17 API calls 4875->4878 4879 40246f 4875->4879 4881 402cf7 4876->4881 4880 402448 RegDeleteValueA RegCloseKey 4878->4880 4880->4879 4882 402d03 4881->4882 4883 402d0a 4881->4883 4882->4879 4883->4882 4885 402d3b 4883->4885 4886 40620e RegOpenKeyExA 4885->4886 4887 402d69 4886->4887 4888 402d79 RegEnumValueA 4887->4888 4889 402d9c 4887->4889 4896 402e13 4887->4896 4888->4889 4890 402e03 RegCloseKey 4888->4890 4889->4890 4891 402dd8 RegEnumKeyA 4889->4891 4892 402de1 RegCloseKey 4889->4892 4895 402d3b 6 API calls 4889->4895 4890->4896 4891->4889 4891->4892 4893 406794 5 API calls 4892->4893 4894 402df1 4893->4894 4894->4896 4897 402df5 RegDeleteKeyA 4894->4897 4895->4889 4896->4882 4897->4896 4898 4027aa 4899 402c39 17 API calls 4898->4899 4900 4027b1 FindFirstFileA 4899->4900 4901 4027d4 4900->4901 4902 4027c4 4900->4902 4903 4027db 4901->4903 4906 4062e6 wsprintfA 4901->4906 4907 406388 lstrcpynA 4903->4907 4906->4903 4907->4902 4908 403b2c 4909 403b37 4908->4909 4910 403b3b 4909->4910 4911 403b3e GlobalAlloc 4909->4911 4911->4910 4912 401c2e 4913 402c17 17 API calls 4912->4913 4914 401c35 4913->4914 4915 402c17 17 API calls 4914->4915 4916 401c42 4915->4916 4917 402c39 17 API calls 4916->4917 4918 401c57 4916->4918 4917->4918 4919 401c67 4918->4919 4920 402c39 17 API calls 4918->4920 4921 401c72 4919->4921 4922 401cbe 4919->4922 4920->4919 4924 402c17 17 API calls 4921->4924 4923 402c39 17 API calls 4922->4923 4925 401cc3 4923->4925 4926 401c77 4924->4926 4927 402c39 17 API calls 4925->4927 4928 402c17 17 API calls 4926->4928 4929 401ccc FindWindowExA 4927->4929 4930 401c83 4928->4930 4933 401cea 4929->4933 4931 401c90 SendMessageTimeoutA 4930->4931 4932 401cae SendMessageA 4930->4932 4931->4933 4932->4933 4934 40262e 4935 402633 4934->4935 4936 402647 4934->4936 4937 402c17 17 API calls 4935->4937 4938 402c39 17 API calls 4936->4938 4940 40263c 4937->4940 4939 40264e lstrlenA 4938->4939 4939->4940 4941 402670 4940->4941 4942 405fc2 WriteFile 4940->4942 4942->4941 3840 401932 3841 401934 3840->3841 3842 402c39 17 API calls 3841->3842 3843 401939 3842->3843 3846 405b4a 3843->3846 3847 405e08 18 API calls 3846->3847 3848 405b6a 3847->3848 3849 405b72 DeleteFileA 3848->3849 3850 405b89 3848->3850 3879 401942 3849->3879 3851 405cb7 3850->3851 3883 406388 lstrcpynA 3850->3883 3856 4066ff 2 API calls 3851->3856 3851->3879 3853 405baf 3854 405bc2 3853->3854 3855 405bb5 lstrcatA 3853->3855 3858 405d61 2 API calls 3854->3858 3857 405bc8 3855->3857 3859 405cdb 3856->3859 3860 405bd6 lstrcatA 3857->3860 3861 405be1 lstrlenA FindFirstFileA 3857->3861 3858->3857 3862 405d1a 3 API calls 3859->3862 3859->3879 3860->3861 3861->3851 3870 405c05 3861->3870 3864 405ce5 3862->3864 3863 405d45 CharNextA 3863->3870 3865 405b02 5 API calls 3864->3865 3866 405cf1 3865->3866 3867 405cf5 3866->3867 3868 405d0b 3866->3868 3874 4054a9 24 API calls 3867->3874 3867->3879 3869 4054a9 24 API calls 3868->3869 3869->3879 3870->3863 3871 405c96 FindNextFileA 3870->3871 3878 405b4a 60 API calls 3870->3878 3880 4054a9 24 API calls 3870->3880 3881 4054a9 24 API calls 3870->3881 3882 406161 36 API calls 3870->3882 3884 406388 lstrcpynA 3870->3884 3885 405b02 3870->3885 3871->3870 3873 405cae FindClose 3871->3873 3873->3851 3875 405d02 3874->3875 3876 406161 36 API calls 3875->3876 3876->3879 3878->3870 3880->3871 3881->3870 3882->3870 3883->3853 3884->3870 3893 405ef6 GetFileAttributesA 3885->3893 3888 405b2f 3888->3870 3889 405b25 DeleteFileA 3891 405b2b 3889->3891 3890 405b1d RemoveDirectoryA 3890->3891 3891->3888 3892 405b3b SetFileAttributesA 3891->3892 3892->3888 3894 405b0e 3893->3894 3895 405f08 SetFileAttributesA 3893->3895 3894->3888 3894->3889 3894->3890 3895->3894 4943 402733 4944 40273a 4943->4944 4946 402a47 4943->4946 4945 402c17 17 API calls 4944->4945 4947 402741 4945->4947 4948 402750 SetFilePointer 4947->4948 4948->4946 4949 402760 4948->4949 4951 4062e6 wsprintfA 4949->4951 4951->4946 4952 401e35 GetDC 4953 402c17 17 API calls 4952->4953 4954 401e47 GetDeviceCaps MulDiv ReleaseDC 4953->4954 4955 402c17 17 API calls 4954->4955 4956 401e78 4955->4956 4957 40641b 17 API calls 4956->4957 4958 401eb5 CreateFontIndirectA 4957->4958 4959 402628 4958->4959 4960 4014b7 4961 4014bd 4960->4961 4962 401389 2 API calls 4961->4962 4963 4014c5 4962->4963 3958 4015bb 3959 402c39 17 API calls 3958->3959 3960 4015c2 3959->3960 3961 405db3 4 API calls 3960->3961 3971 4015ca 3961->3971 3962 401624 3964 401652 3962->3964 3965 401629 3962->3965 3963 405d45 CharNextA 3963->3971 3967 401423 24 API calls 3964->3967 3966 401423 24 API calls 3965->3966 3968 401630 3966->3968 3974 40164a 3967->3974 3978 406388 lstrcpynA 3968->3978 3969 4059ec 2 API calls 3969->3971 3971->3962 3971->3963 3971->3969 3972 405a09 5 API calls 3971->3972 3975 40160c GetFileAttributesA 3971->3975 3977 4015f3 3971->3977 3972->3971 3973 40163b SetCurrentDirectoryA 3973->3974 3975->3971 3976 40596f 4 API calls 3976->3977 3977->3971 3977->3976 3978->3973 4964 40453b lstrcpynA lstrlenA 4965 4016bb 4966 402c39 17 API calls 4965->4966 4967 4016c1 GetFullPathNameA 4966->4967 4968 4016d8 4967->4968 4974 4016f9 4967->4974 4971 4066ff 2 API calls 4968->4971 4968->4974 4969 402ac5 4970 40170d GetShortPathNameA 4970->4969 4972 4016e9 4971->4972 4972->4974 4975 406388 lstrcpynA 4972->4975 4974->4969 4974->4970 4975->4974

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 4034cc-40351c SetErrorMode GetVersionExA 1 40355d 0->1 2 40351e-403538 GetVersionExA 0->2 3 403564 1->3 2->3 4 40353a-403559 2->4 5 403566-403571 3->5 6 403588-40358f 3->6 4->1 7 403573-403582 5->7 8 403584 5->8 9 403591 6->9 10 403599-4035d9 6->10 7->6 8->6 9->10 11 4035db-4035e3 call 406794 10->11 12 4035ec 10->12 11->12 18 4035e5 11->18 14 4035f1-403605 call 406726 lstrlenA 12->14 19 403607-403623 call 406794 * 3 14->19 18->12 26 403634-403694 #17 OleInitialize SHGetFileInfoA call 406388 GetCommandLineA call 406388 19->26 27 403625-40362b 19->27 34 403696-40369a 26->34 35 40369f-4036b2 call 405d45 CharNextA 26->35 27->26 32 40362d 27->32 32->26 34->35 38 403773-403777 35->38 39 4036b7-4036ba 38->39 40 40377d 38->40 41 4036c2-4036c9 39->41 42 4036bc-4036c0 39->42 43 403791-4037ab GetTempPathA call 40349b 40->43 44 4036d0-4036d3 41->44 45 4036cb-4036cc 41->45 42->41 42->42 53 403803-40381b DeleteFileA call 402f5c 43->53 54 4037ad-4037cb GetWindowsDirectoryA lstrcatA call 40349b 43->54 47 403764-403770 call 405d45 44->47 48 4036d9-4036dd 44->48 45->44 47->38 66 403772 47->66 51 4036f5-403722 48->51 52 4036df-4036e5 48->52 55 403734-403762 51->55 56 403724-40372a 51->56 60 4036e7-4036e9 52->60 61 4036eb 52->61 69 403821-403827 53->69 70 4038ae-4038bf ExitProcess OleUninitialize 53->70 54->53 68 4037cd-4037fd GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40349b 54->68 55->47 65 40377f-40378c call 406388 55->65 62 403730 56->62 63 40372c-40372e 56->63 60->51 60->61 61->51 62->55 63->55 63->62 65->43 66->38 68->53 68->70 73 403829-403834 call 405d45 69->73 74 40389f-4038a6 call 403b6e 69->74 75 4038c5-4038d4 call 405a9e ExitProcess 70->75 76 4039e8-4039ee 70->76 91 403836-40385f 73->91 92 40386a-403873 73->92 85 4038ab 74->85 77 4039f0-403a05 GetCurrentProcess OpenProcessToken 76->77 78 403a66-403a6e 76->78 83 403a36-403a44 call 406794 77->83 84 403a07-403a30 LookupPrivilegeValueA AdjustTokenPrivileges 77->84 87 403a70 78->87 88 403a73-403a76 ExitProcess 78->88 99 403a52-403a5d ExitWindowsEx 83->99 100 403a46-403a50 83->100 84->83 85->70 87->88 96 403861-403863 91->96 93 403875-403883 call 405e08 92->93 94 4038da-4038ee call 405a09 lstrcatA 92->94 93->70 107 403885-40389b call 406388 * 2 93->107 105 4038f0-4038f6 lstrcatA 94->105 106 4038fb-403915 lstrcatA lstrcmpiA 94->106 96->92 101 403865-403868 96->101 99->78 104 403a5f-403a61 call 40140b 99->104 100->99 100->104 101->92 101->96 104->78 105->106 106->70 110 403917-40391a 106->110 107->74 112 403923 call 4059ec 110->112 113 40391c-403921 call 40596f 110->113 120 403928-403936 SetCurrentDirectoryA 112->120 113->120 121 403943-40396e call 406388 120->121 122 403938-40393e call 406388 120->122 126 403974-403991 call 40641b DeleteFileA 121->126 122->121 129 4039d1-4039da 126->129 130 403993-4039a3 CopyFileA 126->130 129->126 132 4039dc-4039e3 call 406161 129->132 130->129 131 4039a5-4039c5 call 406161 call 40641b call 405a21 130->131 131->129 141 4039c7-4039ce CloseHandle 131->141 132->70 141->129
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00008001), ref: 004034EF
                                                                • GetVersionExA.KERNEL32(?), ref: 00403518
                                                                • GetVersionExA.KERNEL32(0000009C), ref: 0040352F
                                                                • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F8
                                                                • #17.COMCTL32(?,00000007,00000009,0000000B), ref: 00403635
                                                                • OleInitialize.OLE32(00000000), ref: 0040363C
                                                                • SHGetFileInfoA.SHELL32(0041FD10,00000000,?,00000160,00000000,?,00000007,00000009,0000000B), ref: 0040365A
                                                                • GetCommandLineA.KERNEL32(00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 0040366F
                                                                • CharNextA.USER32(00000000,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000020,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000000,?,00000007,00000009,0000000B), ref: 004036A9
                                                                • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000007,00000009,0000000B), ref: 004037A2
                                                                • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000007,00000009,0000000B), ref: 004037B3
                                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037BF
                                                                • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000007,00000009,0000000B), ref: 004037D3
                                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037DB
                                                                • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000007,00000009,0000000B), ref: 004037EC
                                                                • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 004037F4
                                                                • DeleteFileA.KERNEL32(1033,?,00000007,00000009,0000000B), ref: 00403808
                                                                • ExitProcess.KERNEL32(?,?,00000007,00000009,0000000B), ref: 004038AE
                                                                • OleUninitialize.OLE32(?,?,00000007,00000009,0000000B), ref: 004038B3
                                                                • ExitProcess.KERNEL32 ref: 004038D4
                                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038E7
                                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A1B0,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000000,?,?,00000007,00000009,0000000B), ref: 004038F6
                                                                • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000000,?,?,00000007,00000009,0000000B), ref: 00403901
                                                                • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp), ref: 0040390D
                                                                • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000007,00000009,0000000B), ref: 00403929
                                                                • DeleteFileA.KERNEL32(0041F910,0041F910,?,00425000,?,?,00000007,00000009,0000000B), ref: 00403986
                                                                • CopyFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\5B7B.exe,0041F910,00000001), ref: 0040399B
                                                                • CloseHandle.KERNEL32(00000000,0041F910,0041F910,?,0041F910,00000000,?,00000007,00000009,0000000B), ref: 004039C8
                                                                • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000009,0000000B), ref: 004039F6
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004039FD
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A11
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A30
                                                                • ExitWindowsEx.USER32(00000002,80040002), ref: 00403A55
                                                                • ExitProcess.KERNEL32 ref: 00403A76
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Processlstrcat$ExitFile$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                • String ID: "$.tmp$1033$A$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\5B7B.exe$C:\Users\user\AppData\Local\Temp\5B7B.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Users\user\AppData\Roaming\GamePall\update$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                                • API String ID: 2882342585-2412987808
                                                                • Opcode ID: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                                                                • Instruction ID: 1a4863036e4e50ed5e1acae1e6299f6db15da00d6e87979e5214c03ba8a99dba
                                                                • Opcode Fuzzy Hash: d18186efe810cf451430c4e096b9aeccec46dfe8f60ebdd611bfa721823b35b5
                                                                • Instruction Fuzzy Hash: 99E1D270A04354AADB21AF659D49B6F7EB89F86306F0540BFF441B61D2CB7C4A05CB2E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 216 100010d0-100010fa GetVersionExA 217 10001106-1000110c 216->217 218 100010fc-10001101 216->218 220 10001122-10001139 LoadLibraryW 217->220 221 1000110e-10001112 217->221 219 1000135d-10001362 218->219 224 100011a5 220->224 225 1000113b-1000114c GetProcAddress 220->225 222 10001225-10001237 LoadLibraryA 221->222 223 10001118-1000111d 221->223 228 10001332-10001337 222->228 229 1000123d-10001265 GetProcAddress * 3 222->229 231 1000135b-1000135c 223->231 230 100011aa-100011ae 224->230 226 10001195 225->226 227 1000114e-1000115a LocalAlloc 225->227 233 1000119a-100011a3 FreeLibrary 226->233 232 10001189-1000118c 227->232 228->231 234 10001323-10001326 FreeLibrary 229->234 235 1000126b-1000126d 229->235 236 100011b0-100011b2 230->236 237 100011b7 230->237 231->219 238 1000115c-1000116d NtQuerySystemInformation 232->238 239 1000118e-10001193 232->239 233->230 242 1000132c-10001330 234->242 235->234 240 10001273-10001275 235->240 236->231 241 100011ba-100011bf 237->241 238->233 243 1000116f-1000117e LocalFree 238->243 239->233 240->234 244 1000127b-10001286 240->244 245 100011c1-100011ec WideCharToMultiByte lstrcmpiA 241->245 246 1000120d-10001211 241->246 242->228 247 10001339-1000133d 242->247 243->239 250 10001180-10001187 LocalAlloc 243->250 244->234 260 1000128c-100012a0 244->260 245->246 253 100011ee-100011f5 245->253 251 10001213-10001215 246->251 252 10001217-10001220 LocalFree 246->252 248 10001359 247->248 249 1000133f-10001343 247->249 248->231 254 10001345-1000134a 249->254 255 1000134c-10001350 249->255 250->232 251->241 252->242 253->252 257 100011f7-1000120a call 1000103f 253->257 254->231 255->248 259 10001352-10001357 255->259 257->246 259->231 263 10001318-1000131a 260->263 264 100012a2-100012b6 lstrlenA 263->264 265 1000131c-1000131d CloseHandle 263->265 266 100012bd-100012c2 264->266 265->234 267 100012c4-100012ea lstrcpynA lstrcmpiA 266->267 268 100012b8-100012ba 266->268 270 100012ec-100012f3 267->270 271 1000130e-10001315 267->271 268->267 269 100012bc 268->269 269->266 270->265 272 100012f5-1000130b call 1000103f 270->272 271->263 272->271
                                                                APIs
                                                                • GetVersionExA.KERNEL32(?), ref: 100010F2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3594499977.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 00000007.00000002.3594470461.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594556271.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594588808.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_10000000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Version
                                                                • String ID: CreateToolhelp32Snapshot$KERNEL32.DLL$NTDLL.DLL$NtQuerySystemInformation$Process32First$Process32Next
                                                                • API String ID: 1889659487-877962304
                                                                • Opcode ID: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                                                                • Instruction ID: 3df706415bff85d1043f51983ae3f68c733976b3404a17f8fb4488dcc6387507
                                                                • Opcode Fuzzy Hash: 65e34132412926b77cd70352a95a1b322544ba155a4a88647b4c9b484df59334
                                                                • Instruction Fuzzy Hash: 19715871900659EFFB11DFA4CC88ADE3BEAEB483C4F250026FA19D2159E6358E49CB50

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 446 405b4a-405b70 call 405e08 449 405b72-405b84 DeleteFileA 446->449 450 405b89-405b90 446->450 451 405d13-405d17 449->451 452 405b92-405b94 450->452 453 405ba3-405bb3 call 406388 450->453 454 405cc1-405cc6 452->454 455 405b9a-405b9d 452->455 461 405bc2-405bc3 call 405d61 453->461 462 405bb5-405bc0 lstrcatA 453->462 454->451 457 405cc8-405ccb 454->457 455->453 455->454 459 405cd5-405cdd call 4066ff 457->459 460 405ccd-405cd3 457->460 459->451 470 405cdf-405cf3 call 405d1a call 405b02 459->470 460->451 464 405bc8-405bcb 461->464 462->464 467 405bd6-405bdc lstrcatA 464->467 468 405bcd-405bd4 464->468 469 405be1-405bff lstrlenA FindFirstFileA 467->469 468->467 468->469 471 405c05-405c1c call 405d45 469->471 472 405cb7-405cbb 469->472 485 405cf5-405cf8 470->485 486 405d0b-405d0e call 4054a9 470->486 479 405c27-405c2a 471->479 480 405c1e-405c22 471->480 472->454 474 405cbd 472->474 474->454 483 405c2c-405c31 479->483 484 405c3d-405c4b call 406388 479->484 480->479 482 405c24 480->482 482->479 488 405c33-405c35 483->488 489 405c96-405ca8 FindNextFileA 483->489 497 405c62-405c6d call 405b02 484->497 498 405c4d-405c55 484->498 485->460 491 405cfa-405d09 call 4054a9 call 406161 485->491 486->451 488->484 492 405c37-405c3b 488->492 489->471 494 405cae-405cb1 FindClose 489->494 491->451 492->484 492->489 494->472 506 405c8e-405c91 call 4054a9 497->506 507 405c6f-405c72 497->507 498->489 501 405c57-405c60 call 405b4a 498->501 501->489 506->489 508 405c74-405c84 call 4054a9 call 406161 507->508 509 405c86-405c8c 507->509 508->489 509->489
                                                                APIs
                                                                • DeleteFileA.KERNEL32(?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405B73
                                                                • lstrcatA.KERNEL32(00421D58,\*.*,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405BBB
                                                                • lstrcatA.KERNEL32(?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405BDC
                                                                • lstrlenA.KERNEL32(?,?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405BE2
                                                                • FindFirstFileA.KERNEL32(00421D58,?,?,?,0040A014,?,00421D58,?,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405BF3
                                                                • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405CA0
                                                                • FindClose.KERNEL32(00000000), ref: 00405CB1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\5B7B.exe$\*.*
                                                                • API String ID: 2035342205-3439424400
                                                                • Opcode ID: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                                                                • Instruction ID: 9e5d3321e74a3647b1fb2cdcf4bec0a51507e3563529971eb59e862f6dba24c5
                                                                • Opcode Fuzzy Hash: 2ba348f7f603991e7b2998a01f0f2af9ee039e7695cfc72fde993ee98a245b0d
                                                                • Instruction Fuzzy Hash: 2B519130908B04AAEB316B61CC49BAF7AB8DF82755F14813FF851B51D2C73C5982DE69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 713 406a88-406a8d 714 406afe-406b1c 713->714 715 406a8f-406abe 713->715 716 4070f4-407109 714->716 717 406ac0-406ac3 715->717 718 406ac5-406ac9 715->718 719 407123-407139 716->719 720 40710b-407121 716->720 721 406ad5-406ad8 717->721 722 406ad1 718->722 723 406acb-406acf 718->723 724 40713c-407143 719->724 720->724 725 406af6-406af9 721->725 726 406ada-406ae3 721->726 722->721 723->721 728 407145-407149 724->728 729 40716a-407176 724->729 727 406ccb-406ce9 725->727 730 406ae5 726->730 731 406ae8-406af4 726->731 732 406d01-406d13 727->732 733 406ceb-406cff 727->733 734 4072f8-407302 728->734 735 40714f-407167 728->735 742 40690c-406915 729->742 730->731 737 406b5e-406b8c 731->737 741 406d16-406d20 732->741 733->741 740 40730e-407321 734->740 735->729 738 406ba8-406bc2 737->738 739 406b8e-406ba6 737->739 743 406bc5-406bcf 738->743 739->743 748 407326-40732a 740->748 746 406d22 741->746 747 406cc3-406cc9 741->747 744 407323 742->744 745 40691b 742->745 750 406bd5 743->750 751 406b46-406b4c 743->751 744->748 752 406922-406926 745->752 753 406a62-406a83 745->753 754 4069c7-4069cb 745->754 755 406a37-406a3b 745->755 756 406e33-406e40 746->756 757 406c9e-406ca2 746->757 747->727 749 406c67-406c71 747->749 758 4072b6-4072c0 749->758 759 406c77-406c99 749->759 771 407292-40729c 750->771 772 406b2b-406b43 750->772 760 406b52-406b58 751->760 761 406bff-406c05 751->761 752->740 768 40692c-406939 752->768 753->716 762 4069d1-4069ea 754->762 763 407277-407281 754->763 769 406a41-406a55 755->769 770 407286-407290 755->770 756->742 767 406e8f-406e9e 756->767 764 406ca8-406cc0 757->764 765 4072aa-4072b4 757->765 758->740 759->756 760->737 773 406c63 760->773 761->773 775 406c07-406c25 761->775 776 4069ed-4069f1 762->776 763->740 764->747 765->740 767->716 768->744 774 40693f-406985 768->774 777 406a58-406a60 769->777 770->740 771->740 772->751 773->749 779 406987-40698b 774->779 780 4069ad-4069af 774->780 781 406c27-406c3b 775->781 782 406c3d-406c4f 775->782 776->754 778 4069f3-4069f9 776->778 777->753 777->755 788 406a23-406a35 778->788 789 4069fb-406a02 778->789 783 406996-4069a4 GlobalAlloc 779->783 784 40698d-406990 GlobalFree 779->784 786 4069b1-4069bb 780->786 787 4069bd-4069c5 780->787 785 406c52-406c5c 781->785 782->785 783->744 790 4069aa 783->790 784->783 785->761 791 406c5e 785->791 786->786 786->787 787->776 788->777 792 406a04-406a07 GlobalFree 789->792 793 406a0d-406a1d GlobalAlloc 789->793 790->780 795 406be4-406bfc 791->795 796 40729e-4072a8 791->796 792->793 793->744 793->788 795->761 796->740
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                                                                • Instruction ID: c2ee61ea0ab5e5811791f69f03c7ffba3fbd093a674906ee4b434ab4c587e2e9
                                                                • Opcode Fuzzy Hash: b420139e1bb7bdc71f93166ff3cf2c8d4b4e2e8bf29b11b667125d81af8f4237
                                                                • Instruction Fuzzy Hash: 0FF18A70D04269CBDF28CF98C8946ADBBB0FF44305F24816ED856BB281D7786A86DF45
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(74DF3410,004225A0,C:\,00405E4B,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0), ref: 0040670A
                                                                • FindClose.KERNEL32(00000000), ref: 00406716
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID: C:\
                                                                • API String ID: 2295610775-3404278061
                                                                • Opcode ID: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                                                                • Instruction ID: 083b1303d1f5dd1ba3b50291930e0491dd498af142a60d7bee4daa0eb941c193
                                                                • Opcode Fuzzy Hash: a8a8e6ca181c7703a692eace486e77433675a7c42b8a8fe2eb47bb99df7a0189
                                                                • Instruction Fuzzy Hash: B3D01231515120BBC3405B38AE0C95B7E589F093747618A36F066F22E4DB74CC6286AC

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 142 403b6e-403b86 call 406794 145 403b88-403b98 call 4062e6 142->145 146 403b9a-403bcb call 40626f 142->146 155 403bee-403c17 call 403e33 call 405e08 145->155 150 403be3-403be9 lstrcatA 146->150 151 403bcd-403bde call 40626f 146->151 150->155 151->150 160 403c1d-403c22 155->160 161 403c9e-403ca6 call 405e08 155->161 160->161 162 403c24-403c48 call 40626f 160->162 166 403cb4-403cd9 LoadImageA 161->166 167 403ca8-403caf call 40641b 161->167 162->161 169 403c4a-403c4c 162->169 171 403d5a-403d62 call 40140b 166->171 172 403cdb-403d0b RegisterClassA 166->172 167->166 173 403c5d-403c69 lstrlenA 169->173 174 403c4e-403c5b call 405d45 169->174 185 403d64-403d67 171->185 186 403d6c-403d77 call 403e33 171->186 175 403d11-403d55 SystemParametersInfoA CreateWindowExA 172->175 176 403e29 172->176 180 403c91-403c99 call 405d1a call 406388 173->180 181 403c6b-403c79 lstrcmpiA 173->181 174->173 175->171 179 403e2b-403e32 176->179 180->161 181->180 184 403c7b-403c85 GetFileAttributesA 181->184 188 403c87-403c89 184->188 189 403c8b-403c8c call 405d61 184->189 185->179 195 403e00-403e08 call 40557b 186->195 196 403d7d-403d97 ShowWindow call 406726 186->196 188->180 188->189 189->180 203 403e22-403e24 call 40140b 195->203 204 403e0a-403e10 195->204 201 403da3-403db5 GetClassInfoA 196->201 202 403d99-403d9e call 406726 196->202 207 403db7-403dc7 GetClassInfoA RegisterClassA 201->207 208 403dcd-403dfe DialogBoxParamA call 40140b call 403abe 201->208 202->201 203->176 204->185 209 403e16-403e1d call 40140b 204->209 207->208 208->179 209->185
                                                                APIs
                                                                  • Part of subcall function 00406794: GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                                                                  • Part of subcall function 00406794: GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                                                                • lstrcatA.KERNEL32(1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,?,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000009,0000000B), ref: 00403BE9
                                                                • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,?,?,C:\Windows\wininit.ini,00000000,C:\Users\user\AppData\Roaming\GamePall,1033,00420D50,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D50,00000000,00000002,74DF3410), ref: 00403C5E
                                                                • lstrcmpiA.KERNEL32(?,.exe), ref: 00403C71
                                                                • GetFileAttributesA.KERNEL32(C:\Windows\wininit.ini,?,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000009,0000000B), ref: 00403C7C
                                                                • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\GamePall), ref: 00403CC5
                                                                  • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                                                                • RegisterClassA.USER32(00423EE0), ref: 00403D02
                                                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403D1A
                                                                • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403D4F
                                                                • ShowWindow.USER32(00000005,00000000,?,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000009,0000000B), ref: 00403D85
                                                                • GetClassInfoA.USER32(00000000,RichEdit20A,00423EE0), ref: 00403DB1
                                                                • GetClassInfoA.USER32(00000000,RichEdit,00423EE0), ref: 00403DBE
                                                                • RegisterClassA.USER32(00423EE0), ref: 00403DC7
                                                                • DialogBoxParamA.USER32(?,00000000,00403F0B,00000000), ref: 00403DE6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\5B7B.exe$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$Control Panel\Desktop\ResourceLocale$PB$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$>B
                                                                • API String ID: 1975747703-3100197688
                                                                • Opcode ID: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                                                                • Instruction ID: 5836c5bb6a6ef8c4ff0aed12ec42ff3eebf2d58129c507535c8ab2622d1094a3
                                                                • Opcode Fuzzy Hash: dbde64bc3a376ab52a9cb3762a64ce6a0c2f330f4a95e62c6433b020d27b21d7
                                                                • Instruction Fuzzy Hash: 4F61D670204200AED620AF65AD45F3B3A7CEB8574AF41453FF951B62E2CB7D9D028B6D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 275 402f5c-402faa GetTickCount GetModuleFileNameA call 405f1b 278 402fb6-402fe4 call 406388 call 405d61 call 406388 GetFileSize 275->278 279 402fac-402fb1 275->279 287 402fea 278->287 288 4030cf-4030dd call 402ebd 278->288 280 4031f6-4031fa 279->280 290 402fef-403006 287->290 295 4030e3-4030e6 288->295 296 4031ae-4031b3 288->296 292 403008 290->292 293 40300a-403013 call 40346e 290->293 292->293 300 403019-403020 293->300 301 40316a-403172 call 402ebd 293->301 298 403112-40315e GlobalAlloc call 4068b9 call 405f4a CreateFileA 295->298 299 4030e8-403100 call 403484 call 40346e 295->299 296->280 326 403160-403165 298->326 327 403174-4031a4 call 403484 call 4031fd 298->327 299->296 321 403106-40310c 299->321 305 403022-403036 call 405ed6 300->305 306 40309c-4030a0 300->306 301->296 311 4030aa-4030b0 305->311 324 403038-40303f 305->324 310 4030a2-4030a9 call 402ebd 306->310 306->311 310->311 317 4030b2-4030bc call 40684b 311->317 318 4030bf-4030c7 311->318 317->318 318->290 325 4030cd 318->325 321->296 321->298 324->311 329 403041-403048 324->329 325->288 326->280 335 4031a9-4031ac 327->335 329->311 331 40304a-403051 329->331 331->311 334 403053-40305a 331->334 334->311 336 40305c-40307c 334->336 335->296 337 4031b5-4031c6 335->337 336->296 338 403082-403086 336->338 339 4031c8 337->339 340 4031ce-4031d3 337->340 341 403088-40308c 338->341 342 40308e-403096 338->342 339->340 343 4031d4-4031da 340->343 341->325 341->342 342->311 344 403098-40309a 342->344 343->343 345 4031dc-4031f4 call 405ed6 343->345 344->311 345->280
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00402F70
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\5B7B.exe,00000400), ref: 00402F8C
                                                                  • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00405F1F
                                                                  • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                                                                • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\5B7B.exe,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00402FD5
                                                                • GlobalAlloc.KERNEL32(00000040,00000009), ref: 00403117
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp, xrefs: 00402FB7, 00402FBC, 00402FC2
                                                                • Null, xrefs: 00403053
                                                                • Error launching installer, xrefs: 00402FAC
                                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00403160
                                                                • soft, xrefs: 0040304A
                                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 004031AE
                                                                • C:\Users\user\AppData\Local\Temp\5B7B.exe, xrefs: 00402F65
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F66, 0040312F
                                                                • C:\Users\user\AppData\Local\Temp\5B7B.exe, xrefs: 00402F76, 00402F85, 00402F99, 00402FB6
                                                                • Inst, xrefs: 00403041
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\5B7B.exe$C:\Users\user\AppData\Local\Temp\5B7B.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                • API String ID: 2803837635-197807202
                                                                • Opcode ID: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                                                                • Instruction ID: 8a05da1d373fd2b3e089436e62a275652004ed3b6aa6cfe031be989f12afac8e
                                                                • Opcode Fuzzy Hash: 948897f0a7bf445ed3fd87f3f97ca94f99971360adfd1b44ac20b9f0a6b79c08
                                                                • Instruction Fuzzy Hash: 0771E231A01218ABDB20EF65DD85B9E7BACEB44356F10813BF910BA2C1D77C9E458B5C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 348 405ff1-406015 349 406017-40602f call 405f1b CloseHandle GetShortPathNameA 348->349 350 40603d-40604c GetShortPathNameA 348->350 353 40615c-406160 349->353 357 406035-406037 349->357 352 406052-406054 350->352 350->353 352->353 355 40605a-406098 wsprintfA call 40641b call 405f1b 352->355 355->353 361 40609e-4060ba GetFileSize GlobalAlloc 355->361 357->350 357->353 362 4060c0-4060ca call 405f93 361->362 363 406155-406156 CloseHandle 361->363 362->363 366 4060d0-4060dd call 405e80 362->366 363->353 369 4060f3-406105 call 405e80 366->369 370 4060df-4060f1 lstrcpyA 366->370 376 406124 369->376 377 406107-40610d 369->377 371 406128 370->371 373 40612a-40614f call 405ed6 SetFilePointer call 405fc2 GlobalFree 371->373 373->363 376->371 378 406115-406117 377->378 380 406119-406122 378->380 381 40610f-406114 378->381 380->373 381->378
                                                                APIs
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                                                                • GetShortPathNameA.KERNEL32(?,NUL,00000400), ref: 0040602B
                                                                  • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                                                                  • Part of subcall function 00405E80: lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                                                                • GetShortPathNameA.KERNEL32(?,C:\Windows\wininit.ini,00000400), ref: 00406048
                                                                • wsprintfA.USER32 ref: 00406066
                                                                • GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                                                                • SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsj567B.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                                                                • GlobalFree.KERNEL32(00000000), ref: 0040614F
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406156
                                                                  • Part of subcall function 00405F1B: GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00405F1F
                                                                  • Part of subcall function 00405F1B: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                • String ID: %s=%s$C:\Windows\wininit.ini$NUL$NUL=C:\Users\user\AppData\Local\Temp\nsj567B.tmp\$[Rename]
                                                                • API String ID: 2171350718-3656005436
                                                                • Opcode ID: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                                                                • Instruction ID: 7566a5a9e9d08134d14435fb5d3e1561ad96112206bac95af022f508aac3f812
                                                                • Opcode Fuzzy Hash: 2ac8773abaa14c2605e43abf0f292608002e21a2c197761b550c40717a00d302
                                                                • Instruction Fuzzy Hash: 68310531200715BBC2207B659D49F6B3A5DDF85754F15003EFE42BA2C3EA7CD8228AAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 384 40641b-406426 385 406428-406437 384->385 386 406439-40644f 384->386 385->386 387 406643-406647 386->387 388 406455-406460 386->388 390 406472-40647c 387->390 391 40664d-406657 387->391 388->387 389 406466-40646d 388->389 389->387 390->391 392 406482-406489 390->392 393 406662-406663 391->393 394 406659-40665d call 406388 391->394 395 406636 392->395 396 40648f-4064c3 392->396 394->393 398 406640-406642 395->398 399 406638-40663e 395->399 400 4065e3-4065e6 396->400 401 4064c9-4064d3 396->401 398->387 399->387 404 406616-406619 400->404 405 4065e8-4065eb 400->405 402 4064f0 401->402 403 4064d5-4064de 401->403 411 4064f7-4064fe 402->411 403->402 408 4064e0-4064e3 403->408 406 406627-406634 lstrlenA 404->406 407 40661b-406622 call 40641b 404->407 409 4065fb-406607 call 406388 405->409 410 4065ed-4065f9 call 4062e6 405->410 406->387 407->406 408->402 413 4064e5-4064e8 408->413 422 40660c-406612 409->422 410->422 415 406500-406502 411->415 416 406503-406505 411->416 413->402 418 4064ea-4064ee 413->418 415->416 420 406507-40652a call 40626f 416->420 421 40653e-406541 416->421 418->411 432 406530-406539 call 40641b 420->432 433 4065ca-4065ce 420->433 425 406551-406554 421->425 426 406543-40654f GetSystemDirectoryA 421->426 422->406 424 406614 422->424 428 4065db-4065e1 call 406666 424->428 430 4065c1-4065c3 425->430 431 406556-406564 GetWindowsDirectoryA 425->431 429 4065c5-4065c8 426->429 428->406 429->428 429->433 430->429 434 406566-406570 430->434 431->430 432->429 433->428 437 4065d0-4065d6 lstrcatA 433->437 439 406572-406575 434->439 440 40658a-4065a0 SHGetSpecialFolderLocation 434->440 437->428 439->440 442 406577-40657e 439->442 443 4065a2-4065bc SHGetPathFromIDListA CoTaskMemFree 440->443 444 4065be 440->444 445 406586-406588 442->445 443->429 443->444 444->430 445->429 445->440
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(C:\Windows\wininit.ini,00000400), ref: 00406549
                                                                • GetWindowsDirectoryA.KERNEL32(C:\Windows\wininit.ini,00000400,?,00420530,00000000,004054E1,00420530,00000000), ref: 0040655C
                                                                • SHGetSpecialFolderLocation.SHELL32(004054E1,00000000,?,00420530,00000000,004054E1,00420530,00000000), ref: 00406598
                                                                • SHGetPathFromIDListA.SHELL32(00000000,C:\Windows\wininit.ini), ref: 004065A6
                                                                • CoTaskMemFree.OLE32(00000000), ref: 004065B2
                                                                • lstrcatA.KERNEL32(C:\Windows\wininit.ini,\Microsoft\Internet Explorer\Quick Launch), ref: 004065D6
                                                                • lstrlenA.KERNEL32(C:\Windows\wininit.ini,?,00420530,00000000,004054E1,00420530,00000000,00000000,00000000,00000000), ref: 00406628
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                                                • String ID: C:\Windows\wininit.ini$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 717251189-1428620962
                                                                • Opcode ID: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                                                                • Instruction ID: f38e20b3a3e0c1a2470d5ac0c6d90f06be75126661b475aa23e0086d5b044b98
                                                                • Opcode Fuzzy Hash: 28fe3fa0c873c230fa859cbc890347587b683f5d94c1146f2a959db860f2b1f6
                                                                • Instruction Fuzzy Hash: 9F612370900114AEDF205F24EC90BBA3BA4EB52314F52403FE913B62D1D37D8A62DB4E

                                                                Control-flow Graph

                                                                APIs
                                                                • lstrcatA.KERNEL32(00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 00401798
                                                                • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Local\Temp\setup.exe,00000000,00000000,C:\Users\user\AppData\Local\Temp\setup.exe,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,00000031), ref: 004017C2
                                                                  • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                                                                  • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                                                                  • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                • String ID: C:\Users\user\AppData\Local\Temp\nsj567B.tmp\INetC.dll$C:\Users\user\AppData\Local\Temp\setup.exe$C:\Users\user\AppData\Roaming\GamePall\update
                                                                • API String ID: 1941528284-2695636586
                                                                • Opcode ID: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                                                                • Instruction ID: 0d76be79c55a0237b493b10f9ec5be6125ba7ce9be49b25e4c886387d44134cc
                                                                • Opcode Fuzzy Hash: 531cf43c35c58c4dd4a4f90f95c8ebf7c3fa560a9c590302947909e1ab3ecca7
                                                                • Instruction Fuzzy Hash: E141B731900615BBCB107BB5CC45DAF3668EF45329B61833BF422F10E1D67C8A529AAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 582 406726-406746 GetSystemDirectoryA 583 406748 582->583 584 40674a-40674c 582->584 583->584 585 40675c-40675e 584->585 586 40674e-406756 584->586 588 40675f-406791 wsprintfA LoadLibraryExA 585->588 586->585 587 406758-40675a 586->587 587->588
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040673D
                                                                • wsprintfA.USER32 ref: 00406776
                                                                • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                • String ID: %s%s.dll$UXTHEME$\
                                                                • API String ID: 2200240437-4240819195
                                                                • Opcode ID: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                                                                • Instruction ID: 0c3db372634d2cfba6f48721b0c795b31ebca02323a8b7d7371d162bf0ec7b9a
                                                                • Opcode Fuzzy Hash: dd037f00298a2975fe7e642a10d0852ddcb34bcb2038a79f7270f2bd0b83f80d
                                                                • Instruction Fuzzy Hash: FBF0FC7050021966DB15A764DD0DFEA365CAB08309F1404BEA586E20C1D6B8D5258B69

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 589 4068d9-4068fc 590 406906-406909 589->590 591 4068fe-406901 589->591 593 40690c-406915 590->593 592 407326-40732a 591->592 594 407323 593->594 595 40691b 593->595 594->592 596 406922-406926 595->596 597 406a62-407109 595->597 598 4069c7-4069cb 595->598 599 406a37-406a3b 595->599 603 40692c-406939 596->603 604 40730e-407321 596->604 608 407123-407139 597->608 609 40710b-407121 597->609 601 4069d1-4069ea 598->601 602 407277-407281 598->602 605 406a41-406a55 599->605 606 407286-407290 599->606 607 4069ed-4069f1 601->607 602->604 603->594 610 40693f-406985 603->610 604->592 611 406a58-406a60 605->611 606->604 607->598 613 4069f3-4069f9 607->613 612 40713c-407143 608->612 609->612 614 406987-40698b 610->614 615 4069ad-4069af 610->615 611->597 611->599 620 407145-407149 612->620 621 40716a-407176 612->621 618 406a23-406a35 613->618 619 4069fb-406a02 613->619 622 406996-4069a4 GlobalAlloc 614->622 623 40698d-406990 GlobalFree 614->623 616 4069b1-4069bb 615->616 617 4069bd-4069c5 615->617 616->616 616->617 617->607 618->611 625 406a04-406a07 GlobalFree 619->625 626 406a0d-406a1d GlobalAlloc 619->626 627 4072f8-407302 620->627 628 40714f-407167 620->628 621->593 622->594 624 4069aa 622->624 623->622 624->615 625->626 626->594 626->618 627->604 628->621
                                                                Strings
                                                                • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 004068E3
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                                                                • API String ID: 0-292220189
                                                                • Opcode ID: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                                                                • Instruction ID: 8182d74baebb800b0d472bca2432a1a472ea96a2662ae7b36db949844af6c4d7
                                                                • Opcode Fuzzy Hash: 9b20245c0637e97ad79b0c04fd837c43a33b4178456ec09291c35722496dfe88
                                                                • Instruction Fuzzy Hash: DF815971E04228DBEF24CFA8C844BADBBB1FF44305F10816AD956BB281C7786986DF45

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 630 403305-40332d GetTickCount 631 403333-40335e call 403484 SetFilePointer 630->631 632 40345d-403465 call 402ebd 630->632 638 403363-403375 631->638 637 403467-40346b 632->637 639 403377 638->639 640 403379-403387 call 40346e 638->640 639->640 643 40338d-403399 640->643 644 40344f-403452 640->644 645 40339f-4033a5 643->645 644->637 646 4033d0-4033ec call 4068d9 645->646 647 4033a7-4033ad 645->647 653 403458 646->653 654 4033ee-4033f6 646->654 647->646 648 4033af-4033cf call 402ebd 647->648 648->646 655 40345a-40345b 653->655 656 4033f8-403400 call 405fc2 654->656 657 403419-40341f 654->657 655->637 661 403405-403407 656->661 657->653 659 403421-403423 657->659 659->653 660 403425-403438 659->660 660->638 662 40343e-40344d SetFilePointer 660->662 663 403454-403456 661->663 664 403409-403415 661->664 662->632 663->655 664->645 665 403417 664->665 665->660
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00403319
                                                                  • Part of subcall function 00403484: SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                                                                • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 0040334C
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004,00000000,00000000,0000000B,?,004031A9,000000FF,00000000), ref: 00403447
                                                                Strings
                                                                • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403379, 0040337F
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FilePointer$CountTick
                                                                • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                                                                • API String ID: 1092082344-292220189
                                                                • Opcode ID: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                                                                • Instruction ID: 5f41a1ef9683aad456499e8308d87ccfcfa217f8aa92108fcff4f05b83e24891
                                                                • Opcode Fuzzy Hash: f3fd145fe371a3aefb2ec72eaaf4336e3a5ddfe71b6918c4f9f269c5704fa6fa
                                                                • Instruction Fuzzy Hash: 1F319F72A002059FC711BF2AFE849663BACE741356710C13BE814B62F0CB3859458FAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 666 405f4a-405f54 667 405f55-405f80 GetTickCount GetTempFileNameA 666->667 668 405f82-405f84 667->668 669 405f8f-405f91 667->669 668->667 671 405f86 668->671 670 405f89-405f8c 669->670 671->670
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00405F5E
                                                                • GetTempFileNameA.KERNEL32(0000000B,?,00000000,?,?,004034CA,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007), ref: 00405F78
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                • API String ID: 1716503409-678247507
                                                                • Opcode ID: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                                                                • Instruction ID: 05c77450f8afc2c62a5a11a921c51d956a1ea51751b09822177720344b0c8500
                                                                • Opcode Fuzzy Hash: 6f67c72f8a62f6904c1c8d13d4c39cdc389fdf02a571d79ef00f96109094c4c4
                                                                • Instruction Fuzzy Hash: 02F082363042087BDB109F55DD44BAB7B9CDF91750F14C03BFE48DA180D6B4D9988798

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 672 4020a5-4020b1 673 4020b7-4020cd call 402c39 * 2 672->673 674 40216c-40216e 672->674 684 4020dc-4020ea LoadLibraryExA 673->684 685 4020cf-4020da GetModuleHandleA 673->685 675 4022e5-4022ea call 401423 674->675 681 402ac5-402ad4 675->681 686 4020ec-4020f9 GetProcAddress 684->686 687 402165-402167 684->687 685->684 685->686 689 402138-40213d call 4054a9 686->689 690 4020fb-402101 686->690 687->675 695 402142-402145 689->695 691 402103-40210f call 401423 690->691 692 40211a-40212e 690->692 691->695 703 402111-402118 691->703 697 402133-402136 692->697 695->681 698 40214b-402153 call 403b0e 695->698 697->695 698->681 702 402159-402160 FreeLibrary 698->702 702->681 703->695
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 004020D0
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                                                                  • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                                                                  • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                                                                • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004020E0
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004020F0
                                                                • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040215A
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 2987980305-0
                                                                • Opcode ID: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                                                                • Instruction ID: efc1da79dccaef9ffb2761d2644f5cd4432d5c2edc08e83b6cf0327c91c21bf2
                                                                • Opcode Fuzzy Hash: 55027bfb1e7038bef75906a0c7732c3b75841ebb17574d5b7e2f6ee6ad6aef08
                                                                • Instruction Fuzzy Hash: 2B210832904214E7CF207FA58E4DAAE3A60AF44358F60413FF601B61E0DBBD49819A6E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 704 403a7c-403a8b 705 403a97-403a9f 704->705 706 403a8d-403a90 CloseHandle 704->706 707 403aa1-403aa4 CloseHandle 705->707 708 403aab-403ab7 call 403ad9 call 405b4a 705->708 706->705 707->708 712 403abc-403abd 708->712
                                                                APIs
                                                                • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403A8E
                                                                • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,004038B3,?,?,00000007,00000009,0000000B), ref: 00403AA2
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\nsj567B.tmp\, xrefs: 00403AB2
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A81
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle
                                                                • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsj567B.tmp\
                                                                • API String ID: 2962429428-133672824
                                                                • Opcode ID: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                                                                • Instruction ID: f2bf129958ed6937e4157d035670f95a6da1e01cb45a681b65e96f9405f647bf
                                                                • Opcode Fuzzy Hash: 860558c91a71a64e21cfc04441b923a48857e57a960d7bb4a44cdc910ceccc08
                                                                • Instruction Fuzzy Hash: F4E08631640B1896C130EF7CAD4D8853B189B413357204726F1B9F20F0C738A9574EE9
                                                                APIs
                                                                • SetFilePointer.KERNEL32(00000009,00000000,00000000,00000000,00000000,0000000B,?,004031A9,000000FF,00000000,00000000,00000009,?), ref: 00403222
                                                                Strings
                                                                • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00403277, 0040328E, 004032A4
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                                                                • API String ID: 973152223-292220189
                                                                • Opcode ID: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                                                                • Instruction ID: 301e065564a74905a78554ad982773151ad037ba2d6e6f8d8cd401a7b941de18
                                                                • Opcode Fuzzy Hash: 966fed337372371c4087f3b005d0b036fc883b56c67f04ec2e368497ceacb8e7
                                                                • Instruction Fuzzy Hash: E2318D30200219FFDB109F95ED45A9A3FA8EB05755B20847EB914E61D0D738DB509FA9
                                                                APIs
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405DC1
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                                                                • GetFileAttributesA.KERNEL32(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                                                  • Part of subcall function 0040596F: CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                                                                • SetCurrentDirectoryA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\GamePall\update,00000000,00000000,000000F0), ref: 0040163C
                                                                Strings
                                                                • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00401631
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                                                                • API String ID: 1892508949-3327167313
                                                                • Opcode ID: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                                                                • Instruction ID: f3b3600b6319d637c5497ea1020ed17c5aedac6227b62b2eaa768bc98e31f113
                                                                • Opcode Fuzzy Hash: f3ba161a3ac08c4a0fb9ad52a50d0308f78dcdedc211e6075dac0401aebdcf48
                                                                • Instruction Fuzzy Hash: 09115731508140EBCF306FA54D405BF23B09E96324B28453FF8D1B22E2DA3D0C42AA3E
                                                                APIs
                                                                  • Part of subcall function 00406388: lstrcpynA.KERNEL32(0000000B,0000000B,00000400,0040366F,00423F40,NSIS Error,?,00000007,00000009,0000000B), ref: 00406395
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405DC1
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DC6
                                                                  • Part of subcall function 00405DB3: CharNextA.USER32(00000000), ref: 00405DDA
                                                                • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405E5B
                                                                • GetFileAttributesA.KERNEL32(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0), ref: 00405E6B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                • String ID: C:\
                                                                • API String ID: 3248276644-3404278061
                                                                • Opcode ID: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                                                                • Instruction ID: eca821d8ca18e415d707ee210574ba5bb9731226a542ad11e9256983d04766a4
                                                                • Opcode Fuzzy Hash: 9b5a40e36fb6d6325312229f101030c034a2baba4673648e7d7a04b0a2ff685f
                                                                • Instruction Fuzzy Hash: F7F02831105D5116C6223336AD09AAF1644CE9732471A453FFCE1B52D2DB3C8A539CEE
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                                                                • Instruction ID: 14484b0326c8a5630d33184448731c7578348ec986130544f859662fecd3ad08
                                                                • Opcode Fuzzy Hash: 3294aed7e6278100db64414b9f116292b07b09feaa7d8b5145f731feae0eba26
                                                                • Instruction Fuzzy Hash: 04A12471E04229CBDF28CFA8C844BADBBB1FF44305F14816AD956BB281C7786986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                                                                • Instruction ID: 16a3963220edad981734dfbd86db7ae4535d0e52bcc7a87e0ef86c627c8cfaa4
                                                                • Opcode Fuzzy Hash: 74e067d77b8d7a9b68dd685dca04d3d71c5ee3b4c66787705bfaaaffb075589f
                                                                • Instruction Fuzzy Hash: 2D912370D04268CBDF28CF98C854BADBBB1FF44305F14816AD956BB281C7786986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                                                                • Instruction ID: e981be8a744509f315cfd76b32476d9c10b76e0a4aa84739a8d113cb33934a41
                                                                • Opcode Fuzzy Hash: 7ffa2499bf387f79f1209cac769e5c71ba3d3f6d53411ba5d370abef73c06fe0
                                                                • Instruction Fuzzy Hash: 37812471E04228CBDF24CFA8C844BADBBB1FF45305F24816AD856BB291C7789986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                                                                • Instruction ID: 516ab04208dd2bc2fd7cdea6c41d3130492ff38fa800e35acf718bd73fbf6333
                                                                • Opcode Fuzzy Hash: d628358dfeac25ccb8ac491a47a372453481bb06581bffe716440ea5054c50f9
                                                                • Instruction Fuzzy Hash: A4712271E04228CBDF24CF98C844BADBBB1FF48305F14806AD856BB281C778A986DF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                                                                • Instruction ID: 835baf8de871759411e2c74e4a47f0112f02d54065241c3c7dcda5dc236b3f46
                                                                • Opcode Fuzzy Hash: e8eb04bd933ca205c297744f59a7b7035fe2e59d11d29800bf5f20fbdb1e525a
                                                                • Instruction Fuzzy Hash: 92712571E04228CBEF28CF98C844BADBBB1FF44305F15816AD856BB281C7786996DF45
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                                                                • Instruction ID: ccec74d0ee3a806077926e8984c2e201e8b1f3d886c73ab216be699138b2bca7
                                                                • Opcode Fuzzy Hash: ed70085a56e3aedeea153169e26c1aa9cf9d7e4654945abbe59913f8bdc615b9
                                                                • Instruction Fuzzy Hash: 39715771E04228CBEF28CF98C844BADBBB1FF44305F14806AD956BB281C778A946DF45
                                                                APIs
                                                                • GlobalFree.KERNEL32(00000000), ref: 00401BF6
                                                                • GlobalAlloc.KERNEL32(00000040,00000404), ref: 00401C08
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree
                                                                • String ID: C:\Users\user\AppData\Local\Temp\setup.exe
                                                                • API String ID: 3394109436-630909452
                                                                • Opcode ID: 1742c790c76e1204b36b83cb8595e4f796a64baec2cc559805630d203923ff3a
                                                                • Instruction ID: d16732292a7d53aa36264d1983316191a85a40c43d81ca2894a5c6bdb3dae948
                                                                • Opcode Fuzzy Hash: 1742c790c76e1204b36b83cb8595e4f796a64baec2cc559805630d203923ff3a
                                                                • Instruction Fuzzy Hash: 6921A872600208ABC720EB65CEC495E73E8EB89314765493BF502F72E1DB7CA8518B9D
                                                                APIs
                                                                • lstrlenA.KERNEL32(0040AC20,00000023,00000011,00000002), ref: 004024C9
                                                                • RegSetValueExA.KERNEL32(?,?,?,?,0040AC20,00000000,00000011,00000002), ref: 00402509
                                                                • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseValuelstrlen
                                                                • String ID:
                                                                • API String ID: 2655323295-0
                                                                • Opcode ID: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                                                                • Instruction ID: e1e6ae2a7b536448810537a1ffa9a52b32d6c636ce9630cd27147c6707bb0a71
                                                                • Opcode Fuzzy Hash: ef8eeb58056491ee092ed80bef3546efe310264daaab0f586760f51b4d92765b
                                                                • Instruction Fuzzy Hash: 04116371E04208AFEB10AFA5DE49AAEBA74EB84714F21443BF504F71C1DAB94D409B68
                                                                APIs
                                                                • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025C2
                                                                • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025D5
                                                                • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Enum$CloseValue
                                                                • String ID:
                                                                • API String ID: 397863658-0
                                                                • Opcode ID: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                                                                • Instruction ID: 33ff3e85e785963e302667c06a3cb1355a7acd8bf142a31c2560ef5bcfc7d759
                                                                • Opcode Fuzzy Hash: 705f8b49631554dcec7b4eb98624595070a3904998d9344154508b49de78e75c
                                                                • Instruction Fuzzy Hash: 2C017571904104FFE7158F54DE88ABF7BACEF81358F20443EF101A61C0DAB44E449679
                                                                APIs
                                                                  • Part of subcall function 00405EF6: GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                                                                  • Part of subcall function 00405EF6: SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                                                                • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B1D
                                                                • DeleteFileA.KERNEL32(?,?,?,00000000,00405CF1), ref: 00405B25
                                                                • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B3D
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: File$Attributes$DeleteDirectoryRemove
                                                                • String ID:
                                                                • API String ID: 1655745494-0
                                                                • Opcode ID: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                                                                • Instruction ID: eeb49a2f717892c2e0964ab94aaac89db2a73fdd151ed94c70539e0cf44bba43
                                                                • Opcode Fuzzy Hash: fdbfe47bebcd8a5232fcae5ebebd8a359ed736e28fe734178b51a2620122945d
                                                                • Instruction Fuzzy Hash: 6CE0E531109A9097C62067349908A5B7AF8EF86314F094D3AF9A1F20D0DB38B9468EBD
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                                                                • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 0040682F
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 0040683C
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: ObjectSingleWait$CodeExitProcess
                                                                • String ID:
                                                                • API String ID: 2567322000-0
                                                                • Opcode ID: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                                                                • Instruction ID: abee92fc01d0549169be82d64ea8a54f8020188e09ec540bf7ef67874f21f581
                                                                • Opcode Fuzzy Hash: d1ff3f73a38d8d565191ded27fad29c52e1940f561348969c9200a5cb4687b78
                                                                • Instruction Fuzzy Hash: 9DE0D832600118FBDB00AB54DD05E9E7F6EEB44704F114033F601B6190C7B59E21DB98
                                                                APIs
                                                                • ReadFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,0040B8F8,00403481,00000009,00000009,00403385,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F), ref: 00405FA7
                                                                Strings
                                                                • o be not permitted or dropped out!Please reconnect and click Retry to resume installation., xrefs: 00405F96
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID: o be not permitted or dropped out!Please reconnect and click Retry to resume installation.
                                                                • API String ID: 2738559852-292220189
                                                                • Opcode ID: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                                                                • Instruction ID: 61a6516da629700e98a59d605e8380186fb5f41ecf47873683bd74a9a2ef61d4
                                                                • Opcode Fuzzy Hash: 416aeb435aa013431afb1a9c1c8b913c8d53da26c76a00aa22b400e2b7bce1d1
                                                                • Instruction Fuzzy Hash: 8BE08C3220161EEBEF119E508C00AEBBB6CEB00360F004433FD25E3140E234E9218BA8
                                                                APIs
                                                                • RegQueryValueExA.KERNEL32(00000000,00000000,?,?,?,?), ref: 0040254E
                                                                • RegCloseKey.KERNEL32(?,?,?,0040AC20,00000000,00000011,00000002), ref: 004025ED
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID:
                                                                • API String ID: 3356406503-0
                                                                • Opcode ID: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                                                                • Instruction ID: 7c766f3f1fb2abd04e903467a79d83897fdaad9d0bba0580308fe752c8381985
                                                                • Opcode Fuzzy Hash: acecc3e732b5dbd74a9740bd21ea2b495ff764a52a6e8e2361329d984987feff
                                                                • Instruction Fuzzy Hash: 1B11BF71905205EFDB25CF64DA985AE7BB4AF11355F20483FE042B72C0D6B88A85DA1D
                                                                APIs
                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                                                                • Instruction ID: c6e23866af321c238b4b59365f681da1ab702c54c00e726fca3ee5b0521d1f72
                                                                • Opcode Fuzzy Hash: 04d136d289144069680b1fecce7da664cc2fd5e0b622116f853907ec40370e1b
                                                                • Instruction Fuzzy Hash: 5201D131B242109BE7194B38AE04B2A36A8E754315F51813AF851F61F1DB78CC129B4D
                                                                APIs
                                                                • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422558,00000009,00000009,0000000B), ref: 00405A4A
                                                                • CloseHandle.KERNEL32(?), ref: 00405A57
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID:
                                                                • API String ID: 3712363035-0
                                                                • Opcode ID: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                                                                • Instruction ID: 70dcd79ab4e1e9e84cc9ba673cd08f466e07e48f17d85ed3475224309c024e1a
                                                                • Opcode Fuzzy Hash: c3ebc3f9998ac015d8c7df4fd8e4914833f251e822556357c2f70f84276a4d27
                                                                • Instruction Fuzzy Hash: A5E04FB4600209BFEB009B64ED09F7B77ACFB04244F808421BE40F2150D67899658A78
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,00000000,?,0040360E,0000000B), ref: 004067A6
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004067C1
                                                                  • Part of subcall function 00406726: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040673D
                                                                  • Part of subcall function 00406726: wsprintfA.USER32 ref: 00406776
                                                                  • Part of subcall function 00406726: LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 0040678A
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                • String ID:
                                                                • API String ID: 2547128583-0
                                                                • Opcode ID: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                                                                • Instruction ID: 2a593beb9babc16b4b5ae8275dbdfb46ef4ebf17ea7291b62b5d373670c31446
                                                                • Opcode Fuzzy Hash: c54c0e861ed706937e547878721e8d44c7a1bbc080d115c20b20089ef5e69713
                                                                • Instruction Fuzzy Hash: B6E0863260421157D21067705E4897773ACAF94B54302043EF546F3144D7389C76966D
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000003,00402F9F,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00405F1F
                                                                • CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405F41
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                                                                • Instruction ID: c1cd633b288b309c16b37b55694bd397a2d2f3fd27c3ea135bedd35eac3c4d3c
                                                                • Opcode Fuzzy Hash: f7726857ad0760fd27b8592a290aaff25a5a689f9fd17e1a71efc27c39f42f7d
                                                                • Instruction Fuzzy Hash: D9D09E31254602AFEF0D8F20DE16F2E7AA2EB84B00F11952CB682944E2DA715819AB19
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(?,?,00405B0E,?,?,00000000,00405CF1,?,?,?,?), ref: 00405EFB
                                                                • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405F0F
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                                                • Instruction ID: 2a9487917742c73a52daa6fa2dda6e447083e2efb983b62a69771bacbdb33add
                                                                • Opcode Fuzzy Hash: 7db639ec3fc6e9a5b47d3eb1dfb332e917e8410632ca84ceba79978e33b6a3d0
                                                                • Instruction Fuzzy Hash: E3D0C972504422ABD2102728AE0889BBB55DB94271702CA35FDA5A26F1DB304C569A9C
                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(?,00000000,004034BF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004059F2
                                                                • GetLastError.KERNEL32(?,00000007,00000009,0000000B), ref: 00405A00
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CreateDirectoryErrorLast
                                                                • String ID:
                                                                • API String ID: 1375471231-0
                                                                • Opcode ID: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                                                                • Instruction ID: 42ce2bd36b25b14d2ed8d631edf33fc643f4c4eb5ed9af5e51ab4a49ffb09bba
                                                                • Opcode Fuzzy Hash: 1ac3f182099991a074ef026cd112de1bb624e535cee62a6747cbed0a6cbac083
                                                                • Instruction Fuzzy Hash: 9BC04C303145419AD6505B309F4DB177A54AB50741F51553A638AE01A0DA348465DD2D
                                                                APIs
                                                                • lstrcpynA.KERNEL32(?,10003024,?,10003020,1000138F,10003020,00000400), ref: 10001454
                                                                • GlobalFree.KERNELBASE(10003020), ref: 10001464
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3594499977.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 00000007.00000002.3594470461.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594556271.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594588808.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_10000000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FreeGloballstrcpyn
                                                                • String ID:
                                                                • API String ID: 1459762280-0
                                                                • Opcode ID: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                                                                • Instruction ID: 61cff6a9ed434c6726c3e265b98623322506fe6e864b2b4fb358a1092e6d6a6c
                                                                • Opcode Fuzzy Hash: d37c7429f21efaa5103ac68eecef2f505b672404a3497301ec3293a1c9b8d6fd
                                                                • Instruction Fuzzy Hash: 8DF0F8312152209FE315DF24CC94B9777E9FB0A385F018429E691C7278D770E804CB22
                                                                APIs
                                                                • RegCreateKeyExA.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CEA,00000000,?,?), ref: 00406265
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                • Instruction ID: 57b18be241489d6c3509c0f1b2cb500900bdd64e2c84313365475615acd8ae2e
                                                                • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                                                • Instruction Fuzzy Hash: 16E0E672010109BEDF196F50DD0AD7B371DEB04341F01492EF916D4091E6B5A9309734
                                                                APIs
                                                                • WriteFile.KERNEL32(00000009,00000000,00000000,00000000,00000000,004114F7,0040B8F8,00403405,0040B8F8,004114F7,o be not permitted or dropped out!Please reconnect and click Retry to resume installation.,00004000,?,00000000,0040322F,00000004), ref: 00405FD6
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction ID: d5187e51ab0d96a1766449b5dbb93cac2cdd9e80b7d20ab2fc0b5d8c8d5322e8
                                                                • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                • Instruction Fuzzy Hash: 4AE0EC3221065BABDF109E659C04EEB7B6CEB05360F004437FA55E3150D675E8219BA4
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(00000000,?,00000000,?,?,00420530,?,?,0040629C,00420530,?,?,?,00000002,C:\Windows\wininit.ini), ref: 00406232
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                • Instruction ID: e678259d492eddc69303d735af6c58fa5eb03465f078c5ba6a1a088e01eebb4c
                                                                • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                • Instruction Fuzzy Hash: 64D0123244020DBBDF116F90ED01FAB3B1DEB18350F014826FE06A80A1D775D530A725
                                                                APIs
                                                                • MoveFileExA.KERNEL32(?,?,00000005(MOVEFILE_REPLACE_EXISTING|MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040616B
                                                                  • Part of subcall function 00405FF1: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406182,?,?), ref: 00406022
                                                                  • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32(?,NUL,00000400), ref: 0040602B
                                                                  • Part of subcall function 00405FF1: GetShortPathNameA.KERNEL32(?,C:\Windows\wininit.ini,00000400), ref: 00406048
                                                                  • Part of subcall function 00405FF1: wsprintfA.USER32 ref: 00406066
                                                                  • Part of subcall function 00405FF1: GetFileSize.KERNEL32(00000000,00000000,C:\Windows\wininit.ini,C0000000,00000004,C:\Windows\wininit.ini,?,?,?,?,?), ref: 004060A1
                                                                  • Part of subcall function 00405FF1: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060B0
                                                                  • Part of subcall function 00405FF1: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E8
                                                                  • Part of subcall function 00405FF1: SetFilePointer.KERNEL32(0040A3F0,00000000,00000000,00000000,00000000,NUL=C:\Users\user\AppData\Local\Temp\nsj567B.tmp\,00000000,-0000000A,0040A3F0,00000000,[Rename],00000000,00000000,00000000), ref: 0040613E
                                                                  • Part of subcall function 00405FF1: GlobalFree.KERNEL32(00000000), ref: 0040614F
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: File$GlobalNamePathShort$AllocCloseFreeHandleMovePointerSizelstrcpywsprintf
                                                                • String ID:
                                                                • API String ID: 299535525-0
                                                                • Opcode ID: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                                                                • Instruction ID: 0556bd0dd0e376f9d1944fcc72f0db357db156cd0d89a75f2f72d3c973fa690a
                                                                • Opcode Fuzzy Hash: e5ed7b2843c229ea28ef8c1ce415cb2f1f2a9dfc0e88d0e1822b60b3228602b1
                                                                • Instruction Fuzzy Hash: F0D0C731108602FFDB111B10ED0591B7BA5FF90355F11943EF599940B1DB368461DF09
                                                                APIs
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00403182,?), ref: 00403492
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                                • Instruction ID: eadcf480fe67690f272c505b4903882a1233053cb438a9b9796e5ea94341b5dd
                                                                • Opcode Fuzzy Hash: 3686d685932152b10745f2b752acc0f7a7db7aadca6958b8d51083a7e9476777
                                                                • Instruction Fuzzy Hash: 25B09231140200AADA215F409E09F057B21AB94700F208424B244280F086712025EA0D
                                                                APIs
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                                                                  • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                                                                  • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                                                                  • Part of subcall function 00405A21: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422558,00000009,00000009,0000000B), ref: 00405A4A
                                                                  • Part of subcall function 00405A21: CloseHandle.KERNEL32(?), ref: 00405A57
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FC0
                                                                  • Part of subcall function 00406809: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040681A
                                                                  • Part of subcall function 00406809: GetExitCodeProcess.KERNEL32(?,?), ref: 0040683C
                                                                  • Part of subcall function 004062E6: wsprintfA.USER32 ref: 004062F3
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                • String ID:
                                                                • API String ID: 2972824698-0
                                                                • Opcode ID: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                                                                • Instruction ID: dce1314ccbc215d7d9c334b017be086f7c4cc40ba0f87dfe0d8145fd67a5eb82
                                                                • Opcode Fuzzy Hash: 5a6c6c0fb7ef29f4985f4766a88127bea2ca1a19b834f4a1a12170b8a3b172af
                                                                • Instruction Fuzzy Hash: 2DF0B432A05121DBDB20BFA59EC49EEB2A4DF41318B25463FF502B21D1CB7C4D418A6E
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 00405646
                                                                • GetDlgItem.USER32(?,000003EE), ref: 00405655
                                                                • GetClientRect.USER32(?,?), ref: 00405692
                                                                • GetSystemMetrics.USER32(00000002), ref: 00405699
                                                                • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004056BA
                                                                • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004056CB
                                                                • SendMessageA.USER32(?,00001001,00000000,?), ref: 004056DE
                                                                • SendMessageA.USER32(?,00001026,00000000,?), ref: 004056EC
                                                                • SendMessageA.USER32(?,00001024,00000000,?), ref: 004056FF
                                                                • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405721
                                                                • ShowWindow.USER32(?,00000008), ref: 00405735
                                                                • GetDlgItem.USER32(?,000003EC), ref: 00405756
                                                                • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405766
                                                                • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040577F
                                                                • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040578B
                                                                • GetDlgItem.USER32(?,000003F8), ref: 00405664
                                                                  • Part of subcall function 0040443A: SendMessageA.USER32(00000028,?,00000001,0040426A), ref: 00404448
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004057A7
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000557B,00000000), ref: 004057B5
                                                                • CloseHandle.KERNEL32(00000000), ref: 004057BC
                                                                • ShowWindow.USER32(00000000), ref: 004057DF
                                                                • ShowWindow.USER32(?,00000008), ref: 004057E6
                                                                • ShowWindow.USER32(00000008), ref: 0040582C
                                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405860
                                                                • CreatePopupMenu.USER32 ref: 00405871
                                                                • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405886
                                                                • GetWindowRect.USER32(?,000000FF), ref: 004058A6
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004058BF
                                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004058FB
                                                                • OpenClipboard.USER32(00000000), ref: 0040590B
                                                                • EmptyClipboard.USER32 ref: 00405911
                                                                • GlobalAlloc.KERNEL32(00000042,?), ref: 0040591A
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405924
                                                                • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405938
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405951
                                                                • SetClipboardData.USER32(00000001,00000000), ref: 0040595C
                                                                • CloseClipboard.USER32 ref: 00405962
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                • String ID: PB
                                                                • API String ID: 590372296-3196168531
                                                                • Opcode ID: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                                                                • Instruction ID: 44a2cb424ceca129f1c721a27905a8e57bc1109532c064cce4e419f7e60c3497
                                                                • Opcode Fuzzy Hash: 463c74343dc9a7e994e8db0b260deb87a45ca3f66d4da0101cb89f9be381629f
                                                                • Instruction Fuzzy Hash: 18A13971900608FFDB11AF64DE85AAE7BB9FB48355F00403AFA41BA1A0CB754E51DF58
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003FB), ref: 004048E6
                                                                • SetWindowTextA.USER32(00000000,?), ref: 00404910
                                                                • SHBrowseForFolderA.SHELL32(?,00420128,?), ref: 004049C1
                                                                • CoTaskMemFree.OLE32(00000000), ref: 004049CC
                                                                • lstrcmpiA.KERNEL32(C:\Windows\wininit.ini,00420D50), ref: 004049FE
                                                                • lstrcatA.KERNEL32(?,C:\Windows\wininit.ini), ref: 00404A0A
                                                                • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404A1C
                                                                  • Part of subcall function 00405A82: GetDlgItemTextA.USER32(?,?,00000400,00404A53), ref: 00405A95
                                                                  • Part of subcall function 00406666: CharNextA.USER32(0000000B,*?|<>/":,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                                                                  • Part of subcall function 00406666: CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                                                                  • Part of subcall function 00406666: CharNextA.USER32(0000000B,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                                                                  • Part of subcall function 00406666: CharPrevA.USER32(0000000B,0000000B,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                                                                • GetDiskFreeSpaceA.KERNEL32(0041FD20,?,?,0000040F,?,0041FD20,0041FD20,?,00000001,0041FD20,?,?,000003FB,?), ref: 00404ADA
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404AF5
                                                                  • Part of subcall function 00404C4E: lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                                                                  • Part of subcall function 00404C4E: wsprintfA.USER32 ref: 00404CF4
                                                                  • Part of subcall function 00404C4E: SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: A$C:\Users\user\AppData\Roaming\GamePall$C:\Windows\wininit.ini$PB
                                                                • API String ID: 2624150263-3088350716
                                                                • Opcode ID: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                                                                • Instruction ID: 03633cdec68ae3b48ba4c7d33c4768738bfb21d85bfcf2e4b9185cba9ee35c0f
                                                                • Opcode Fuzzy Hash: 246729fcc772db5bb1fe110679472811f76dfb67008edee7d622b3e588ee8d40
                                                                • Instruction Fuzzy Hash: 7DA150B1A00208AADB11EFA5DD45BAFB6B8EF84315F10803BF601B62D1D77C99418F6D
                                                                APIs
                                                                • CoCreateInstance.OLE32(00408418,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F8
                                                                • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00408408,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022AA
                                                                Strings
                                                                • C:\Users\user\AppData\Roaming\GamePall\update, xrefs: 00402238
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: ByteCharCreateInstanceMultiWide
                                                                • String ID: C:\Users\user\AppData\Roaming\GamePall\update
                                                                • API String ID: 123533781-3327167313
                                                                • Opcode ID: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                                                                • Instruction ID: 4a55140eb955682c0845ac661669d1effe53c60cfc8a987c49de3bb9103baba8
                                                                • Opcode Fuzzy Hash: 975ab102bccf2e3ea3487b48f3b75e49990d828168e5a332ce340ef805c2210c
                                                                • Instruction Fuzzy Hash: B2513575A00208AFDF10DFE4CA88A9D7BB5EF48314F2045BAF505EB2D1DA799981CB54
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027B9
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: FileFindFirst
                                                                • String ID:
                                                                • API String ID: 1974802433-0
                                                                • Opcode ID: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                                                                • Instruction ID: 9767438fe71d1176ff9aac627a01f72906af616df08219c0cc944b63bddc0547
                                                                • Opcode Fuzzy Hash: 3697544f2be0618a58616ff40495ed399055e36512a5e022deae8fba2564a7e1
                                                                • Instruction Fuzzy Hash: CCF0A0726082049AD710EBA49A49AEEB7689F51324F60057BF142F20C1D6B889459B2A
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 00404E21
                                                                • GetDlgItem.USER32(?,00000408), ref: 00404E2E
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404E7D
                                                                • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404E94
                                                                • SetWindowLongA.USER32(?,000000FC,0040541D), ref: 00404EAE
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404EC0
                                                                • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404ED4
                                                                • SendMessageA.USER32(?,00001109,00000002), ref: 00404EEA
                                                                • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404EF6
                                                                • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404F06
                                                                • DeleteObject.GDI32(00000110), ref: 00404F0B
                                                                • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404F36
                                                                • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404F42
                                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404FDC
                                                                • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 0040500C
                                                                  • Part of subcall function 0040443A: SendMessageA.USER32(00000028,?,00000001,0040426A), ref: 00404448
                                                                • SendMessageA.USER32(?,00001100,00000000,?), ref: 00405020
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 0040504E
                                                                • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040505C
                                                                • ShowWindow.USER32(?,00000005), ref: 0040506C
                                                                • SendMessageA.USER32(?,00000419,00000000,?), ref: 00405167
                                                                • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004051CC
                                                                • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 004051E1
                                                                • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00405205
                                                                • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00405225
                                                                • ImageList_Destroy.COMCTL32(?), ref: 0040523A
                                                                • GlobalFree.KERNEL32(?), ref: 0040524A
                                                                • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004052C3
                                                                • SendMessageA.USER32(?,00001102,?,?), ref: 0040536C
                                                                • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040537B
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004053A6
                                                                • ShowWindow.USER32(?,00000000), ref: 004053F4
                                                                • GetDlgItem.USER32(?,000003FE), ref: 004053FF
                                                                • ShowWindow.USER32(00000000), ref: 00405406
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $M$N
                                                                • API String ID: 2564846305-813528018
                                                                • Opcode ID: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                                                                • Instruction ID: c306c4130ea67d8582adb4b0d0e706bf782d7aff15223233fd0d43401108afdf
                                                                • Opcode Fuzzy Hash: 4bb258af210f6716591e45ffd85afba0d9fc7d499c01c39e68e435e5f0500988
                                                                • Instruction Fuzzy Hash: 6C025CB0A00609AFDB209F94DD45AAE7BB5FB84354F10817AF610BA2E1D7789D42CF58
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403F47
                                                                • ShowWindow.USER32(?), ref: 00403F67
                                                                • GetWindowLongA.USER32(?,000000F0), ref: 00403F79
                                                                • ShowWindow.USER32(?,00000004), ref: 00403F92
                                                                • DestroyWindow.USER32 ref: 00403FA6
                                                                • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403FBF
                                                                • GetDlgItem.USER32(?,?), ref: 00403FDE
                                                                • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403FF2
                                                                • IsWindowEnabled.USER32(00000000), ref: 00403FF9
                                                                • GetDlgItem.USER32(?,00000001), ref: 004040A4
                                                                • GetDlgItem.USER32(?,00000002), ref: 004040AE
                                                                • SetClassLongA.USER32(?,000000F2,?), ref: 004040C8
                                                                • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404119
                                                                • GetDlgItem.USER32(?,00000003), ref: 004041BF
                                                                • ShowWindow.USER32(00000000,?), ref: 004041E0
                                                                • EnableWindow.USER32(?,?), ref: 004041F2
                                                                • EnableWindow.USER32(?,?), ref: 0040420D
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404223
                                                                • EnableMenuItem.USER32(00000000), ref: 0040422A
                                                                • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00404242
                                                                • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00404255
                                                                • lstrlenA.KERNEL32(00420D50,?,00420D50,00000000), ref: 0040427F
                                                                • SetWindowTextA.USER32(?,00420D50), ref: 0040428E
                                                                • ShowWindow.USER32(?,0000000A), ref: 004043C2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                                • String ID: PB
                                                                • API String ID: 1860320154-3196168531
                                                                • Opcode ID: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                                                                • Instruction ID: 6b3c419a8b2de2434844e8cd53afab52d63163afb5b1bd925d395a768d9dd0e6
                                                                • Opcode Fuzzy Hash: a84a76c7c437068317dea6ec38f5a19867a10701d7094664a652b1a8aea3850c
                                                                • Instruction Fuzzy Hash: ECC1D2B1A00204BBCB206F61EE45E2B3A78EB85745F41053EF781B61F1CB3998929B5D
                                                                APIs
                                                                • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004045FB
                                                                • GetDlgItem.USER32(00000000,000003E8), ref: 0040460F
                                                                • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040462D
                                                                • GetSysColor.USER32(?), ref: 0040463E
                                                                • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040464D
                                                                • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040465C
                                                                • lstrlenA.KERNEL32(?), ref: 0040465F
                                                                • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040466E
                                                                • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404683
                                                                • GetDlgItem.USER32(?,0000040A), ref: 004046E5
                                                                • SendMessageA.USER32(00000000), ref: 004046E8
                                                                • GetDlgItem.USER32(?,000003E8), ref: 00404713
                                                                • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404753
                                                                • LoadCursorA.USER32(00000000,00007F02), ref: 00404762
                                                                • SetCursor.USER32(00000000), ref: 0040476B
                                                                • LoadCursorA.USER32(00000000,00007F00), ref: 00404781
                                                                • SetCursor.USER32(00000000), ref: 00404784
                                                                • SendMessageA.USER32(00000111,00000001,00000000), ref: 004047B0
                                                                • SendMessageA.USER32(00000010,00000000,00000000), ref: 004047C4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                • String ID: N$6B
                                                                • API String ID: 3103080414-649610290
                                                                • Opcode ID: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                                                                • Instruction ID: 424ea1d81b5f8fd67bb79b8421ee67f108f717641e3cc5fc4ea293435da972af
                                                                • Opcode Fuzzy Hash: c874497606b373bfbb3475a273ba326ab034ae9c38f8566fe8320349c510c150
                                                                • Instruction Fuzzy Hash: CE6190B1A40208BFDB109F61DD45B6A7B69FB84715F10843AFB01BB2D1C7B8A951CF98
                                                                APIs
                                                                • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                                • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                • DrawTextA.USER32(00000000,00423F40,000000FF,00000010,00000820), ref: 00401156
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                • DeleteObject.GDI32(?), ref: 00401165
                                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F
                                                                • API String ID: 941294808-1304234792
                                                                • Opcode ID: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                                                                • Instruction ID: bc851ab26da2bb863bf3a2ee07eb2f950de800ada4cbee7b2d64f78586a04119
                                                                • Opcode Fuzzy Hash: db458c2aac7b07c9de4f1dfd54ee4cc10e0d46da2aaa9c20a0cc65b716daa4c3
                                                                • Instruction Fuzzy Hash: 2C419D71800249AFCF058FA5DE459AF7FB9FF45314F00802AF991AA1A0C734DA55DFA4
                                                                APIs
                                                                • lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                                                                • lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                                                                • lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                                                                • SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                                                                • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                                                                • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                                                                • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                • String ID: 4/@
                                                                • API String ID: 2531174081-3101945251
                                                                • Opcode ID: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                                                                • Instruction ID: 7ab3267fb946cf8e7efc5916356ec1270af3577e2396c2c3629ce5ef3fcb69de
                                                                • Opcode Fuzzy Hash: 17623ae6e76ffa783ca229a28a88b1e205e4a8d30cb80da27a9000df8195634c
                                                                • Instruction Fuzzy Hash: 0F217A71E00118BBCF119FA5DD8099EBFB9EF09354F04807AF944A6291C7788A90CFA8
                                                                APIs
                                                                • CharNextA.USER32(0000000B,*?|<>/":,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066BE
                                                                • CharNextA.USER32(0000000B,0000000B,0000000B,00000000,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066CB
                                                                • CharNextA.USER32(0000000B,?,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066D0
                                                                • CharPrevA.USER32(0000000B,0000000B,74DF3410,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\5B7B.exe,004034A7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 004066E0
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\5B7B.exe, xrefs: 00406666
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00406667
                                                                • *?|<>/":, xrefs: 004066AE
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\5B7B.exe
                                                                • API String ID: 589700163-366519707
                                                                • Opcode ID: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                                                                • Instruction ID: 80d428334b402c3338f843ea799862c1973996ffb1638880579f4ae0c72fc655
                                                                • Opcode Fuzzy Hash: 6bc0e94b7f234696628355ee2fbbbdde5b7464ab094feb853247d74dffcc646e
                                                                • Instruction Fuzzy Hash: 7E1108518047902DEB3206340C04B7B7F894F977A0F2A087FD8C6722C2D67E5C62967D
                                                                APIs
                                                                • DestroyWindow.USER32(?,00000000), ref: 00402ED5
                                                                • GetTickCount.KERNEL32 ref: 00402EF3
                                                                • wsprintfA.USER32 ref: 00402F21
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000,?), ref: 004054E2
                                                                  • Part of subcall function 004054A9: lstrlenA.KERNEL32(4/@,00420530,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402F34,00000000), ref: 004054F2
                                                                  • Part of subcall function 004054A9: lstrcatA.KERNEL32(00420530,00000020,4/@,00420530,00000000,00000000,00000000), ref: 00405505
                                                                  • Part of subcall function 004054A9: SetWindowTextA.USER32(00420530,00420530), ref: 00405517
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040553D
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405557
                                                                  • Part of subcall function 004054A9: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405565
                                                                • CreateDialogParamA.USER32(0000006F,00000000,00402E25,00000000), ref: 00402F45
                                                                • ShowWindow.USER32(00000000,00000005), ref: 00402F53
                                                                  • Part of subcall function 00402EA1: MulDiv.KERNEL32(?,00000064,?), ref: 00402EB6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                • String ID: ... %d%%$#Vh%.@
                                                                • API String ID: 722711167-1706192003
                                                                • Opcode ID: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                                                                • Instruction ID: ac0ca11ee9366edb0cc6a28cc5aeb329eacd7d00ab00b3c3670f6d564c8935e4
                                                                • Opcode Fuzzy Hash: db62a3d36480f0b73892ce8a9fc69f21d0c49374a29e778f3850d420ffd5c07d
                                                                • Instruction Fuzzy Hash: 3F01A170542225EBCB21BB50EF0CBAB3778EB40744B04443BF505B21D0C7F894469AEE
                                                                APIs
                                                                • GetWindowLongA.USER32(?,000000EB), ref: 00404489
                                                                • GetSysColor.USER32(00000000), ref: 004044C7
                                                                • SetTextColor.GDI32(?,00000000), ref: 004044D3
                                                                • SetBkMode.GDI32(?,?), ref: 004044DF
                                                                • GetSysColor.USER32(?), ref: 004044F2
                                                                • SetBkColor.GDI32(?,?), ref: 00404502
                                                                • DeleteObject.GDI32(?), ref: 0040451C
                                                                • CreateBrushIndirect.GDI32(?), ref: 00404526
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                                                                • Instruction ID: 76b6fc4927f6120469f5ffa52701fcd3ddd76896e52d32ad6f55637f73cee333
                                                                • Opcode Fuzzy Hash: d8b0c4ae085d5752a0ceb3fd9c96bfdfa4daadee6b5f884e1a531c3ceae13210
                                                                • Instruction Fuzzy Hash: 9E2147B1501704AFCB31DF68ED08B5BBBF8AF41715B04892EEA96A26E0D734E904CB54
                                                                APIs
                                                                • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404D73
                                                                • GetMessagePos.USER32 ref: 00404D7B
                                                                • ScreenToClient.USER32(?,?), ref: 00404D95
                                                                • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404DA7
                                                                • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404DCD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                                • Instruction ID: de178be9688f757f82ef56a4cbeb6693d0582b60b2ea90e1a00f6814b48fd044
                                                                • Opcode Fuzzy Hash: fae6ee4ef260730fd0e6baeb46c05ac4d0d99299cd6b7910a3b5b88b2e21feb9
                                                                • Instruction Fuzzy Hash: BB014871900219BADB01DBA4DD85BFEBBF8AF95B11F10016ABA40B61C0C6B499058BA4
                                                                APIs
                                                                • CreateDirectoryA.KERNEL32(?,0000000B,C:\Users\user\AppData\Local\Temp\), ref: 004059B2
                                                                • GetLastError.KERNEL32 ref: 004059C6
                                                                • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004059DB
                                                                • GetLastError.KERNEL32 ref: 004059E5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                • String ID: !9@$C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 3449924974-2369717338
                                                                • Opcode ID: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                                                                • Instruction ID: 4cd508ff09270142ca7a6984d66ae253fefa4e1f6983b248f3af4f59f5a14231
                                                                • Opcode Fuzzy Hash: df2ca303ac227c9e0d0fbc5e27afd1aa0bff8a01fb2d8cf1edb312bec269ebc1
                                                                • Instruction Fuzzy Hash: 610108B1D00259DAEF109BA0CA45BEFBBB8EB04354F00403AD645B6290D7789648CF99
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E40
                                                                • wsprintfA.USER32 ref: 00402E74
                                                                • SetWindowTextA.USER32(?,?), ref: 00402E84
                                                                • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402E96
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                • API String ID: 1451636040-1158693248
                                                                • Opcode ID: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                                                                • Instruction ID: 7ad4584a5e884be7344c254f70e0401137e7e46ce86c3cf658bb2ab9d23be74a
                                                                • Opcode Fuzzy Hash: a45d99d8fe85d32cf27a6b993dcd334edf2177b7a3e8b64a3b444c48cc752336
                                                                • Instruction Fuzzy Hash: 1DF01D7054020DBAEF219F60DE0ABAE3769EB44344F00803AFA16B91D0DBB899558F99
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402849
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402865
                                                                • GlobalFree.KERNEL32(?), ref: 004028A4
                                                                • GlobalFree.KERNEL32(00000000), ref: 004028B7
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028D3
                                                                • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028E6
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                • String ID:
                                                                • API String ID: 2667972263-0
                                                                • Opcode ID: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                                                                • Instruction ID: cd924008ac91bdcd896aacfcc8aadc4f9c7de1b4393fc14a433ce499bdbf1d56
                                                                • Opcode Fuzzy Hash: 89df3cefb7dd421bed2d3b7eed546734cb5ae329452e645b4cc4e6c356db934a
                                                                • Instruction Fuzzy Hash: D931AC32800128ABDF216FA5DE49D9E7A75FF08364F24423AF450B62D0CB7949419F68
                                                                APIs
                                                                • OpenProcess.KERNEL32(00100401,00000000,?,0000025E,?,00000000,?), ref: 10001054
                                                                • EnumWindows.USER32(10001007,?), ref: 10001074
                                                                • GetExitCodeProcess.KERNEL32(00000000,?), ref: 10001084
                                                                • WaitForSingleObject.KERNEL32(00000000,00000BB8), ref: 1000109D
                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 100010AE
                                                                • CloseHandle.KERNEL32(00000000), ref: 100010C5
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3594499977.0000000010001000.00000020.00000001.01000000.00000009.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 00000007.00000002.3594470461.0000000010000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594556271.0000000010002000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000007.00000002.3594588808.0000000010004000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_10000000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseCodeEnumExitHandleObjectOpenSingleTerminateWaitWindows
                                                                • String ID:
                                                                • API String ID: 3465249596-0
                                                                • Opcode ID: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                                                                • Instruction ID: 6b4dcd5717a232181223c093e4f4244ae1ce1555a3c8e15b92772d9ea2fb9ae7
                                                                • Opcode Fuzzy Hash: 45a2251c50cfe7217ad4567bb79eedec0e3199e983198285888405aa9b7494a4
                                                                • Instruction Fuzzy Hash: 5211E235A00299EFFB00DFA5CCC8AEE77BCEB456C5F014069FA4192149D7B49981CB62
                                                                APIs
                                                                • lstrlenA.KERNEL32(00420D50,00420D50,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404B69,000000DF,00000000,00000400,?), ref: 00404CEC
                                                                • wsprintfA.USER32 ref: 00404CF4
                                                                • SetDlgItemTextA.USER32(?,00420D50), ref: 00404D07
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s$PB
                                                                • API String ID: 3540041739-838025833
                                                                • Opcode ID: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                                                                • Instruction ID: 635705270cf82d3fa6c033b13715314544988666452c3f341a93ad76d23c3d90
                                                                • Opcode Fuzzy Hash: 837710c020be2e613de14c6f4d6baa8c213068046cd931f6ce14c5213cbfad60
                                                                • Instruction Fuzzy Hash: 5F11E77360512837EB00656D9D45EAE3298DB85374F26423BFE26F71D1E978CC1286E8
                                                                APIs
                                                                • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402D8F
                                                                • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402DDB
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DE4
                                                                • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402DFB
                                                                • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E06
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseEnum$DeleteValue
                                                                • String ID:
                                                                • API String ID: 1354259210-0
                                                                • Opcode ID: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                                                                • Instruction ID: 1f7d8097ab2fb743d310579a2b4365e3e31c1a4ec17ce584dda370d325fd3950
                                                                • Opcode Fuzzy Hash: 6a17d2dfc8014f9998472e4bb2df9c50261cd009cc462a72ab7525fe56808e65
                                                                • Instruction Fuzzy Hash: 1D214B7150010CBBDF129F90CE89EEB7B7DEF44344F11007AF955B11A0D7B49EA49AA8
                                                                APIs
                                                                • GetDlgItem.USER32(?,?), ref: 00401D7E
                                                                • GetClientRect.USER32(?,?), ref: 00401DCC
                                                                • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401DFC
                                                                • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E10
                                                                • DeleteObject.GDI32(00000000), ref: 00401E20
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                                                                • Instruction ID: cb7cd4706ec086029cb46641885d9617bace417a5341e65c45b3777010ef1041
                                                                • Opcode Fuzzy Hash: 593d1372a554d47c5dd87fed6cfd69f5edd78a04abfcab04570fffcca4b878a5
                                                                • Instruction Fuzzy Hash: 35212A72E00109AFDF15DFA4DD85AAEBBB5EB88300F24417EF911F62A0DB389941DB14
                                                                APIs
                                                                • GetDC.USER32(?), ref: 00401E38
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E52
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00401E5A
                                                                • ReleaseDC.USER32(?,00000000), ref: 00401E6B
                                                                • CreateFontIndirectA.GDI32(0040B820), ref: 00401EBA
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                                • String ID:
                                                                • API String ID: 3808545654-0
                                                                • Opcode ID: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                                                                • Instruction ID: bfe7ce59390996d5b2ac71ca67757b7c78ff13e1b53bdd881068f9c0e557254e
                                                                • Opcode Fuzzy Hash: de4b304c9a389d7a08c3fe75b8b690b37b20fc1cb77e4e41693a04eab2cef683
                                                                • Instruction Fuzzy Hash: 66018072504340AEE7007BB0AF8AA9A7FE8E755701F109439F241B61E2CB790449CB6C
                                                                APIs
                                                                • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C9E
                                                                • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CB6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                                                                • Instruction ID: a12cfbdd51ff26f17676da16b1bc06906883597644a76ef85f46b7bf1251d8d3
                                                                • Opcode Fuzzy Hash: 1399452274c26c04b05c3e26325e61428879637001adb01d26c94ca9c19498ca
                                                                • Instruction Fuzzy Hash: 2A218271948208BEEB059FF5DA8AAAD7FB4EF84304F20447EF101B61D1D7B989819B18
                                                                APIs
                                                                • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D20
                                                                • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034B9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037A9,?,00000007,00000009,0000000B), ref: 00405D29
                                                                • lstrcatA.KERNEL32(?,0040A014,?,00000007,00000009,0000000B), ref: 00405D3A
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405D1A
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrcatlstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                                • API String ID: 2659869361-3081826266
                                                                • Opcode ID: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                                                                • Instruction ID: 6a6775ee8fa4d5d8d60a890cb1840bbff54d6a4bc9e312217f61a2b57c53a4e0
                                                                • Opcode Fuzzy Hash: 78cba1d5cb2474798914f87c9b537ab1510ee16986e2efd06177e80df85e38b2
                                                                • Instruction Fuzzy Hash: 82D0A7625015307AD20167154C09DDF29488F523017094027F501B7191C67C5C1187FD
                                                                APIs
                                                                • CharNextA.USER32(?,?,C:\,0000000B,00405E1F,C:\,C:\,74DF3410,?,74DF2EE0,00405B6A,?,74DF3410,74DF2EE0,C:\Users\user\AppData\Local\Temp\5B7B.exe), ref: 00405DC1
                                                                • CharNextA.USER32(00000000), ref: 00405DC6
                                                                • CharNextA.USER32(00000000), ref: 00405DDA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharNext
                                                                • String ID: C:\
                                                                • API String ID: 3213498283-3404278061
                                                                • Opcode ID: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                                                                • Instruction ID: a81d310af092f64b8c374c4571b8fed5a60269d48026fa3bbeeaae68e06855d2
                                                                • Opcode Fuzzy Hash: 39b5ed16b6dfe77c974b4e4dad13ac827778716fd50118a58326aa52b160bb8b
                                                                • Instruction Fuzzy Hash: 71F09661904F542BFB3293648C4CB776B8DCF55351F28947BE6807A6C1C27C59808FEA
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 0040544C
                                                                • CallWindowProcA.USER32(?,?,?,?), ref: 0040549D
                                                                  • Part of subcall function 00404451: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00404463
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID:
                                                                • API String ID: 3748168415-3916222277
                                                                • Opcode ID: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                                                                • Instruction ID: ce4d6245f7a5538c18ae28323cba1b5bdda0ccdff68052f186ad3da5f1ae13b7
                                                                • Opcode Fuzzy Hash: 14b3d6ef5c2a84fc52750bef5e2e8b29c93878db9a0e482e1958f3e7559ce471
                                                                • Instruction Fuzzy Hash: 2A015E31200608AFDF216F51DD80BAF3A66EB84716F104537FA05761D2C7799CD29F6A
                                                                APIs
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,C:\Windows\wininit.ini,00420530,?,?,?,00000002,C:\Windows\wininit.ini,?,00406527,80000002), ref: 004062B5
                                                                • RegCloseKey.ADVAPI32(?,?,00406527,80000002,Software\Microsoft\Windows\CurrentVersion,C:\Windows\wininit.ini,C:\Windows\wininit.ini,C:\Windows\wininit.ini,?,00420530), ref: 004062C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue
                                                                • String ID: C:\Windows\wininit.ini
                                                                • API String ID: 3356406503-2725141966
                                                                • Opcode ID: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                                                                • Instruction ID: 5c8aa4f59809ec7c4ed175be077f356401e74c3ba082423fbe1b6bbc42bea5f4
                                                                • Opcode Fuzzy Hash: b5b3bad3c76d40b2ede80ce474e794f1db4bf40d8bfbb80b5b2804fbfeedd4a0
                                                                • Instruction Fuzzy Hash: 8101BC72100209ABDF229F60CC09FDB3FA8EF45364F01407AFD56A6190D638C974CBA8
                                                                APIs
                                                                • lstrlenA.KERNEL32(80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\5B7B.exe,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00405D67
                                                                • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\AppData\Local\Temp,00402FC8,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp,C:\Users\user\AppData\Local\Temp\5B7B.exe,C:\Users\user\AppData\Local\Temp\5B7B.exe,80000000,00000003), ref: 00405D75
                                                                Strings
                                                                • C:\Users\user\AppData\Local\Temp, xrefs: 00405D61
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: CharPrevlstrlen
                                                                • String ID: C:\Users\user\AppData\Local\Temp
                                                                • API String ID: 2709904686-47812868
                                                                • Opcode ID: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                                                                • Instruction ID: 27c40c0738421aba4af956c8f0f705930dfe744a77a65273bf6dbb66402e0641
                                                                • Opcode Fuzzy Hash: 46bbde6159133eac16457addd6c3fa88623ef59ff022f94c34d6ba2180d3974b
                                                                • Instruction Fuzzy Hash: CBD0A772409D706EE31353208C04B8F6A48CF13300F0D4063E481A6190C2785C424BFD
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E90
                                                                • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405EA8
                                                                • CharNextA.USER32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EB9
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,004060DB,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405EC2
                                                                Memory Dump Source
                                                                • Source File: 00000007.00000002.3592555309.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000007.00000002.3592514517.0000000000400000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592628804.0000000000408000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000040A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000422000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.000000000042A000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592663500.0000000000434000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000436000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000439000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000446000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000454000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.000000000045B000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                • Associated: 00000007.00000002.3592896476.0000000000462000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_7_2_400000_5B7B.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                                                                • Instruction ID: 98ea32bb50e75ca8be10b873c57fc005eda9f523d07111d413316ed06cfa332a
                                                                • Opcode Fuzzy Hash: 2d92a05f35b020f23b5ffca9bb537fc612b2b61cfc11000e71e0c2b875cbb8c3
                                                                • Instruction Fuzzy Hash: 5FF06235104918AFCB129BA5DD4099EBFA8EF55350B2540B9E880F7211D674DF019BA9

                                                                Execution Graph

                                                                Execution Coverage:1.2%
                                                                Dynamic/Decrypted Code Coverage:22.1%
                                                                Signature Coverage:3.4%
                                                                Total number of Nodes:1522
                                                                Total number of Limit Nodes:75
                                                                execution_graph 144946 f814b9 144957 f814c2 144946->144957 144947 f81779 145024 f83fe0 144947->145024 144949 f816a9 144951 f81781 144949->144951 144952 f81757 144949->144952 145062 fd4870 15 API calls 144951->145062 145061 fd4870 15 API calls 144952->145061 144956 f819ac 144959 f81a5a 144956->144959 144960 f81a84 144956->144960 144957->144947 144957->144949 145059 f71d90 15 API calls 144957->145059 145060 f71de0 20 API calls 144957->145060 145065 fd4870 15 API calls 144959->145065 145066 fd4870 15 API calls 144960->145066 144964 f81cbf 144966 f81d6d 144964->144966 144967 f81d97 144964->144967 145069 fd4870 15 API calls 144966->145069 145070 fd4870 15 API calls 144967->145070 144968 f817b3 144968->144956 144978 f81a7c 144968->144978 145063 f71d90 15 API calls 144968->145063 145064 f71de0 20 API calls 144968->145064 144971 f81fd2 144974 f820aa 144971->144974 144975 f82080 144971->144975 145074 fd4870 15 API calls 144974->145074 145073 fd4870 15 API calls 144975->145073 144978->144964 144985 f81d8f 144978->144985 145067 f71d90 15 API calls 144978->145067 145068 f71de0 20 API calls 144978->145068 144981 f8239a 145077 fd4870 15 API calls 144981->145077 144982 f823c4 145078 fd4870 15 API calls 144982->145078 144983 f822ed 144983->144981 144983->144982 144985->144971 144994 f820a2 144985->144994 145071 f71d90 15 API calls 144985->145071 145072 f71de0 20 API calls 144985->145072 144988 f825ff 144990 f826ac 144988->144990 144991 f826d6 144988->144991 145081 fd4870 15 API calls 144990->145081 145082 fd4870 15 API calls 144991->145082 144994->144983 145001 f823bc 144994->145001 145075 f71d90 15 API calls 144994->145075 145076 f71de0 20 API calls 144994->145076 144997 f83011 145005 f8306a LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 144997->145005 145006 f830ce 144997->145006 144998 f829e8 145086 fd4870 15 API calls 144998->145086 144999 f829be 145085 fd4870 15 API calls 144999->145085 145000 f82911 145000->144998 145000->144999 145001->144988 145007 f826ce 145001->145007 145079 f71d90 15 API calls 145001->145079 145080 f71de0 20 API calls 145001->145080 145005->145006 145111 38221f5 InitializeCriticalSectionAndSpinCount 145005->145111 145007->145000 145019 f829e0 145007->145019 145083 f71d90 15 API calls 145007->145083 145084 f71de0 20 API calls 145007->145084 145009 f82c26 145010 f82cfd 145009->145010 145011 f82cd3 145009->145011 145090 fd4870 15 API calls 145010->145090 145089 fd4870 15 API calls 145011->145089 145012 f82f42 145017 f83019 145012->145017 145018 f82fef 145012->145018 145094 fd4870 15 API calls 145017->145094 145093 fd4870 15 API calls 145018->145093 145019->145009 145023 f82cf5 145019->145023 145087 f71d90 15 API calls 145019->145087 145088 f71de0 20 API calls 145019->145088 145023->144997 145023->145012 145091 f71d90 15 API calls 145023->145091 145092 f71de0 20 API calls 145023->145092 145035 f8400f 145024->145035 145025 f841c0 145028 f8424a 145025->145028 145029 f84274 145025->145029 145027 f84bae 145027->144968 145099 fd4870 15 API calls 145028->145099 145100 fd4870 15 API calls 145029->145100 145033 f84473 145036 f844fd 145033->145036 145037 f84527 145033->145037 145035->145025 145046 f8426c 145035->145046 145097 f71d90 15 API calls 145035->145097 145098 f71de0 20 API calls 145035->145098 145103 fd4870 15 API calls 145036->145103 145104 fd4870 15 API calls 145037->145104 145039 f84717 145043 f847cb 145039->145043 145044 f847a1 145039->145044 145108 fd4870 15 API calls 145043->145108 145107 fd4870 15 API calls 145044->145107 145046->145033 145053 f8451f 145046->145053 145101 f71d90 15 API calls 145046->145101 145102 f71de0 20 API calls 145046->145102 145050 f849bb 145050->145027 145051 f84a6d GetModuleHandleA GetProcAddress 145050->145051 145055 f84a9f ctype 145051->145055 145053->145039 145054 f847c3 145053->145054 145105 f71d90 15 API calls 145053->145105 145106 f71de0 20 API calls 145053->145106 145054->145050 145109 f71d90 15 API calls 145054->145109 145110 f71de0 20 API calls 145054->145110 145056 f84b3a VirtualProtect VirtualProtect 145055->145056 145095 fd0910 145056->145095 145059->144957 145060->144957 145061->144947 145062->144947 145063->144968 145064->144968 145065->144978 145066->144978 145067->144978 145068->144978 145069->144985 145070->144985 145071->144985 145072->144985 145073->144994 145074->144994 145075->144994 145076->144994 145077->145001 145078->145001 145079->145001 145080->145001 145081->145007 145082->145007 145083->145007 145084->145007 145085->145019 145086->145019 145087->145019 145088->145019 145089->145023 145090->145023 145091->145023 145092->145023 145093->144997 145094->144997 145096 f84b84 VirtualProtect 145095->145096 145096->145027 145097->145035 145098->145035 145099->145046 145100->145046 145101->145046 145102->145046 145103->145053 145104->145053 145105->145053 145106->145053 145107->145054 145108->145054 145109->145054 145110->145054 145112 3822214 145111->145112 145113 3822219 CreateMutexA 145111->145113 145114 3822235 GetLastError 145113->145114 145115 3822678 ExitProcess 145113->145115 145114->145115 145116 3822246 145114->145116 145189 3823bd2 145116->145189 145118 382264f DeleteCriticalSection 145118->145115 145119 3822251 145119->145118 145193 38247e6 145119->145193 145122 3822647 145124 3823536 2 API calls 145122->145124 145124->145118 145129 38222e0 145216 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145129->145216 145131 38222ef 145217 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145131->145217 145133 38225df 145282 3823d76 EnterCriticalSection 145133->145282 145135 38222fe 145135->145133 145218 38246d4 GetModuleHandleA 145135->145218 145136 38225f8 145295 3823536 145136->145295 145139 3822360 145139->145133 145221 3821f2d GetUserDefaultUILanguage 145139->145221 145141 3823536 2 API calls 145142 3822610 145141->145142 145144 3823536 2 API calls 145142->145144 145146 382261b 145144->145146 145148 3823536 2 API calls 145146->145148 145147 38223b4 145147->145112 145150 38223dd ExitProcess 145147->145150 145153 38223e5 145147->145153 145151 3822626 145148->145151 145149 38246d4 2 API calls 145149->145147 145151->145122 145298 382536d 145151->145298 145154 3822412 ExitProcess 145153->145154 145155 382241a 145153->145155 145156 3822447 ExitProcess 145155->145156 145157 382244f 145155->145157 145232 3824ba2 145157->145232 145165 3822532 145310 3825239 145165->145310 145166 382251f 145167 38235db 11 API calls 145166->145167 145167->145165 145169 3822543 145170 3825239 4 API calls 145169->145170 145171 3822551 145170->145171 145172 3825239 4 API calls 145171->145172 145173 3822561 145172->145173 145174 3825239 4 API calls 145173->145174 145175 3822570 145174->145175 145176 3825239 4 API calls 145175->145176 145177 3822580 145176->145177 145178 3825239 4 API calls 145177->145178 145179 382258f 145178->145179 145314 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145179->145314 145181 3822599 145182 38225b2 145181->145182 145183 38225a2 GetModuleFileNameW 145181->145183 145184 3825239 4 API calls 145182->145184 145183->145182 145185 38225cc 145184->145185 145186 3825239 4 API calls 145185->145186 145187 38225d7 145186->145187 145188 3823536 2 API calls 145187->145188 145188->145133 145190 3823bda 145189->145190 145315 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145190->145315 145192 3823be5 145192->145119 145194 38246d4 2 API calls 145193->145194 145195 3824812 145194->145195 145196 3822283 145195->145196 145197 3825239 4 API calls 145195->145197 145196->145122 145202 38235db 145196->145202 145198 3824828 145197->145198 145199 3825239 4 API calls 145198->145199 145200 3824833 145199->145200 145201 3825239 4 API calls 145200->145201 145201->145196 145316 3822c08 145202->145316 145205 382484b 145206 3824860 VirtualAlloc 145205->145206 145209 38222c4 145205->145209 145207 382487f 145206->145207 145206->145209 145208 38246d4 2 API calls 145207->145208 145210 38248a1 145208->145210 145209->145122 145215 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145209->145215 145210->145209 145211 38248d0 GetCurrentProcess IsWow64Process 145210->145211 145213 3825239 4 API calls 145211->145213 145214 38248fa 145213->145214 145214->145209 145215->145129 145216->145131 145217->145135 145219 38246f2 LoadLibraryA 145218->145219 145220 38246ff 145218->145220 145219->145220 145220->145139 145222 3821fa0 145221->145222 145223 38235db 11 API calls 145222->145223 145224 3821fd8 145223->145224 145225 38235db 11 API calls 145224->145225 145226 3821fe7 GetKeyboardLayoutList 145225->145226 145227 3822042 145226->145227 145231 3822001 145226->145231 145228 38235db 11 API calls 145227->145228 145229 382204e 145228->145229 145229->145147 145229->145149 145230 38235db 11 API calls 145230->145231 145231->145227 145231->145230 145233 3822468 CreateThread CreateThread WaitForMultipleObjects 145232->145233 145234 3824bb8 145232->145234 145259 38219df 145233->145259 145491 382519f 145233->145491 145499 3821d3c 145233->145499 145235 38246d4 2 API calls 145234->145235 145236 3824be9 145235->145236 145236->145233 145237 38246d4 2 API calls 145236->145237 145238 3824bfe 145237->145238 145238->145233 145239 3824c06 KiUserCallbackDispatcher GetSystemMetrics 145238->145239 145240 3824c2b 145239->145240 145241 3824c51 GetDC 145240->145241 145241->145233 145242 3824c65 GetCurrentObject 145241->145242 145243 3824e17 ReleaseDC 145242->145243 145244 3824c78 GetObjectW 145242->145244 145243->145233 145244->145243 145245 3824c8f 145244->145245 145246 38235db 11 API calls 145245->145246 145247 3824caf DeleteObject CreateCompatibleDC 145246->145247 145247->145243 145248 3824d24 CreateDIBSection 145247->145248 145249 3824e10 DeleteDC 145248->145249 145250 3824d45 SelectObject 145248->145250 145249->145243 145251 3824d55 BitBlt 145250->145251 145252 3824e09 DeleteObject 145250->145252 145251->145252 145253 3824d7a 145251->145253 145252->145249 145331 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145253->145331 145255 3824d85 145255->145252 145256 3823d76 10 API calls 145255->145256 145257 3824dfe 145256->145257 145258 3823536 2 API calls 145257->145258 145258->145252 145260 3821a26 145259->145260 145261 38219ed 145259->145261 145265 3822054 145260->145265 145263 3821a09 145261->145263 145332 3821000 145261->145332 145263->145260 145264 3821000 57 API calls 145263->145264 145264->145260 145486 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145265->145486 145267 3822103 GetCurrentHwProfileA 145268 3822117 145267->145268 145269 382212d GetSystemInfo 145267->145269 145271 38235db 11 API calls 145268->145271 145272 38235db 11 API calls 145269->145272 145270 3822079 145270->145267 145274 382212a 145271->145274 145273 382214f 145272->145273 145275 3823536 2 API calls 145273->145275 145274->145269 145276 3822159 GlobalMemoryStatusEx 145275->145276 145277 38235db 11 API calls 145276->145277 145280 3822188 145277->145280 145278 38221db EnumDisplayDevicesA 145279 38221ee ObtainUserAgentString 145278->145279 145278->145280 145279->145165 145279->145166 145280->145278 145281 38235db 11 API calls 145280->145281 145281->145280 145283 3823ea4 LeaveCriticalSection 145282->145283 145284 3823d98 145282->145284 145283->145136 145284->145283 145487 3823d1c 6 API calls 145284->145487 145286 3823dc1 145286->145283 145488 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145286->145488 145288 3823dec 145489 3826c7f EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145288->145489 145290 3823df6 145291 3823536 2 API calls 145290->145291 145292 3823e4f 145291->145292 145293 3823536 2 API calls 145292->145293 145294 3823e9f 145293->145294 145294->145283 145296 3822605 145295->145296 145297 382353a GetProcessHeap RtlFreeHeap 145295->145297 145296->145141 145297->145296 145299 38246d4 2 API calls 145298->145299 145300 38253f0 145299->145300 145301 382546d socket 145300->145301 145309 38253f8 145300->145309 145302 3825491 145301->145302 145301->145309 145303 38254b1 connect 145302->145303 145302->145309 145304 3825517 Sleep 145303->145304 145305 38254c8 send 145303->145305 145304->145302 145305->145304 145306 38254ea send 145305->145306 145306->145304 145307 3825506 145306->145307 145308 3823536 2 API calls 145307->145308 145308->145309 145309->145151 145311 3825288 145310->145311 145312 382525c 145310->145312 145311->145169 145312->145311 145490 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145312->145490 145314->145181 145315->145192 145317 3822c18 145316->145317 145327 3822c26 145316->145327 145328 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145317->145328 145319 3822c76 145320 38222a9 145319->145320 145330 38251f6 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145319->145330 145320->145205 145322 3823036 145323 3823536 2 API calls 145322->145323 145323->145320 145325 3822e29 WideCharToMultiByte 145325->145327 145326 3822eb1 WideCharToMultiByte 145326->145327 145327->145319 145327->145325 145327->145326 145329 3822991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145327->145329 145328->145327 145329->145327 145330->145322 145331->145255 145333 3821412 145332->145333 145334 382101e 145332->145334 145333->145263 145334->145333 145369 382407d GetFileAttributesW 145334->145369 145336 3821035 145336->145333 145370 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145336->145370 145338 3821049 145371 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145338->145371 145340 3821052 145346 38213d5 145340->145346 145372 3823600 145340->145372 145341 3823536 2 API calls 145343 382140b 145341->145343 145345 3823536 2 API calls 145343->145345 145345->145333 145346->145341 145347 38213bd FindNextFileW 145347->145346 145365 3821173 145347->145365 145348 3823600 7 API calls 145348->145365 145350 3823eb6 41 API calls 145350->145365 145354 3823536 GetProcessHeap RtlFreeHeap 145354->145365 145356 3821662 EnterCriticalSection 145437 3824e27 145356->145437 145360 3823d76 10 API calls 145360->145365 145362 38240ba 15 API calls 145363 3821389 145362->145363 145363->145362 145364 3823600 7 API calls 145363->145364 145363->145365 145368 3823efc 43 API calls 145363->145368 145429 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145363->145429 145430 3823eb6 145363->145430 145364->145363 145365->145347 145365->145348 145365->145350 145365->145354 145365->145356 145365->145360 145365->145363 145367 3821000 53 API calls 145365->145367 145375 382446c 145365->145375 145407 382369c 145365->145407 145411 3821a62 145365->145411 145419 3821c94 145365->145419 145426 3821ba5 145365->145426 145463 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145365->145463 145367->145365 145368->145363 145369->145336 145370->145338 145371->145340 145464 3823084 145372->145464 145473 382407d GetFileAttributesW 145375->145473 145377 382447e 145378 38246cd 145377->145378 145474 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145377->145474 145378->145365 145380 3824494 145381 38246c5 145380->145381 145382 3823600 7 API calls 145380->145382 145383 3823536 2 API calls 145381->145383 145384 38244b1 145382->145384 145383->145378 145385 38244cf EnterCriticalSection 145384->145385 145386 3824539 LeaveCriticalSection 145385->145386 145387 382459b 145386->145387 145388 3824552 145386->145388 145387->145381 145389 38245be EnterCriticalSection 145387->145389 145388->145387 145390 382456f 145388->145390 145393 38245f5 LeaveCriticalSection 145389->145393 145476 38242ec 21 API calls 145390->145476 145392 3824574 145392->145387 145394 3824578 145392->145394 145395 3824691 EnterCriticalSection 145393->145395 145396 382460d 145393->145396 145397 3823536 2 API calls 145394->145397 145401 38246ba LeaveCriticalSection 145395->145401 145475 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145396->145475 145400 3824580 145397->145400 145399 3824617 145399->145395 145404 3824634 EnterCriticalSection 145399->145404 145402 382446c 29 API calls 145400->145402 145401->145381 145403 3824594 145402->145403 145403->145378 145405 3824675 LeaveCriticalSection 145404->145405 145405->145395 145406 3824689 145405->145406 145406->145395 145408 38236b0 145407->145408 145409 38236b4 145408->145409 145477 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145408->145477 145409->145365 145412 3821a7a 145411->145412 145414 3821a7f 145411->145414 145478 3821a2d EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145412->145478 145417 3821a84 145414->145417 145479 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145414->145479 145417->145365 145418 3821ab3 145418->145417 145480 3821a4f GetProcessHeap RtlFreeHeap 145418->145480 145420 38246d4 2 API calls 145419->145420 145421 3821ccd 145420->145421 145422 3821cfa 145421->145422 145423 3821cdd CryptUnprotectData 145421->145423 145422->145365 145423->145422 145424 3821d05 145423->145424 145424->145422 145425 3821d0c CryptProtectData 145424->145425 145425->145422 145481 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145426->145481 145428 3821bcb 145428->145365 145429->145363 145431 382446c 37 API calls 145430->145431 145432 3823ecc 145431->145432 145433 3823eeb 145432->145433 145435 3823d76 10 API calls 145432->145435 145434 3823536 2 API calls 145433->145434 145436 3823ef4 145434->145436 145435->145433 145436->145363 145438 3824e8a 145437->145438 145439 3824e49 145437->145439 145453 382167e LeaveCriticalSection 145438->145453 145482 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145438->145482 145440 3823600 7 API calls 145439->145440 145442 3824e80 145440->145442 145484 382407d GetFileAttributesW 145442->145484 145443 3824eaa 145483 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145443->145483 145446 3824eb4 145447 3823600 7 API calls 145446->145447 145448 3824ec2 FindFirstFileW 145447->145448 145449 3825183 145448->145449 145462 3824edf 145448->145462 145450 3823536 2 API calls 145449->145450 145451 382518a 145450->145451 145452 3823536 2 API calls 145451->145452 145452->145453 145453->145365 145454 382516b FindNextFileW 145454->145449 145454->145462 145455 3823600 7 API calls 145455->145462 145456 3823eb6 41 API calls 145456->145462 145457 3824f84 EnterCriticalSection 145459 3824e27 41 API calls 145457->145459 145460 3824f9f LeaveCriticalSection 145459->145460 145460->145454 145461 3824e27 41 API calls 145461->145462 145462->145454 145462->145455 145462->145456 145462->145457 145462->145461 145485 382407d GetFileAttributesW 145462->145485 145463->145365 145466 3823090 145464->145466 145465 3821156 FindFirstFileW 145465->145346 145465->145365 145466->145465 145468 382329d IsDBCSLeadByte 145466->145468 145470 3823308 IsDBCSLeadByte 145466->145470 145471 3823329 MultiByteToWideChar 145466->145471 145472 3822991 WideCharToMultiByte IsDBCSLeadByte WideCharToMultiByte __aulldvrm 145466->145472 145468->145466 145469 38232aa MultiByteToWideChar 145468->145469 145469->145466 145470->145466 145471->145466 145472->145466 145473->145377 145474->145380 145475->145399 145476->145392 145477->145409 145478->145414 145479->145418 145480->145417 145481->145428 145482->145443 145483->145446 145484->145438 145485->145462 145486->145270 145487->145286 145488->145288 145489->145290 145490->145312 145492 38251ee 145491->145492 145493 38251ad 145491->145493 145515 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145493->145515 145495 3824e27 45 API calls 145496 38251b7 145495->145496 145496->145495 145497 38251e7 145496->145497 145498 3823536 2 API calls 145497->145498 145498->145492 145500 3821f25 145499->145500 145501 3821d54 145499->145501 145501->145500 145502 3823600 7 API calls 145501->145502 145503 3821d75 FindFirstFileW 145502->145503 145503->145500 145504 3821d94 145503->145504 145516 3823508 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145504->145516 145506 3821f01 FindNextFileW 145507 3821f1c 145506->145507 145510 3821d9e 145506->145510 145508 3823536 2 API calls 145507->145508 145508->145500 145510->145506 145511 3823536 2 API calls 145510->145511 145512 3821d3c 41 API calls 145510->145512 145513 3823600 7 API calls 145510->145513 145514 3823eb6 41 API calls 145510->145514 145517 382408d 145510->145517 145511->145510 145512->145510 145513->145510 145514->145510 145515->145496 145516->145510 145519 3824095 145517->145519 145518 38240a7 145518->145510 145519->145518 145522 3823657 EnterCriticalSection GetProcessHeap RtlAllocateHeap LeaveCriticalSection 145519->145522 145521 38240b7 145521->145510 145522->145521 145523 f85d29 145531 f85d32 145523->145531 145525 f85f2e 145526 f85fdc 145525->145526 145527 f86006 145525->145527 145797 fd4870 15 API calls 145526->145797 145798 fd4870 15 API calls 145527->145798 145531->145525 145546 f85ffe 145531->145546 145795 f71d90 15 API calls 145531->145795 145796 f71de0 20 API calls 145531->145796 145533 f86250 145534 f862fd 145533->145534 145535 f86327 145533->145535 145801 fd4870 15 API calls 145534->145801 145802 fd4870 15 API calls 145535->145802 145539 f86562 145541 f86639 145539->145541 145542 f8660f 145539->145542 145806 fd4870 15 API calls 145541->145806 145805 fd4870 15 API calls 145542->145805 145543 f86880 145549 f86958 145543->145549 145550 f8692e 145543->145550 145546->145533 145552 f8631f 145546->145552 145766 f8c4b7 145546->145766 145799 f71d90 15 API calls 145546->145799 145800 f71de0 20 API calls 145546->145800 145810 fd4870 15 API calls 145549->145810 145809 fd4870 15 API calls 145550->145809 145551 f86631 145551->145543 145561 f86950 145551->145561 145807 f71d90 15 API calls 145551->145807 145808 f71de0 20 API calls 145551->145808 145552->145539 145552->145551 145803 f71d90 15 API calls 145552->145803 145804 f71de0 20 API calls 145552->145804 145554 f86c63 145564 f86f86 145554->145564 145567 f86eb7 145554->145567 145815 f71d90 15 API calls 145554->145815 145816 f71de0 20 API calls 145554->145816 145556 f875b7 145588 f877fa 145556->145588 145600 f878ca 145556->145600 145827 f71d90 15 API calls 145556->145827 145828 f71de0 20 API calls 145556->145828 145559 f86b93 145562 f86c6b 145559->145562 145563 f86c41 145559->145563 145560 f871c9 145576 f872a0 145560->145576 145577 f87276 145560->145577 145561->145554 145561->145559 145811 f71d90 15 API calls 145561->145811 145812 f71de0 20 API calls 145561->145812 145814 fd4870 15 API calls 145562->145814 145813 fd4870 15 API calls 145563->145813 145564->145560 145597 f87298 145564->145597 145819 f71d90 15 API calls 145564->145819 145820 f71de0 20 API calls 145564->145820 145570 f86f8e 145567->145570 145571 f86f64 145567->145571 145818 fd4870 15 API calls 145570->145818 145817 fd4870 15 API calls 145571->145817 145822 fd4870 15 API calls 145576->145822 145821 fd4870 15 API calls 145577->145821 145582 f874e7 145583 f875bf 145582->145583 145584 f87595 145582->145584 145826 fd4870 15 API calls 145583->145826 145825 fd4870 15 API calls 145584->145825 145590 f878a8 145588->145590 145591 f878d2 145588->145591 145829 fd4870 15 API calls 145590->145829 145830 fd4870 15 API calls 145591->145830 145595 f87b0d 145598 f87bbb 145595->145598 145599 f87be5 145595->145599 145597->145556 145597->145582 145823 f71d90 15 API calls 145597->145823 145824 f71de0 20 API calls 145597->145824 145833 fd4870 15 API calls 145598->145833 145834 fd4870 15 API calls 145599->145834 145600->145595 145617 f87bdd 145600->145617 145831 f71d90 15 API calls 145600->145831 145832 f71de0 20 API calls 145600->145832 145602 f87e20 145606 f87ef8 145602->145606 145607 f87ece 145602->145607 145838 fd4870 15 API calls 145606->145838 145837 fd4870 15 API calls 145607->145837 145608 f88b71 VirtualAlloc 145657 f88ba8 145608->145657 145609 f88133 145614 f8820b 145609->145614 145615 f881e1 145609->145615 145842 fd4870 15 API calls 145614->145842 145841 fd4870 15 API calls 145615->145841 145617->145602 145624 f87ef0 145617->145624 145835 f71d90 15 API calls 145617->145835 145836 f71de0 20 API calls 145617->145836 145621 f8851e 145846 fd4870 15 API calls 145621->145846 145622 f884f4 145845 fd4870 15 API calls 145622->145845 145623 f88446 145623->145621 145623->145622 145624->145609 145635 f88203 145624->145635 145839 f71d90 15 API calls 145624->145839 145840 f71de0 20 API calls 145624->145840 145628 f88759 145630 f88831 145628->145630 145631 f88807 145628->145631 145850 fd4870 15 API calls 145630->145850 145849 fd4870 15 API calls 145631->145849 145633 f88a6c 145638 f88b1a 145633->145638 145639 f88b44 145633->145639 145635->145623 145644 f88516 145635->145644 145843 f71d90 15 API calls 145635->145843 145844 f71de0 20 API calls 145635->145844 145853 fd4870 15 API calls 145638->145853 145854 fd4870 15 API calls 145639->145854 145640 f897c2 145655 f89815 VirtualAlloc 145640->145655 145694 f8985a 145640->145694 145642 f88db3 145648 f88e91 145642->145648 145649 f88e67 145642->145649 145644->145628 145651 f88829 145644->145651 145847 f71d90 15 API calls 145644->145847 145848 f71de0 20 API calls 145644->145848 145647 f88b3c 145647->145608 145858 fd4870 15 API calls 145648->145858 145857 fd4870 15 API calls 145649->145857 145651->145608 145651->145633 145851 f71d90 15 API calls 145651->145851 145852 f71de0 20 API calls 145651->145852 145660 f8983f 145655->145660 145655->145694 145656 f890cc 145658 f8917a 145656->145658 145659 f891a4 145656->145659 145657->145642 145672 f88e89 145657->145672 145855 f71d90 15 API calls 145657->145855 145856 f71de0 20 API calls 145657->145856 145861 fd4870 15 API calls 145658->145861 145862 fd4870 15 API calls 145659->145862 145871 fd106c RaiseException 145660->145871 145664 f893df 145667 f8948d 145664->145667 145668 f894b7 145664->145668 145865 fd4870 15 API calls 145667->145865 145866 fd4870 15 API calls 145668->145866 145670 f896f2 145675 f897ca 145670->145675 145676 f897a0 145670->145676 145672->145656 145678 f8919c 145672->145678 145859 f71d90 15 API calls 145672->145859 145860 f71de0 20 API calls 145672->145860 145870 fd4870 15 API calls 145675->145870 145869 fd4870 15 API calls 145676->145869 145678->145664 145681 f894af 145678->145681 145863 f71d90 15 API calls 145678->145863 145864 f71de0 20 API calls 145678->145864 145681->145640 145681->145670 145867 f71d90 15 API calls 145681->145867 145868 f71de0 20 API calls 145681->145868 145683 f89a68 145684 f89b40 145683->145684 145685 f89b16 145683->145685 145875 fd4870 15 API calls 145684->145875 145874 fd4870 15 API calls 145685->145874 145688 f89d7b 145691 f89e29 145688->145691 145692 f89e53 145688->145692 145878 fd4870 15 API calls 145691->145878 145879 fd4870 15 API calls 145692->145879 145694->145683 145701 f89b38 145694->145701 145872 f71d90 15 API calls 145694->145872 145873 f71de0 20 API calls 145694->145873 145698 f8a148 145882 fd4870 15 API calls 145698->145882 145699 f8a172 145883 fd4870 15 API calls 145699->145883 145700 f8a09a 145700->145698 145700->145699 145701->145688 145712 f89e4b 145701->145712 145876 f71d90 15 API calls 145701->145876 145877 f71de0 20 API calls 145701->145877 145705 f8a3ad 145707 f8a45b 145705->145707 145708 f8a485 145705->145708 145886 fd4870 15 API calls 145707->145886 145887 fd4870 15 API calls 145708->145887 145710 f8a6ca 145715 f8a778 145710->145715 145716 f8a7a2 145710->145716 145712->145700 145720 f8a16a 145712->145720 145880 f71d90 15 API calls 145712->145880 145881 f71de0 20 API calls 145712->145881 145890 fd4870 15 API calls 145715->145890 145891 fd4870 15 API calls 145716->145891 145718 f8a9dd 145723 f8aa8b 145718->145723 145724 f8aab5 145718->145724 145720->145705 145726 f8a47d 145720->145726 145884 f71d90 15 API calls 145720->145884 145885 f71de0 20 API calls 145720->145885 145894 fd4870 15 API calls 145723->145894 145895 fd4870 15 API calls 145724->145895 145726->145710 145733 f8a79a 145726->145733 145888 f71d90 15 API calls 145726->145888 145889 f71de0 20 API calls 145726->145889 145730 f8addc 145899 fd4870 15 API calls 145730->145899 145731 f8adb2 145898 fd4870 15 API calls 145731->145898 145732 f8ad04 145732->145730 145732->145731 145733->145718 145744 f8aaad 145733->145744 145892 f71d90 15 API calls 145733->145892 145893 f71de0 20 API calls 145733->145893 145737 f8b017 145739 f8b0ef 145737->145739 145740 f8b0c5 145737->145740 145903 fd4870 15 API calls 145739->145903 145902 fd4870 15 API calls 145740->145902 145742 f8b336 145747 f8b40e 145742->145747 145748 f8b3e4 145742->145748 145744->145732 145752 f8add4 145744->145752 145896 f71d90 15 API calls 145744->145896 145897 f71de0 20 API calls 145744->145897 145907 fd4870 15 API calls 145747->145907 145906 fd4870 15 API calls 145748->145906 145750 f8b661 145755 f8b73f 145750->145755 145756 f8b715 145750->145756 145752->145737 145758 f8b0e7 145752->145758 145900 f71d90 15 API calls 145752->145900 145901 f71de0 20 API calls 145752->145901 145911 fd4870 15 API calls 145755->145911 145910 fd4870 15 API calls 145756->145910 145758->145742 145762 f8b406 145758->145762 145904 f71d90 15 API calls 145758->145904 145905 f71de0 20 API calls 145758->145905 145761 f8b9af 145764 f8ba8d 145761->145764 145765 f8ba63 145761->145765 145762->145750 145776 f8b737 ctype 145762->145776 145908 f71d90 15 API calls 145762->145908 145909 f71de0 20 API calls 145762->145909 145915 fd4870 15 API calls 145764->145915 145914 fd4870 15 API calls 145765->145914 145770 f8bce0 145772 f8bdbe 145770->145772 145773 f8bd94 145770->145773 145919 fd4870 15 API calls 145772->145919 145918 fd4870 15 API calls 145773->145918 145776->145761 145780 f8ba85 145776->145780 145912 f71d90 15 API calls 145776->145912 145913 f71de0 20 API calls 145776->145913 145779 f8c0b2 145781 f8c18f 145779->145781 145782 f8c165 145779->145782 145780->145770 145791 f8bdb6 ctype 145780->145791 145916 f71d90 15 API calls 145780->145916 145917 f71de0 20 API calls 145780->145917 145923 fd4870 15 API calls 145781->145923 145922 fd4870 15 API calls 145782->145922 145784 f8c3e2 145788 f8c4bf 145784->145788 145789 f8c495 145784->145789 145927 fd4870 15 API calls 145788->145927 145926 fd4870 15 API calls 145789->145926 145791->145779 145794 f8c187 145791->145794 145920 f71d90 15 API calls 145791->145920 145921 f71de0 20 API calls 145791->145921 145794->145766 145794->145784 145924 f71d90 15 API calls 145794->145924 145925 f71de0 20 API calls 145794->145925 145795->145531 145796->145531 145797->145546 145798->145546 145799->145546 145800->145546 145801->145552 145802->145552 145803->145552 145804->145552 145805->145551 145806->145551 145807->145551 145808->145551 145809->145561 145810->145561 145811->145561 145812->145561 145813->145554 145814->145554 145815->145554 145816->145554 145817->145564 145818->145564 145819->145564 145820->145564 145821->145597 145822->145597 145823->145597 145824->145597 145825->145556 145826->145556 145827->145556 145828->145556 145829->145600 145830->145600 145831->145600 145832->145600 145833->145617 145834->145617 145835->145617 145836->145617 145837->145624 145838->145624 145839->145624 145840->145624 145841->145635 145842->145635 145843->145635 145844->145635 145845->145644 145846->145644 145847->145644 145848->145644 145849->145651 145850->145651 145851->145651 145852->145651 145853->145647 145854->145647 145855->145657 145856->145657 145857->145672 145858->145672 145859->145672 145860->145672 145861->145678 145862->145678 145863->145678 145864->145678 145865->145681 145866->145681 145867->145681 145868->145681 145869->145640 145870->145640 145871->145694 145872->145694 145873->145694 145874->145701 145875->145701 145876->145701 145877->145701 145878->145712 145879->145712 145880->145712 145881->145712 145882->145720 145883->145720 145884->145720 145885->145720 145886->145726 145887->145726 145888->145726 145889->145726 145890->145733 145891->145733 145892->145733 145893->145733 145894->145744 145895->145744 145896->145744 145897->145744 145898->145752 145899->145752 145900->145752 145901->145752 145902->145758 145903->145758 145904->145758 145905->145758 145906->145762 145907->145762 145908->145762 145909->145762 145910->145776 145911->145776 145912->145776 145913->145776 145914->145780 145915->145780 145916->145780 145917->145780 145918->145791 145919->145791 145920->145791 145921->145791 145922->145794 145923->145794 145924->145794 145925->145794 145926->145766 145927->145766 145928 f97eea 145929 f97ef2 145928->145929 145930 f88b77 VirtualAlloc 145928->145930 145942 f88ba8 145930->145942 145931 f897c2 145938 f89815 VirtualAlloc 145931->145938 145979 f8985a 145931->145979 145933 f88db3 145934 f88e91 145933->145934 145935 f88e67 145933->145935 146083 fd4870 15 API calls 145934->146083 146082 fd4870 15 API calls 145935->146082 145945 f8983f 145938->145945 145938->145979 145941 f890cc 145943 f8917a 145941->145943 145944 f891a4 145941->145944 145942->145933 145957 f88e89 145942->145957 146080 f71d90 15 API calls 145942->146080 146081 f71de0 20 API calls 145942->146081 146086 fd4870 15 API calls 145943->146086 146087 fd4870 15 API calls 145944->146087 146096 fd106c RaiseException 145945->146096 145949 f893df 145952 f8948d 145949->145952 145953 f894b7 145949->145953 146090 fd4870 15 API calls 145952->146090 146091 fd4870 15 API calls 145953->146091 145954 f896f2 145960 f897ca 145954->145960 145961 f897a0 145954->145961 145957->145941 145962 f8919c 145957->145962 146084 f71d90 15 API calls 145957->146084 146085 f71de0 20 API calls 145957->146085 146095 fd4870 15 API calls 145960->146095 146094 fd4870 15 API calls 145961->146094 145962->145949 145966 f894af 145962->145966 146088 f71d90 15 API calls 145962->146088 146089 f71de0 20 API calls 145962->146089 145966->145931 145966->145954 146092 f71d90 15 API calls 145966->146092 146093 f71de0 20 API calls 145966->146093 145968 f89a68 145969 f89b40 145968->145969 145970 f89b16 145968->145970 146100 fd4870 15 API calls 145969->146100 146099 fd4870 15 API calls 145970->146099 145973 f89d7b 145976 f89e29 145973->145976 145977 f89e53 145973->145977 146103 fd4870 15 API calls 145976->146103 146104 fd4870 15 API calls 145977->146104 145979->145968 145986 f89b38 145979->145986 146097 f71d90 15 API calls 145979->146097 146098 f71de0 20 API calls 145979->146098 145983 f8a148 146107 fd4870 15 API calls 145983->146107 145984 f8a172 146108 fd4870 15 API calls 145984->146108 145985 f8a09a 145985->145983 145985->145984 145986->145973 145997 f89e4b 145986->145997 146101 f71d90 15 API calls 145986->146101 146102 f71de0 20 API calls 145986->146102 145990 f8a3ad 145992 f8a45b 145990->145992 145993 f8a485 145990->145993 146111 fd4870 15 API calls 145992->146111 146112 fd4870 15 API calls 145993->146112 145995 f8a6ca 146000 f8a778 145995->146000 146001 f8a7a2 145995->146001 145997->145985 146005 f8a16a 145997->146005 146105 f71d90 15 API calls 145997->146105 146106 f71de0 20 API calls 145997->146106 146115 fd4870 15 API calls 146000->146115 146116 fd4870 15 API calls 146001->146116 146003 f8a9dd 146008 f8aa8b 146003->146008 146009 f8aab5 146003->146009 146005->145990 146011 f8a47d 146005->146011 146109 f71d90 15 API calls 146005->146109 146110 f71de0 20 API calls 146005->146110 146119 fd4870 15 API calls 146008->146119 146120 fd4870 15 API calls 146009->146120 146011->145995 146018 f8a79a 146011->146018 146113 f71d90 15 API calls 146011->146113 146114 f71de0 20 API calls 146011->146114 146015 f8addc 146124 fd4870 15 API calls 146015->146124 146016 f8adb2 146123 fd4870 15 API calls 146016->146123 146017 f8ad04 146017->146015 146017->146016 146018->146003 146029 f8aaad 146018->146029 146117 f71d90 15 API calls 146018->146117 146118 f71de0 20 API calls 146018->146118 146022 f8b017 146024 f8b0ef 146022->146024 146025 f8b0c5 146022->146025 146128 fd4870 15 API calls 146024->146128 146127 fd4870 15 API calls 146025->146127 146027 f8b336 146032 f8b40e 146027->146032 146033 f8b3e4 146027->146033 146029->146017 146037 f8add4 146029->146037 146121 f71d90 15 API calls 146029->146121 146122 f71de0 20 API calls 146029->146122 146132 fd4870 15 API calls 146032->146132 146131 fd4870 15 API calls 146033->146131 146035 f8b661 146040 f8b73f 146035->146040 146041 f8b715 146035->146041 146037->146022 146043 f8b0e7 146037->146043 146125 f71d90 15 API calls 146037->146125 146126 f71de0 20 API calls 146037->146126 146136 fd4870 15 API calls 146040->146136 146135 fd4870 15 API calls 146041->146135 146043->146027 146047 f8b406 146043->146047 146129 f71d90 15 API calls 146043->146129 146130 f71de0 20 API calls 146043->146130 146046 f8b9af 146050 f8ba8d 146046->146050 146051 f8ba63 146046->146051 146047->146035 146061 f8b737 ctype 146047->146061 146133 f71d90 15 API calls 146047->146133 146134 f71de0 20 API calls 146047->146134 146049 f8c4b7 146140 fd4870 15 API calls 146050->146140 146139 fd4870 15 API calls 146051->146139 146055 f8bce0 146057 f8bdbe 146055->146057 146058 f8bd94 146055->146058 146144 fd4870 15 API calls 146057->146144 146143 fd4870 15 API calls 146058->146143 146061->146046 146065 f8ba85 146061->146065 146137 f71d90 15 API calls 146061->146137 146138 f71de0 20 API calls 146061->146138 146064 f8c0b2 146066 f8c18f 146064->146066 146067 f8c165 146064->146067 146065->146055 146076 f8bdb6 ctype 146065->146076 146141 f71d90 15 API calls 146065->146141 146142 f71de0 20 API calls 146065->146142 146148 fd4870 15 API calls 146066->146148 146147 fd4870 15 API calls 146067->146147 146069 f8c3e2 146073 f8c4bf 146069->146073 146074 f8c495 146069->146074 146152 fd4870 15 API calls 146073->146152 146151 fd4870 15 API calls 146074->146151 146076->146064 146079 f8c187 146076->146079 146145 f71d90 15 API calls 146076->146145 146146 f71de0 20 API calls 146076->146146 146079->146049 146079->146069 146149 f71d90 15 API calls 146079->146149 146150 f71de0 20 API calls 146079->146150 146080->145942 146081->145942 146082->145957 146083->145957 146084->145957 146085->145957 146086->145962 146087->145962 146088->145962 146089->145962 146090->145966 146091->145966 146092->145966 146093->145966 146094->145931 146095->145931 146096->145979 146097->145979 146098->145979 146099->145986 146100->145986 146101->145986 146102->145986 146103->145997 146104->145997 146105->145997 146106->145997 146107->146005 146108->146005 146109->146005 146110->146005 146111->146011 146112->146011 146113->146011 146114->146011 146115->146018 146116->146018 146117->146018 146118->146018 146119->146029 146120->146029 146121->146029 146122->146029 146123->146037 146124->146037 146125->146037 146126->146037 146127->146043 146128->146043 146129->146043 146130->146043 146131->146047 146132->146047 146133->146047 146134->146047 146135->146061 146136->146061 146137->146061 146138->146061 146139->146065 146140->146065 146141->146065 146142->146065 146143->146076 146144->146076 146145->146076 146146->146076 146147->146079 146148->146079 146149->146079 146150->146079 146151->146049 146152->146049 146153 fcfe5f 146154 fcfe68 146153->146154 146161 fd013c IsProcessorFeaturePresent 146154->146161 146156 fcfe74 146162 fd2f0e 10 API calls 2 library calls 146156->146162 146158 fcfe7d 146159 fcfe79 146159->146158 146163 fd2f2d 7 API calls 2 library calls 146159->146163 146161->146156 146162->146159 146163->146158 146164 fcfca5 146169 fcfcb9 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 146164->146169 146165 fcfcbf 146166 fcfd40 146186 fd05aa 146166->146186 146169->146165 146169->146166 146195 fd762e 39 API calls 3 library calls 146169->146195 146172 fcfd4e 146173 fcfd5b 146172->146173 146196 fd05e0 GetModuleHandleW 146173->146196 146175 fcfd62 146176 fcfd66 146175->146176 146177 fcfdd0 146175->146177 146178 fcfd6f 146176->146178 146197 fd816c 21 API calls std::locale::_Setgloballocale 146176->146197 146199 fd81b7 21 API calls std::locale::_Setgloballocale 146177->146199 146198 fcffd0 75 API calls ___scrt_uninitialize_crt 146178->146198 146182 fcfdd6 146200 fd817b 21 API calls std::locale::_Setgloballocale 146182->146200 146183 fcfd77 146183->146165 146185 fcfdde 146201 fd0e90 146186->146201 146188 fd05bd GetStartupInfoW 146189 fcfd46 146188->146189 146190 fd7e0a 146189->146190 146202 fe2f03 146190->146202 146192 fd7e4d 146192->146172 146193 fd7e13 146193->146192 146208 fe31b6 39 API calls 146193->146208 146195->146166 146196->146175 146197->146178 146198->146183 146199->146182 146200->146185 146201->146188 146203 fe2f0c 146202->146203 146204 fe2f3e 146202->146204 146209 fda9ab 146203->146209 146204->146193 146208->146193 146210 fda9bc 146209->146210 146211 fda9b6 146209->146211 146215 fda9c2 146210->146215 146261 fde054 6 API calls __Getctype 146210->146261 146260 fde015 6 API calls __Getctype 146211->146260 146214 fda9d6 146214->146215 146216 fda9da 146214->146216 146219 fda9c7 146215->146219 146269 fd7134 39 API calls std::locale::_Setgloballocale 146215->146269 146262 fddb5d 14 API calls 3 library calls 146216->146262 146237 fe2d0e 146219->146237 146220 fda9e6 146222 fda9ee 146220->146222 146223 fdaa03 146220->146223 146263 fde054 6 API calls __Getctype 146222->146263 146265 fde054 6 API calls __Getctype 146223->146265 146226 fda9fa 146264 fdabdb 14 API calls 2 library calls 146226->146264 146227 fdaa0f 146228 fdaa13 146227->146228 146229 fdaa22 146227->146229 146266 fde054 6 API calls __Getctype 146228->146266 146267 fda71e 14 API calls __Getctype 146229->146267 146233 fdaa2d 146268 fdabdb 14 API calls 2 library calls 146233->146268 146234 fdaa00 146234->146215 146236 fdaa34 146236->146219 146270 fe2e63 146237->146270 146242 fe2d51 146242->146204 146245 fe2d6a 146306 fdabdb 14 API calls 2 library calls 146245->146306 146246 fe2d78 146295 fe2f61 146246->146295 146250 fe2db0 146307 fd53de 14 API calls __Wcrtomb 146250->146307 146251 fe2dcb 146253 fe2df7 146251->146253 146309 fdabdb 14 API calls 2 library calls 146251->146309 146255 fe2e40 146253->146255 146310 fe2987 39 API calls 2 library calls 146253->146310 146254 fe2db5 146308 fdabdb 14 API calls 2 library calls 146254->146308 146311 fdabdb 14 API calls 2 library calls 146255->146311 146260->146210 146261->146214 146262->146220 146263->146226 146264->146234 146265->146227 146266->146226 146267->146233 146268->146236 146271 fe2e6f ___scrt_is_nonwritable_in_current_image 146270->146271 146272 fe2e89 146271->146272 146312 fd49ca EnterCriticalSection 146271->146312 146274 fe2d38 146272->146274 146315 fd7134 39 API calls std::locale::_Setgloballocale 146272->146315 146281 fe2a95 146274->146281 146278 fe2e99 146280 fe2ec5 146278->146280 146313 fdabdb 14 API calls 2 library calls 146278->146313 146314 fe2ee2 LeaveCriticalSection std::_Lockit::~_Lockit 146280->146314 146316 fd7178 146281->146316 146283 fe2aa7 146284 fe2ac8 146283->146284 146285 fe2ab6 GetOEMCP 146283->146285 146286 fe2adf 146284->146286 146287 fe2acd GetACP 146284->146287 146285->146286 146286->146242 146288 fdac15 146286->146288 146287->146286 146289 fdac53 146288->146289 146294 fdac23 __Getctype 146288->146294 146327 fd53de 14 API calls __Wcrtomb 146289->146327 146291 fdac3e RtlAllocateHeap 146292 fdac51 146291->146292 146291->146294 146292->146245 146292->146246 146294->146289 146294->146291 146326 fd7694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 146294->146326 146296 fe2a95 41 API calls 146295->146296 146298 fe2f81 146296->146298 146297 fe3086 146339 fd003d 146297->146339 146298->146297 146300 fe2fbe IsValidCodePage 146298->146300 146304 fe2fd9 codecvt 146298->146304 146300->146297 146302 fe2fd0 146300->146302 146301 fe2da5 146301->146250 146301->146251 146303 fe2ff9 GetCPInfo 146302->146303 146302->146304 146303->146297 146303->146304 146328 fe2b69 146304->146328 146306->146242 146307->146254 146308->146242 146309->146253 146310->146255 146311->146242 146312->146278 146313->146280 146314->146272 146317 fd7196 146316->146317 146323 fda8f0 39 API calls 3 library calls 146317->146323 146319 fd71b7 146324 fdac63 39 API calls __Getctype 146319->146324 146321 fd71cd 146325 fdacc1 39 API calls ctype 146321->146325 146323->146319 146324->146321 146326->146294 146327->146292 146329 fe2c5a 146328->146329 146330 fe2b91 GetCPInfo 146328->146330 146331 fd003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146329->146331 146330->146329 146335 fe2ba9 146330->146335 146333 fe2d0c 146331->146333 146333->146297 146346 fdece1 146335->146346 146338 fdefd1 44 API calls 146338->146329 146340 fd0045 146339->146340 146341 fd0046 IsProcessorFeaturePresent 146339->146341 146340->146301 146343 fd072d 146341->146343 146424 fd06f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 146343->146424 146345 fd0810 146345->146301 146347 fd7178 ctype 39 API calls 146346->146347 146348 fded01 146347->146348 146366 fe1e03 146348->146366 146350 fdedbd 146353 fd003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146350->146353 146351 fdedb5 146369 fcfaaa 14 API calls ___vcrt_freefls@4 146351->146369 146352 fded2e 146352->146350 146352->146351 146355 fdac15 __fread_nolock 15 API calls 146352->146355 146357 fded53 ctype codecvt 146352->146357 146356 fdede0 146353->146356 146355->146357 146361 fdefd1 146356->146361 146357->146351 146358 fe1e03 ctype MultiByteToWideChar 146357->146358 146359 fded9c 146358->146359 146359->146351 146360 fdeda3 GetStringTypeW 146359->146360 146360->146351 146362 fd7178 ctype 39 API calls 146361->146362 146363 fdefe4 146362->146363 146372 fdede2 146363->146372 146370 fe1d6b 146366->146370 146369->146350 146371 fe1d7c MultiByteToWideChar 146370->146371 146371->146352 146373 fdedfd ctype 146372->146373 146374 fe1e03 ctype MultiByteToWideChar 146373->146374 146377 fdee41 146374->146377 146375 fdefbc 146376 fd003d __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 146375->146376 146378 fdefcf 146376->146378 146377->146375 146379 fdac15 __fread_nolock 15 API calls 146377->146379 146381 fdee67 ctype 146377->146381 146392 fdef0f 146377->146392 146378->146338 146379->146381 146382 fe1e03 ctype MultiByteToWideChar 146381->146382 146381->146392 146383 fdeeb0 146382->146383 146383->146392 146400 fde1d3 146383->146400 146386 fdefa7 146411 fcfaaa 14 API calls ___vcrt_freefls@4 146386->146411 146387 fdeee6 146391 fde1d3 7 API calls 146387->146391 146387->146392 146388 fdef1e 146388->146386 146389 fdac15 __fread_nolock 15 API calls 146388->146389 146393 fdef30 ctype 146388->146393 146389->146393 146391->146392 146412 fcfaaa 14 API calls ___vcrt_freefls@4 146392->146412 146393->146386 146394 fde1d3 7 API calls 146393->146394 146395 fdef73 146394->146395 146395->146386 146409 fe1ebd WideCharToMultiByte _Fputc 146395->146409 146397 fdef8d 146397->146386 146398 fdef96 146397->146398 146410 fcfaaa 14 API calls ___vcrt_freefls@4 146398->146410 146413 fddd60 146400->146413 146403 fde20b 146416 fde230 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 146403->146416 146404 fde1e4 LCMapStringEx 146408 fde22b 146404->146408 146407 fde224 LCMapStringW 146407->146408 146408->146387 146408->146388 146408->146392 146409->146397 146410->146392 146411->146392 146412->146375 146417 fdde5f 146413->146417 146416->146407 146418 fddd76 146417->146418 146419 fdde8f 146417->146419 146418->146403 146418->146404 146419->146418 146420 fddd94 __Getctype LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 146419->146420 146421 fddea3 146420->146421 146421->146418 146422 fddea9 GetProcAddress 146421->146422 146422->146418 146423 fddeb9 __Getctype 146422->146423 146423->146418 146424->146345 146425 f75ed9 146436 f75ee2 146425->146436 146426 f761ae 146427 f761f5 LoadLibraryA 146426->146427 146428 f76205 146427->146428 146450 f7621e 146427->146450 146430 f761b6 146847 fd4870 15 API calls 146430->146847 146431 f7618c 146846 fd4870 15 API calls 146431->146846 146432 f760de 146432->146430 146432->146431 146436->146426 146436->146432 146844 f71d90 15 API calls 146436->146844 146845 f71de0 20 API calls 146436->146845 146437 f7680d 146438 f76854 GetProcAddress 146437->146438 146456 f76877 146438->146456 146439 f7642c 146441 f76503 146439->146441 146442 f764d9 146439->146442 146851 fd4870 15 API calls 146441->146851 146850 fd4870 15 API calls 146442->146850 146444 f7673e 146448 f76815 146444->146448 146449 f767eb 146444->146449 146855 fd4870 15 API calls 146448->146855 146854 fd4870 15 API calls 146449->146854 146450->146439 146454 f764fb 146450->146454 146848 f71d90 15 API calls 146450->146848 146849 f71de0 20 API calls 146450->146849 146454->146437 146454->146444 146852 f71d90 15 API calls 146454->146852 146853 f71de0 20 API calls 146454->146853 146455 f76b43 146463 f76e56 146455->146463 146465 f76d86 146455->146465 146860 f71d90 15 API calls 146455->146860 146861 f71de0 20 API calls 146455->146861 146456->146455 146457 f76a73 146456->146457 146856 f71d90 15 API calls 146456->146856 146857 f71de0 20 API calls 146456->146857 146459 f76b21 146457->146459 146460 f76b4b 146457->146460 146858 fd4870 15 API calls 146459->146858 146859 fd4870 15 API calls 146460->146859 146473 f77099 146463->146473 146481 f77169 146463->146481 146864 f71d90 15 API calls 146463->146864 146865 f71de0 20 API calls 146463->146865 146467 f76e34 146465->146467 146468 f76e5e 146465->146468 146862 fd4870 15 API calls 146467->146862 146863 fd4870 15 API calls 146468->146863 146474 f77147 146473->146474 146475 f77171 146473->146475 146866 fd4870 15 API calls 146474->146866 146867 fd4870 15 API calls 146475->146867 146479 f773ac 146482 f77484 146479->146482 146483 f7745a 146479->146483 146481->146479 146496 f7747c 146481->146496 146868 f71d90 15 API calls 146481->146868 146869 f71de0 20 API calls 146481->146869 146871 fd4870 15 API calls 146482->146871 146870 fd4870 15 API calls 146483->146870 146488 f77797 146875 fd4870 15 API calls 146488->146875 146489 f7776d 146874 fd4870 15 API calls 146489->146874 146490 f776bf 146490->146488 146490->146489 146495 f779d2 146497 f77a80 146495->146497 146498 f77aaa 146495->146498 146496->146490 146506 f7778f 146496->146506 146872 f71d90 15 API calls 146496->146872 146873 f71de0 20 API calls 146496->146873 146878 fd4870 15 API calls 146497->146878 146879 fd4870 15 API calls 146498->146879 146503 f77ce5 146504 f77d93 146503->146504 146505 f77dbd 146503->146505 146882 fd4870 15 API calls 146504->146882 146883 fd4870 15 API calls 146505->146883 146506->146495 146514 f77aa2 146506->146514 146876 f71d90 15 API calls 146506->146876 146877 f71de0 20 API calls 146506->146877 146510 f786ee 146513 f78735 GetProcAddress 146510->146513 146511 f77ff8 146515 f780a6 146511->146515 146516 f780d0 146511->146516 146548 f78758 146513->146548 146514->146503 146527 f77db5 146514->146527 146880 f71d90 15 API calls 146514->146880 146881 f71de0 20 API calls 146514->146881 146886 fd4870 15 API calls 146515->146886 146887 fd4870 15 API calls 146516->146887 146518 f7830b 146522 f783e3 146518->146522 146523 f783b9 146518->146523 146891 fd4870 15 API calls 146522->146891 146890 fd4870 15 API calls 146523->146890 146525 f7861e 146530 f786f6 146525->146530 146531 f786cc 146525->146531 146527->146511 146533 f780c8 146527->146533 146884 f71d90 15 API calls 146527->146884 146885 f71de0 20 API calls 146527->146885 146895 fd4870 15 API calls 146530->146895 146894 fd4870 15 API calls 146531->146894 146533->146518 146536 f783db 146533->146536 146888 f71d90 15 API calls 146533->146888 146889 f71de0 20 API calls 146533->146889 146536->146510 146536->146525 146892 f71d90 15 API calls 146536->146892 146893 f71de0 20 API calls 146536->146893 146537 f78954 146539 f78a02 146537->146539 146540 f78a2c 146537->146540 146898 fd4870 15 API calls 146539->146898 146899 fd4870 15 API calls 146540->146899 146544 f78c67 146546 f78d15 146544->146546 146547 f78d3f 146544->146547 146902 fd4870 15 API calls 146546->146902 146903 fd4870 15 API calls 146547->146903 146548->146537 146560 f78a24 146548->146560 146896 f71d90 15 API calls 146548->146896 146897 f71de0 20 API calls 146548->146897 146552 f78f7a 146554 f79052 146552->146554 146555 f79028 146552->146555 146907 fd4870 15 API calls 146554->146907 146906 fd4870 15 API calls 146555->146906 146557 f799a1 146565 f799e8 GetProcAddress 146557->146565 146558 f7928d 146563 f79365 146558->146563 146564 f7933b 146558->146564 146560->146544 146569 f78d37 146560->146569 146900 f71d90 15 API calls 146560->146900 146901 f71de0 20 API calls 146560->146901 146911 fd4870 15 API calls 146563->146911 146910 fd4870 15 API calls 146564->146910 146596 f79a14 146565->146596 146567 f795a0 146572 f7964e 146567->146572 146573 f79678 146567->146573 146569->146552 146575 f7904a 146569->146575 146904 f71d90 15 API calls 146569->146904 146905 f71de0 20 API calls 146569->146905 146914 fd4870 15 API calls 146572->146914 146915 fd4870 15 API calls 146573->146915 146575->146558 146582 f7935d 146575->146582 146908 f71d90 15 API calls 146575->146908 146909 f71de0 20 API calls 146575->146909 146579 f7997f 146918 fd4870 15 API calls 146579->146918 146580 f799a9 146919 fd4870 15 API calls 146580->146919 146581 f798cb 146581->146579 146581->146580 146582->146567 146586 f79670 146582->146586 146912 f71d90 15 API calls 146582->146912 146913 f71de0 20 API calls 146582->146913 146586->146557 146586->146581 146916 f71d90 15 API calls 146586->146916 146917 f71de0 20 API calls 146586->146917 146588 f79c1f 146589 f79cd2 146588->146589 146590 f79cfc 146588->146590 146922 fd4870 15 API calls 146589->146922 146923 fd4870 15 API calls 146590->146923 146592 f79f4f 146597 f7a002 146592->146597 146598 f7a02c 146592->146598 146596->146588 146608 f79cf4 146596->146608 146920 f71d90 15 API calls 146596->146920 146921 f71de0 20 API calls 146596->146921 146926 fd4870 15 API calls 146597->146926 146927 fd4870 15 API calls 146598->146927 146603 f7a27f 146604 f7a332 146603->146604 146605 f7a35c 146603->146605 146930 fd4870 15 API calls 146604->146930 146931 fd4870 15 API calls 146605->146931 146606 f7a5af 146612 f7a662 146606->146612 146613 f7a68c 146606->146613 146608->146592 146614 f7a024 146608->146614 146924 f71d90 15 API calls 146608->146924 146925 f71de0 20 API calls 146608->146925 146934 fd4870 15 API calls 146612->146934 146935 fd4870 15 API calls 146613->146935 146614->146603 146626 f7a354 146614->146626 146928 f71d90 15 API calls 146614->146928 146929 f71de0 20 API calls 146614->146929 146618 f7a8df 146620 f7a992 146618->146620 146621 f7a9bc 146618->146621 146938 fd4870 15 API calls 146620->146938 146939 fd4870 15 API calls 146621->146939 146624 f7ac0f 146628 f7acc2 146624->146628 146629 f7acec 146624->146629 146626->146606 146633 f7a684 146626->146633 146932 f71d90 15 API calls 146626->146932 146933 f71de0 20 API calls 146626->146933 146942 fd4870 15 API calls 146628->146942 146943 fd4870 15 API calls 146629->146943 146631 f7b674 146638 f7b6bb GetProcAddress 146631->146638 146633->146618 146642 f7a9b4 146633->146642 146936 f71d90 15 API calls 146633->146936 146937 f71de0 20 API calls 146633->146937 146636 f7aff2 146946 fd4870 15 API calls 146636->146946 146637 f7b01c 146947 fd4870 15 API calls 146637->146947 146672 f7b6e7 146638->146672 146639 f7af3f 146639->146636 146639->146637 146640 f7b26f 146646 f7b322 146640->146646 146647 f7b34c 146640->146647 146642->146624 146648 f7ace4 146642->146648 146940 f71d90 15 API calls 146642->146940 146941 f71de0 20 API calls 146642->146941 146950 fd4870 15 API calls 146646->146950 146951 fd4870 15 API calls 146647->146951 146648->146639 146656 f7b014 146648->146656 146944 f71d90 15 API calls 146648->146944 146945 f71de0 20 API calls 146648->146945 146653 f7b652 146954 fd4870 15 API calls 146653->146954 146654 f7b67c 146955 fd4870 15 API calls 146654->146955 146655 f7b59f 146655->146653 146655->146654 146656->146640 146660 f7b344 146656->146660 146948 f71d90 15 API calls 146656->146948 146949 f71de0 20 API calls 146656->146949 146660->146631 146660->146655 146952 f71d90 15 API calls 146660->146952 146953 f71de0 20 API calls 146660->146953 146662 f7b8f2 146664 f7b9a6 146662->146664 146665 f7b9d0 146662->146665 146663 f7c68c 146666 f7c6e5 FreeLibrary 146663->146666 146716 f7c708 146663->146716 146958 fd4870 15 API calls 146664->146958 146959 fd4870 15 API calls 146665->146959 146666->146428 146668 f7bc23 146673 f7bcd7 146668->146673 146674 f7bd01 146668->146674 146672->146662 146684 f7b9c8 146672->146684 146956 f71d90 15 API calls 146672->146956 146957 f71de0 20 API calls 146672->146957 146962 fd4870 15 API calls 146673->146962 146963 fd4870 15 API calls 146674->146963 146679 f7bf54 146680 f7c032 146679->146680 146681 f7c008 146679->146681 146967 fd4870 15 API calls 146680->146967 146966 fd4870 15 API calls 146681->146966 146682 f7c285 146688 f7c363 146682->146688 146689 f7c339 146682->146689 146684->146668 146690 f7bcf9 146684->146690 146960 f71d90 15 API calls 146684->146960 146961 f71de0 20 API calls 146684->146961 146971 fd4870 15 API calls 146688->146971 146970 fd4870 15 API calls 146689->146970 146690->146679 146699 f7c02a 146690->146699 146964 f71d90 15 API calls 146690->146964 146965 f71de0 20 API calls 146690->146965 146694 f7c5b6 146696 f7c694 146694->146696 146697 f7c66a 146694->146697 146975 fd4870 15 API calls 146696->146975 146974 fd4870 15 API calls 146697->146974 146699->146682 146702 f7c35b 146699->146702 146968 f71d90 15 API calls 146699->146968 146969 f71de0 20 API calls 146699->146969 146702->146663 146702->146694 146972 f71d90 15 API calls 146702->146972 146973 f71de0 20 API calls 146702->146973 146704 f7c92e 146705 f7c9e1 146704->146705 146706 f7ca0b 146704->146706 146978 fd4870 15 API calls 146705->146978 146979 fd4870 15 API calls 146706->146979 146708 f7cc5e 146712 f7cd11 146708->146712 146713 f7cd3b 146708->146713 146982 fd4870 15 API calls 146712->146982 146983 fd4870 15 API calls 146713->146983 146716->146704 146723 f7ca03 146716->146723 146976 f71d90 15 API calls 146716->146976 146977 f71de0 20 API calls 146716->146977 146719 f7cf8e 146720 f7d041 146719->146720 146721 f7d06b 146719->146721 146986 fd4870 15 API calls 146720->146986 146987 fd4870 15 API calls 146721->146987 146723->146708 146727 f7cd33 146723->146727 146980 f71d90 15 API calls 146723->146980 146981 f71de0 20 API calls 146723->146981 146727->146719 146739 f7d063 146727->146739 146984 f71d90 15 API calls 146727->146984 146985 f71de0 20 API calls 146727->146985 146728 f7d371 146990 fd4870 15 API calls 146728->146990 146729 f7d39b 146991 fd4870 15 API calls 146729->146991 146730 f7d2be 146730->146728 146730->146729 146734 f7d5ee 146736 f7d6a1 146734->146736 146737 f7d6cb 146734->146737 146994 fd4870 15 API calls 146736->146994 146995 fd4870 15 API calls 146737->146995 146739->146730 146742 f7d393 146739->146742 146988 f71d90 15 API calls 146739->146988 146989 f71de0 20 API calls 146739->146989 146742->146734 146755 f7d6c3 146742->146755 146992 f71d90 15 API calls 146742->146992 146993 f71de0 20 API calls 146742->146993 146744 f7d936 146745 f7da13 146744->146745 146746 f7d9e9 146744->146746 146999 fd4870 15 API calls 146745->146999 146998 fd4870 15 API calls 146746->146998 146751 f7dc66 146752 f7dd43 146751->146752 146753 f7dd19 146751->146753 147003 fd4870 15 API calls 146752->147003 147002 fd4870 15 API calls 146753->147002 146755->146744 146762 f7da0b 146755->146762 146996 f71d90 15 API calls 146755->146996 146997 f71de0 20 API calls 146755->146997 146759 f7df96 146760 f7e073 146759->146760 146761 f7e049 146759->146761 147007 fd4870 15 API calls 146760->147007 147006 fd4870 15 API calls 146761->147006 146762->146751 146777 f7dd3b 146762->146777 147000 f71d90 15 API calls 146762->147000 147001 f71de0 20 API calls 146762->147001 146766 f7e9dd 146769 f7ea38 InternetOpenA 146766->146769 146767 f7e2c6 146770 f7e3a3 146767->146770 146771 f7e379 146767->146771 146804 f7ea57 146769->146804 147011 fd4870 15 API calls 146770->147011 147010 fd4870 15 API calls 146771->147010 146775 f7e5de 146778 f7e6b5 146775->146778 146779 f7e68b 146775->146779 146777->146759 146783 f7e06b 146777->146783 147004 f71d90 15 API calls 146777->147004 147005 f71de0 20 API calls 146777->147005 147015 fd4870 15 API calls 146778->147015 147014 fd4870 15 API calls 146779->147014 146781 f7e908 146787 f7e9e5 146781->146787 146788 f7e9bb 146781->146788 146783->146767 146791 f7e39b 146783->146791 147008 f71d90 15 API calls 146783->147008 147009 f71de0 20 API calls 146783->147009 146786 f7f036 146790 f7f074 FreeLibrary 146786->146790 146825 f7f097 146786->146825 147019 fd4870 15 API calls 146787->147019 147018 fd4870 15 API calls 146788->147018 146790->146428 146791->146775 146794 f7e6ad 146791->146794 147012 f71d90 15 API calls 146791->147012 147013 f71de0 20 API calls 146791->147013 146794->146766 146794->146781 147016 f71d90 15 API calls 146794->147016 147017 f71de0 20 API calls 146794->147017 146796 f7ec53 146797 f7ed01 146796->146797 146798 f7ed2b 146796->146798 147022 fd4870 15 API calls 146797->147022 147023 fd4870 15 API calls 146798->147023 146803 f7ef66 146805 f7f014 146803->146805 146806 f7f03e 146803->146806 146804->146796 146813 f7ed23 146804->146813 147020 f71d90 15 API calls 146804->147020 147021 f71de0 20 API calls 146804->147021 147026 fd4870 15 API calls 146805->147026 147027 fd4870 15 API calls 146806->147027 146811 f7f2a5 146815 f7f352 146811->146815 146816 f7f37c 146811->146816 146812 f7f698 std::runtime_error::runtime_error _strlen 146814 f7f6f6 InternetOpenUrlA 146812->146814 146813->146786 146813->146803 147024 f71d90 15 API calls 146813->147024 147025 f71de0 20 API calls 146813->147025 146819 f7f734 FreeLibrary 146814->146819 146820 f7f782 InternetReadFile 146814->146820 147030 fd4870 15 API calls 146815->147030 147031 fd4870 15 API calls 146816->147031 146831 f7f75f 146819->146831 146822 f7f7b2 146820->146822 146823 f7f7bb FreeLibrary 146820->146823 146822->146820 146822->146823 146840 f84c60 146822->146840 146838 f7f82a std::ios_base::failure::failure 146823->146838 146824 f7f5c9 146829 f7f676 146824->146829 146830 f7f6a0 146824->146830 146825->146811 146836 f7f374 146825->146836 147028 f71d90 15 API calls 146825->147028 147029 f71de0 20 API calls 146825->147029 147034 fd4870 15 API calls 146829->147034 147035 fd4870 15 API calls 146830->147035 147036 f74120 39 API calls task 146831->147036 146836->146812 146836->146824 147032 f71d90 15 API calls 146836->147032 147033 f71de0 20 API calls 146836->147033 147037 f74120 39 API calls task 146838->147037 146841 f84ccd 146840->146841 146842 f84c80 std::ios_base::failure::failure task std::runtime_error::runtime_error 146840->146842 146841->146842 147038 f719b0 146841->147038 146842->146822 146844->146436 146845->146436 146846->146426 146847->146426 146848->146450 146849->146450 146850->146454 146851->146454 146852->146454 146853->146454 146854->146437 146855->146437 146856->146456 146857->146456 146858->146455 146859->146455 146860->146455 146861->146455 146862->146463 146863->146463 146864->146463 146865->146463 146866->146481 146867->146481 146868->146481 146869->146481 146870->146496 146871->146496 146872->146496 146873->146496 146874->146506 146875->146506 146876->146506 146877->146506 146878->146514 146879->146514 146880->146514 146881->146514 146882->146527 146883->146527 146884->146527 146885->146527 146886->146533 146887->146533 146888->146533 146889->146533 146890->146536 146891->146536 146892->146536 146893->146536 146894->146510 146895->146510 146896->146548 146897->146548 146898->146560 146899->146560 146900->146560 146901->146560 146902->146569 146903->146569 146904->146569 146905->146569 146906->146575 146907->146575 146908->146575 146909->146575 146910->146582 146911->146582 146912->146582 146913->146582 146914->146586 146915->146586 146916->146586 146917->146586 146918->146557 146919->146557 146920->146596 146921->146596 146922->146608 146923->146608 146924->146608 146925->146608 146926->146614 146927->146614 146928->146614 146929->146614 146930->146626 146931->146626 146932->146626 146933->146626 146934->146633 146935->146633 146936->146633 146937->146633 146938->146642 146939->146642 146940->146642 146941->146642 146942->146648 146943->146648 146944->146648 146945->146648 146946->146656 146947->146656 146948->146656 146949->146656 146950->146660 146951->146660 146952->146660 146953->146660 146954->146631 146955->146631 146956->146672 146957->146672 146958->146684 146959->146684 146960->146684 146961->146684 146962->146690 146963->146690 146964->146690 146965->146690 146966->146699 146967->146699 146968->146699 146969->146699 146970->146702 146971->146702 146972->146702 146973->146702 146974->146663 146975->146663 146976->146716 146977->146716 146978->146723 146979->146723 146980->146723 146981->146723 146982->146727 146983->146727 146984->146727 146985->146727 146986->146739 146987->146739 146988->146739 146989->146739 146990->146742 146991->146742 146992->146742 146993->146742 146994->146755 146995->146755 146996->146755 146997->146755 146998->146762 146999->146762 147000->146762 147001->146762 147002->146777 147003->146777 147004->146777 147005->146777 147006->146783 147007->146783 147008->146783 147009->146783 147010->146791 147011->146791 147012->146791 147013->146791 147014->146794 147015->146794 147016->146794 147017->146794 147018->146766 147019->146766 147020->146804 147021->146804 147022->146813 147023->146813 147024->146813 147025->146813 147026->146786 147027->146786 147028->146825 147029->146825 147030->146836 147031->146836 147032->146836 147033->146836 147034->146812 147035->146812 147036->146428 147037->146428 147039 f719d0 Concurrency::task_continuation_context::task_continuation_context 147038->147039 147041 f719dd task Concurrency::task_continuation_context::task_continuation_context 147039->147041 147049 f83fc0 41 API calls std::_Xinvalid_argument 147039->147049 147046 f713d0 147041->147046 147043 f71a89 std::ios_base::failure::failure Concurrency::task_continuation_context::task_continuation_context 147043->146842 147044 f71a16 std::ios_base::failure::failure task 147044->147043 147050 f83410 39 API calls allocator 147044->147050 147051 f713b0 147046->147051 147048 f713f0 std::ios_base::failure::failure allocator Concurrency::task_continuation_context::task_continuation_context 147048->147044 147049->147041 147050->147043 147054 f84bc0 147051->147054 147055 f84bd0 allocator 147054->147055 147058 f71370 147055->147058 147059 f71378 allocator 147058->147059 147060 f71396 147059->147060 147062 f71388 147059->147062 147061 f71391 147060->147061 147073 f83220 147060->147073 147061->147048 147065 f71460 147062->147065 147066 f71477 147065->147066 147067 f7147c 147065->147067 147076 f83d80 RaiseException stdext::threads::lock_error::lock_error std::_Xinvalid_argument 147066->147076 147069 f83220 allocator 16 API calls 147067->147069 147070 f71485 147069->147070 147072 f714a0 147070->147072 147077 fd458f 39 API calls 2 library calls 147070->147077 147072->147061 147078 fcfb05 147073->147078 147076->147067 147080 fcfb0a 147078->147080 147081 f8322c 147080->147081 147085 fcfb26 std::_Facet_Register 147080->147085 147088 fd4a40 147080->147088 147095 fd7694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 147080->147095 147081->147061 147083 fd0371 stdext::threads::lock_error::lock_error 147097 fd106c RaiseException 147083->147097 147085->147083 147096 fd106c RaiseException 147085->147096 147086 fd038e 147094 fdac15 __Getctype 147088->147094 147089 fdac53 147099 fd53de 14 API calls __Wcrtomb 147089->147099 147091 fdac3e RtlAllocateHeap 147092 fdac51 147091->147092 147091->147094 147092->147080 147094->147089 147094->147091 147098 fd7694 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 147094->147098 147095->147080 147096->147083 147097->147086 147098->147094 147099->147092
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: d
                                                                • API String ID: 0-2564639436
                                                                • Opcode ID: 1ba650dfb30c103163d459cdf78c8197cf56f5729098da199513a558f8e8f0ba
                                                                • Instruction ID: d42a241aec942e936441dc0f7a47ab18ec010791ac7b9f387309b810162c7c0d
                                                                • Opcode Fuzzy Hash: 1ba650dfb30c103163d459cdf78c8197cf56f5729098da199513a558f8e8f0ba
                                                                • Instruction Fuzzy Hash: 63141671C04A2D8ACB66DF24CC917AEB775BF46345F1082CAD40E7A241EB319AD5EF42

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2537 3824ba2-3824bb2 2538 3824e23-3824e26 2537->2538 2539 3824bb8-3824beb call 38246d4 2537->2539 2542 3824e22 2539->2542 2543 3824bf1-3824c00 call 38246d4 2539->2543 2542->2538 2543->2542 2546 3824c06-3824c5f KiUserCallbackDispatcher GetSystemMetrics call 3823576 * 4 GetDC 2543->2546 2555 3824e20-3824e21 2546->2555 2556 3824c65-3824c72 GetCurrentObject 2546->2556 2555->2542 2557 3824e17-3824e1a ReleaseDC 2556->2557 2558 3824c78-3824c89 GetObjectW 2556->2558 2557->2555 2558->2557 2559 3824c8f-3824d1e call 38235db DeleteObject CreateCompatibleDC 2558->2559 2559->2557 2562 3824d24-3824d3f CreateDIBSection 2559->2562 2563 3824e10-3824e11 DeleteDC 2562->2563 2564 3824d45-3824d4f SelectObject 2562->2564 2563->2557 2565 3824d55-3824d74 BitBlt 2564->2565 2566 3824e09-3824e0a DeleteObject 2564->2566 2565->2566 2567 3824d7a-3824d8c call 3823508 2565->2567 2566->2563 2567->2566 2570 3824d8e-3824df9 call 382354b * 3 call 3823d76 2567->2570 2578 3824dfe-3824e04 call 3823536 2570->2578 2578->2566
                                                                APIs
                                                                  • Part of subcall function 038246D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03824812), ref: 038246E6
                                                                  • Part of subcall function 038246D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03824812), ref: 038246F3
                                                                • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 03824C13
                                                                • GetSystemMetrics.USER32(0000004D), ref: 03824C1A
                                                                • GetDC.USER32(00000000), ref: 03824C55
                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 03824C68
                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 03824C81
                                                                • DeleteObject.GDI32(00000000), ref: 03824CB3
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 03824D14
                                                                • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 03824D35
                                                                • SelectObject.GDI32(00000000,00000000), ref: 03824D47
                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,03822468,00000000,?,?,00CC0020), ref: 03824D6C
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                  • Part of subcall function 03823D76: EnterCriticalSection.KERNEL32(038284D4,00000000,00000000,00000000,?,?,?,?,?,03823EEB,00000000,00000000,00000000,00000000,00000000), ref: 03823D88
                                                                  • Part of subcall function 03823536: GetProcessHeap.KERNEL32(00000000,00000000,0382518A), ref: 0382353D
                                                                  • Part of subcall function 03823536: RtlFreeHeap.NTDLL(00000000), ref: 03823544
                                                                • DeleteObject.GDI32(00000000), ref: 03824E0A
                                                                • DeleteDC.GDI32(00000000), ref: 03824E11
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 03824E1A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Object$HeapSection$CriticalDelete$CreateEnterProcess$AllocateCallbackCompatibleCurrentDispatcherFreeHandleLeaveLibraryLoadMetricsModuleReleaseSelectSystemUser
                                                                • String ID: ($- ScreenSize: {lWidth=%d, lHeight=%d}$2$6$U$er32$gdi3
                                                                • API String ID: 1387450592-1028866296
                                                                • Opcode ID: ebe3408cadfe663cac9826a613efc66bc0c45a712c04b3c9b3437dd7883751ff
                                                                • Instruction ID: 8dbcf1707beef87d7b55c0e3c64af073a2ad2c792775fd5c9b6b060620becc56
                                                                • Opcode Fuzzy Hash: ebe3408cadfe663cac9826a613efc66bc0c45a712c04b3c9b3437dd7883751ff
                                                                • Instruction Fuzzy Hash: D471BF79D00318ABEF20DFE5DC55BAEBBB4AF04710F14809AE604FB280DB748A44CB65

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2580 3821000-3821018 2581 3821412-3821418 2580->2581 2582 382101e-3821028 2580->2582 2582->2581 2583 382102e-3821037 call 382407d 2582->2583 2583->2581 2586 382103d-3821059 call 3823508 * 2 2583->2586 2591 3821404-382140d call 3823536 * 2 2586->2591 2592 382105f-3821061 2586->2592 2591->2581 2592->2591 2593 3821067-382116d call 3823600 FindFirstFileW 2592->2593 2599 3821173-3821192 call 382363b * 2 2593->2599 2600 38213d5-3821401 call 3823576 * 3 2593->2600 2610 38213ba 2599->2610 2611 3821198-38211b7 call 3823600 2599->2611 2600->2591 2613 38213bd-38213cf FindNextFileW 2610->2613 2616 3821769-3821770 2611->2616 2617 38211bd-38211cf call 382372b 2611->2617 2613->2599 2613->2600 2616->2610 2618 3821776-3821794 call 382363b call 3823b60 2616->2618 2617->2616 2623 38211d5-38211e7 call 382372b 2617->2623 2628 3821796-38217e3 call 3823508 call 3823600 call 3823eb6 2618->2628 2629 38217eb-38217f0 2618->2629 2623->2616 2630 38211ed-382120f call 382363b call 3823b60 2623->2630 2628->2629 2633 38217f6-38217fb 2629->2633 2634 382199b-38219d2 call 3823600 call 3823eb6 2629->2634 2649 3821215-382121b 2630->2649 2650 382171e-3821749 call 38240ba 2630->2650 2633->2634 2638 3821801-3821806 2633->2638 2651 38219d7-38219da 2634->2651 2638->2634 2642 382180c-3821811 2638->2642 2642->2634 2646 3821817-382181c 2642->2646 2646->2634 2647 3821822-3821827 2646->2647 2647->2634 2652 382182d-3821832 2647->2652 2649->2650 2655 3821221-3821227 2649->2655 2660 382174f-382175a call 382372b 2650->2660 2661 382152d-3821534 call 3823536 2650->2661 2651->2613 2652->2634 2656 3821838-382183d 2652->2656 2655->2650 2658 382122d-3821233 2655->2658 2656->2634 2659 3821843-3821848 2656->2659 2658->2650 2662 3821239-382123f 2658->2662 2659->2634 2663 382184e-3821853 2659->2663 2660->2661 2672 3821760-3821762 2660->2672 2661->2610 2662->2650 2666 3821245-382124b 2662->2666 2663->2634 2667 3821859-382185e 2663->2667 2666->2650 2670 3821251-3821257 2666->2670 2667->2610 2671 3821864-3821878 call 382446c 2667->2671 2670->2650 2673 382125d-3821263 2670->2673 2679 38214b4-38214be call 3823536 2671->2679 2680 382187e-3821883 2671->2680 2672->2616 2673->2650 2675 3821269-382126f 2673->2675 2675->2650 2676 3821275-382127b 2675->2676 2676->2650 2678 3821281-3821287 2676->2678 2678->2650 2681 382128d-3821293 2678->2681 2679->2610 2680->2679 2683 3821889-38218a1 call 38236f1 2680->2683 2681->2650 2684 3821299-382129f 2681->2684 2683->2679 2690 38218a7-38218bf call 38236f1 2683->2690 2684->2650 2687 38212a5-38212ab 2684->2687 2687->2650 2689 38212b1-38212b7 2687->2689 2689->2650 2691 38212bd-38212c3 2689->2691 2690->2679 2695 38218c5-38218db call 382369c 2690->2695 2691->2650 2693 38212c9-38212cf 2691->2693 2693->2650 2696 38212d5-38212db 2693->2696 2695->2679 2701 38218e1-38218ed call 3823625 2695->2701 2696->2650 2698 38212e1-38212e7 2696->2698 2698->2650 2700 38212ed-38212f3 2698->2700 2700->2650 2702 38212f9-38212ff 2700->2702 2707 38218f3-3821906 call 3821a62 2701->2707 2708 38214ad-38214af call 3823536 2701->2708 2702->2650 2704 3821305-382130b 2702->2704 2704->2650 2706 3821311-3821317 2704->2706 2706->2650 2709 382131d-3821323 2706->2709 2707->2708 2716 382190c-3821911 2707->2716 2708->2679 2709->2650 2712 3821329-382132f 2709->2712 2712->2650 2713 3821335-382133b 2712->2713 2713->2650 2715 3821341-3821347 2713->2715 2717 382168c-38216c1 call 38240ba 2715->2717 2718 382134d-3821353 2715->2718 2716->2708 2719 3821917-3821929 call 3821c94 2716->2719 2717->2679 2730 38216c7-38216d2 call 382372b 2717->2730 2718->2717 2720 3821359-382135f 2718->2720 2728 382192b-3821974 call 3821ba5 call 3823600 call 3823d76 2719->2728 2729 382198e-3821996 call 3823536 2719->2729 2720->2717 2723 3821365-382136b 2720->2723 2726 3821662-3821687 EnterCriticalSection call 3824e27 LeaveCriticalSection 2723->2726 2727 3821371-3821377 2723->2727 2726->2610 2727->2726 2732 382137d-3821383 2727->2732 2761 3821979-382198b call 3823536 * 2 2728->2761 2729->2708 2730->2679 2743 38216d8-3821719 call 3823efc 2730->2743 2737 3821419-382141f 2732->2737 2738 3821389-38213b4 call 3823efc 2732->2738 2745 38214c3-38214c9 2737->2745 2746 3821425-3821447 call 38240ba 2737->2746 2738->2610 2743->2679 2751 38214cb-38214ed call 38240ba 2745->2751 2752 3821539-382153f 2745->2752 2746->2679 2763 3821449-3821454 call 382372b 2746->2763 2751->2661 2769 38214ef-38214fa call 382372b 2751->2769 2755 3821541-3821563 call 38240ba 2752->2755 2756 3821576-382157c 2752->2756 2755->2661 2774 3821565-3821570 call 382372b 2755->2774 2759 3821582-3821588 2756->2759 2760 382165b 2756->2760 2759->2760 2765 382158e-3821594 2759->2765 2760->2726 2761->2729 2763->2679 2781 3821456-38214a7 call 3823508 call 3823600 call 3823eb6 2763->2781 2771 3821596-382159d 2765->2771 2772 38215a9-38215af 2765->2772 2769->2661 2783 38214fc 2769->2783 2771->2772 2778 38215e3-382160b call 38240ba 2772->2778 2779 38215b1-38215b7 2772->2779 2774->2661 2789 3821572-3821574 2774->2789 2778->2661 2793 3821611-382161c call 382372b 2778->2793 2779->2778 2785 38215b9-38215bf 2779->2785 2781->2708 2791 38214fe-3821527 call 3823efc 2783->2791 2785->2778 2792 38215c1-38215c7 2785->2792 2789->2791 2791->2661 2792->2778 2796 38215c9-38215cf 2792->2796 2793->2661 2804 3821622-3821656 call 3823efc 2793->2804 2796->2778 2800 38215d1-38215d8 call 3821000 2796->2800 2806 38215dd-38215de 2800->2806 2804->2661 2806->2610
                                                                APIs
                                                                • FindNextFileW.KERNELBASE(?,?), ref: 038213C7
                                                                  • Part of subcall function 0382407D: GetFileAttributesW.KERNELBASE(03825051,0382447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03823ECC), ref: 0382407E
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • FindFirstFileW.KERNELBASE(00000000,?,0114E288,?), ref: 03821161
                                                                  • Part of subcall function 03823EFC: FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03823F5D
                                                                  • Part of subcall function 03823EFC: FindNextFileW.KERNEL32(03821710,?), ref: 03823FFE
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 03821668
                                                                • LeaveCriticalSection.KERNEL32(038284D4), ref: 03821681
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CriticalFindSection$EnterFirstHeapLeaveNext$AllocateAttributesProcess
                                                                • String ID: $Lr$%s%s$%s\%s$%s\*$7a?=$Telegram
                                                                • API String ID: 1893179121-1537637304
                                                                • Opcode ID: b151918db37c0ca3f508ddb8e446fc992b3da4005f31c6a9e00bd3e0174144d8
                                                                • Instruction ID: e3a47b63bd60bcd0c46caf8bd5a9e5db8a92427031ebe646f9f11e6a99a4e7a3
                                                                • Opcode Fuzzy Hash: b151918db37c0ca3f508ddb8e446fc992b3da4005f31c6a9e00bd3e0174144d8
                                                                • Instruction Fuzzy Hash: 2C320A65E002345BDF25EBD88858BBDFBB5AF54310F2840DAD405EB294EB748EC5CB92

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2857 3822054-38220a5 call 3823508 2860 3822103-3822115 GetCurrentHwProfileA 2857->2860 2861 38220a7-38220c6 2857->2861 2864 3822117-382212a call 38235db 2860->2864 2865 382212d-382219e GetSystemInfo call 38235db call 3823536 GlobalMemoryStatusEx call 38235db 2860->2865 2862 38220c8-38220cc 2861->2862 2863 38220ce-38220d4 2861->2863 2866 38220ee-38220f9 call 382354b 2862->2866 2867 38220d6-38220dd 2863->2867 2868 38220df-38220e5 2863->2868 2864->2865 2881 38221db-38221ec EnumDisplayDevicesA 2865->2881 2873 38220fc-3822101 2866->2873 2867->2866 2872 38220e7-38220eb 2868->2872 2868->2873 2872->2866 2873->2860 2873->2861 2882 38221a0-38221a9 2881->2882 2883 38221ee-38221f4 2881->2883 2884 38221ca-38221da 2882->2884 2885 38221ab-38221c7 call 38235db 2882->2885 2884->2881 2885->2884
                                                                APIs
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • GetCurrentHwProfileA.ADVAPI32(?), ref: 0382210B
                                                                • GetSystemInfo.KERNELBASE(?,?,0000011C), ref: 03822132
                                                                • GlobalMemoryStatusEx.KERNELBASE(?), ref: 03822166
                                                                • EnumDisplayDevicesA.USER32(00000000,00000002,?,00000001), ref: 038221E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalHeapSection$AllocateCurrentDevicesDisplayEnterEnumGlobalInfoLeaveMemoryProcessProfileStatusSystem
                                                                • String ID: - CPU: %s (%d cores)$- HWID: %s$- RAM: %d GB$- VideoAdapter #%d: %s$@
                                                                • API String ID: 330852582-565344305
                                                                • Opcode ID: d98ad7215fbad8a2e2c385eb92023846044a4c56cfc85c72a913fe5120057505
                                                                • Instruction ID: 8249276e5b52c621ccfac2a54e828129367c2275e0438a0daf1d3bf6c945a66d
                                                                • Opcode Fuzzy Hash: d98ad7215fbad8a2e2c385eb92023846044a4c56cfc85c72a913fe5120057505
                                                                • Instruction Fuzzy Hash: 8441A1716043159FD721DF59C881FABBBE8EB88310F0449ADF989CB242E774D984C7A2

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2888 3824e27-3824e47 2889 3824e98-3824ed9 call 3823508 * 2 call 3823600 FindFirstFileW 2888->2889 2890 3824e49-3824e8c call 3823600 call 382407d 2888->2890 2903 3825183-3825192 call 3823536 * 2 2889->2903 2904 3824edf-3824ef9 call 3823600 2889->2904 2899 3824e92 2890->2899 2900 3825198-382519e 2890->2900 2899->2889 2903->2900 2910 3824fb1-3824fc7 call 382363b 2904->2910 2911 3824eff-3824f06 2904->2911 2913 382516b-382517d FindNextFileW 2910->2913 2919 3824fcd-38250ab call 3823600 call 3823eb6 call 382363b call 3823600 call 382407d 2910->2919 2911->2913 2914 3824f0c-3824f1e call 382372b 2911->2914 2913->2903 2913->2904 2914->2913 2920 3824f24-3824f36 call 382372b 2914->2920 2919->2913 2943 38250b1-3825165 call 382363b call 3823600 call 3823eb6 2919->2943 2920->2913 2926 3824f3c-3824f5b call 382363b call 3823b60 2920->2926 2936 3824f84-3824fac EnterCriticalSection call 3824e27 LeaveCriticalSection 2926->2936 2937 3824f5d-3824f62 2926->2937 2936->2913 2937->2936 2939 3824f64-3824f6b 2937->2939 2939->2913 2942 3824f71-3824f79 call 3824e27 2939->2942 2947 3824f7e-3824f7f 2942->2947 2949 382516a 2943->2949 2947->2949 2949->2913
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(00000000,?,00000000,00000000), ref: 03824ECD
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 03824F89
                                                                  • Part of subcall function 03824E27: LeaveCriticalSection.KERNEL32(038284D4), ref: 03824FA6
                                                                • FindNextFileW.KERNELBASE(?,?), ref: 03825175
                                                                  • Part of subcall function 0382407D: GetFileAttributesW.KERNELBASE(03825051,0382447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03823ECC), ref: 0382407E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CriticalFindSection$AttributesEnterFirstLeaveNext
                                                                • String ID: %s\%s$%s\*$Telegram
                                                                • API String ID: 648860119-4994844
                                                                • Opcode ID: 362cca041e163cb1d87548944ad5fa3b0c1f7bcc21706cbb1354e562fc63b8d5
                                                                • Instruction ID: ac9883e3785a03d86348841b487e83fde7fa7536f957872bf4a0d23c68162483
                                                                • Opcode Fuzzy Hash: 362cca041e163cb1d87548944ad5fa3b0c1f7bcc21706cbb1354e562fc63b8d5
                                                                • Instruction Fuzzy Hash: 17A1F829A14318A9EF10EBE4EC15BFEBB75EF44710F10509AE504EB2E0E7B50AC5C75A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5796 3821d3c-3821d4e 5797 3821d54-3821d5e 5796->5797 5798 3821f25-3821f2a 5796->5798 5797->5798 5799 3821d64-3821d8e call 3823600 FindFirstFileW 5797->5799 5799->5798 5802 3821d94-3821dd8 call 3823508 call 382363b 5799->5802 5807 3821ddd-3821e02 call 382363b * 2 5802->5807 5812 3821f01-3821f0f FindNextFileW 5807->5812 5813 3821e08-3821e21 call 3823600 5807->5813 5815 3821f11-3821f17 5812->5815 5816 3821f1c-3821f20 call 3823536 5812->5816 5819 3821e23-3821e33 call 382372b 5813->5819 5820 3821e54-3821e59 5813->5820 5815->5807 5816->5798 5819->5820 5826 3821e35-3821e45 call 382372b 5819->5826 5822 3821ef2-3821efd 5820->5822 5823 3821e5f-3821e69 5820->5823 5822->5812 5823->5822 5825 3821e6f-3821e7c call 382408d 5823->5825 5830 3821eeb-3821eed call 3823536 5825->5830 5831 3821e7e-3821e95 call 382363b call 3823b60 5825->5831 5826->5820 5834 3821e47-3821e4a call 3821d3c 5826->5834 5830->5822 5841 3821e97-3821e9c 5831->5841 5842 3821eac-3821edc call 3823600 call 3823eb6 5831->5842 5839 3821e4f 5834->5839 5839->5822 5841->5842 5843 3821e9e-3821ea3 5841->5843 5848 3821ee1-3821ee4 5842->5848 5843->5842 5845 3821ea5-3821eaa 5843->5845 5845->5830 5845->5842 5848->5830
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(?), ref: 03821D83
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • FindNextFileW.KERNELBASE(00000000,?), ref: 03821F07
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalFileFindHeapSection$AllocateEnterFirstLeaveNextProcess
                                                                • String ID: %s%s$%s\%s$%s\*
                                                                • API String ID: 3555643018-2064654797
                                                                • Opcode ID: 2cd4d291f8ff56e503acfc63cd062f70eee3c4787d4fb606f5fc6877e024e8ce
                                                                • Instruction ID: 0838c19059a9ce67df02d57cf15607fae880c753d0f8940f96d0c114cd4baa62
                                                                • Opcode Fuzzy Hash: 2cd4d291f8ff56e503acfc63cd062f70eee3c4787d4fb606f5fc6877e024e8ce
                                                                • Instruction Fuzzy Hash: B24106791047618BCB24EBA8D854A2EBBE8AF54700F14889DF855C7291EB74CA85C787

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5896 3821c94-3821ccf call 38246d4 5899 3821cd1-3821cf8 call 3823576 CryptUnprotectData 5896->5899 5900 3821d2f-3821d3b 5896->5900 5903 3821d05-3821d0a 5899->5903 5904 3821cfa-3821d03 5899->5904 5903->5900 5905 3821d0c-3821d29 CryptProtectData 5903->5905 5904->5900 5905->5900
                                                                APIs
                                                                  • Part of subcall function 038246D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03824812), ref: 038246E6
                                                                  • Part of subcall function 038246D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03824812), ref: 038246F3
                                                                • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 03821CF3
                                                                • CryptProtectData.CRYPT32(?,?,00000000,00000000,00000000,00000000,?), ref: 03821D29
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CryptData$HandleLibraryLoadModuleProtectUnprotect
                                                                • String ID: CRYPT32.dll$Poverty is the parent of crime.
                                                                • API String ID: 3642467563-1885057629
                                                                • Opcode ID: ae166235a9278fc9149ef0c4e897dcdf8a4b3a9658dc637b0687f9118cc83753
                                                                • Instruction ID: f97558730dca6d1d9b14fd38c43091326a09ae18279916290086ac84a44cd2ea
                                                                • Opcode Fuzzy Hash: ae166235a9278fc9149ef0c4e897dcdf8a4b3a9658dc637b0687f9118cc83753
                                                                • Instruction Fuzzy Hash: 40115EB5D0021CABDF10CFD5C884CEEBBBDEB48210F1445AAE905B3240E774AE49CBA0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 38221f5-3822212 InitializeCriticalSectionAndSpinCount 1 3822214 0->1 2 3822219-382222f CreateMutexA 0->2 3 3822680 1->3 4 3822235-3822240 GetLastError 2->4 5 3822678-382267a ExitProcess 2->5 4->5 6 3822246-3822255 call 3823bd2 4->6 9 382225b-3822285 call 3823576 call 38247e6 6->9 10 382264f-382266f DeleteCriticalSection 6->10 15 3822647-382264a call 3823536 9->15 16 382228b-38222d0 call 38235db call 382484b 9->16 10->5 15->10 16->15 22 38222d6-382230a call 3823508 * 3 16->22 29 3822310-3822317 22->29 30 38225df-382262e call 3823d76 call 3823536 * 4 call 3823bfb 22->30 29->30 31 382231d-3822324 29->31 60 3822631-3822637 call 382536d 30->60 31->30 33 382232a-3822366 call 38246d4 31->33 33->30 40 382236c-3822381 call 3821f2d 33->40 46 3822383-38223ba call 38246d4 40->46 47 38223c1-38223db 40->47 46->47 56 38223bc 46->56 53 38223e5-3822410 call 382363b 47->53 54 38223dd-38223df ExitProcess 47->54 64 3822412-3822414 ExitProcess 53->64 65 382241a-3822445 call 382363b 53->65 56->3 63 382263c-3822643 60->63 63->15 66 3822645 63->66 70 3822447-3822449 ExitProcess 65->70 71 382244f-38224bd call 382363b call 3824ba2 CreateThread * 2 WaitForMultipleObjects call 38219df call 3822054 65->71 66->60 80 38224c7-38224ce 71->80 81 38224d0-38224d9 80->81 82 3822501-382251d ObtainUserAgentString 80->82 85 38224db-38224f5 81->85 86 38224ff 81->86 83 3822535-38225a0 call 3825239 * 6 call 3823508 82->83 84 382251f-3822532 call 38235db 82->84 104 38225b2-38225da call 382363b call 3825239 * 2 call 3823536 83->104 105 38225a2-38225ac GetModuleFileNameW 83->105 84->83 85->86 86->80 104->30 105->104
                                                                APIs
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(038284D4,00000DA3), ref: 0382220A
                                                                • CreateMutexA.KERNELBASE(00000000,00000000,1e7f31ac-1494-47cc-9633-054c20e7432e), ref: 03822222
                                                                • GetLastError.KERNEL32 ref: 03822235
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CountCreateCriticalErrorInitializeLastMutexSectionSpin
                                                                • String ID: $$$d.log$- OperationSystem: %d:%d:%d$- UserAgent: %s$1e7f31ac-1494-47cc-9633-054c20e7432e$@$kernel32$shell32$systemd
                                                                • API String ID: 2005177960-3436640841
                                                                • Opcode ID: 47cfa4cf1f03ae5887f004cc0ad4c1dd358ddddcd2eaa0e8fb81e98a5c2187d7
                                                                • Instruction ID: 86675d2edf41237c80694a58a4e43acf8e639b2b8a44713fcf074944a5ef1797
                                                                • Opcode Fuzzy Hash: 47cfa4cf1f03ae5887f004cc0ad4c1dd358ddddcd2eaa0e8fb81e98a5c2187d7
                                                                • Instruction Fuzzy Hash: E8C1E334944368AFEB61EBE8D815BEC7F75AB25300F0480D9E601EA1D1CBB54AC5CB22

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0382407D: GetFileAttributesW.KERNELBASE(03825051,0382447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03823ECC), ref: 0382407E
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 038244F5
                                                                • LeaveCriticalSection.KERNEL32(038284D4), ref: 03824541
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 038245C4
                                                                • LeaveCriticalSection.KERNEL32(038284D4), ref: 038245FD
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 0382463A
                                                                • LeaveCriticalSection.KERNEL32(038284D4), ref: 0382467D
                                                                • EnterCriticalSection.KERNEL32(038284D4), ref: 03824696
                                                                • LeaveCriticalSection.KERNEL32(038284D4), ref: 038246BF
                                                                  • Part of subcall function 038242EC: GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03824574), ref: 03824305
                                                                  • Part of subcall function 038242EC: GetProcAddress.KERNEL32(00000000), ref: 0382430E
                                                                  • Part of subcall function 038242EC: GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03824574), ref: 0382431F
                                                                  • Part of subcall function 038242EC: GetProcAddress.KERNEL32(00000000), ref: 03824322
                                                                  • Part of subcall function 038242EC: OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03824574), ref: 038243A4
                                                                  • Part of subcall function 038242EC: GetCurrentProcess.KERNEL32(03824574,00000000,00000000,00000002,?,?,?,?,03824574), ref: 038243C0
                                                                  • Part of subcall function 038242EC: DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03824574), ref: 038243CF
                                                                  • Part of subcall function 038242EC: CloseHandle.KERNEL32(03824574,?,?,?,?,03824574), ref: 038243FF
                                                                  • Part of subcall function 03823536: GetProcessHeap.KERNEL32(00000000,00000000,0382518A), ref: 0382353D
                                                                  • Part of subcall function 03823536: RtlFreeHeap.NTDLL(00000000), ref: 03823544
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$HandleHeapProcess$AddressModuleProc$AllocateAttributesCloseCurrentDuplicateFileFreeOpen
                                                                • String ID: @$\??\%s$\Network\Cookies
                                                                • API String ID: 330363434-2791195959
                                                                • Opcode ID: bfbbae2dd325213280558fbbaa846b1833656f538697a63763f77ce59f81e543
                                                                • Instruction ID: 75d7de0e9c1d2e9b499544cf8f82175051dbcc82315b9ad57e7d98b28f61d77a
                                                                • Opcode Fuzzy Hash: bfbbae2dd325213280558fbbaa846b1833656f538697a63763f77ce59f81e543
                                                                • Instruction Fuzzy Hash: EC716A79A40228AFEF14EFD5D849BADBFB5FB04304F108095F901EA2D1DBB49A85CB51

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2953 382536d-38253f6 call 38246d4 2956 38253f8-38253fa 2953->2956 2957 38253ff-3825457 2953->2957 2958 382553e-3825541 2956->2958 2960 382553b 2957->2960 2961 382545d-382548b call 3825361 socket 2957->2961 2960->2958 2964 3825531-3825534 2961->2964 2965 3825491-38254a8 call 38252cf call 3823576 2961->2965 2964->2960 2970 38254a9-38254af 2965->2970 2971 38254b1-38254c6 connect 2970->2971 2972 3825524-382552a 2970->2972 2973 3825517-3825522 Sleep 2971->2973 2974 38254c8-38254e8 send 2971->2974 2972->2964 2973->2970 2974->2973 2975 38254ea-3825504 send 2974->2975 2975->2973 2976 3825506-3825515 call 3823536 2975->2976 2976->2972
                                                                APIs
                                                                  • Part of subcall function 038246D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03824812), ref: 038246E6
                                                                  • Part of subcall function 038246D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03824812), ref: 038246F3
                                                                • socket.WS2_32(?,00000001,00000000), ref: 03825480
                                                                • connect.WS2_32(000000FF,?,00000010), ref: 038254BF
                                                                • send.WS2_32(000000FF,00000000,00000000), ref: 038254E1
                                                                • send.WS2_32(000000FF,000000FF,00000037,00000000), ref: 038254FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: send$HandleLibraryLoadModuleconnectsocket
                                                                • String ID: 146.70.169.164$ws2_32.dll
                                                                • API String ID: 2781119014-4085977579
                                                                • Opcode ID: f2ee806fe1732934217616a102293e8abfd5bbf4007fcbcc62c51e73a07e361b
                                                                • Instruction ID: 4a339e0b761aa8322467d8e7ae98c90e97ad1020e270cb68ba1aa8fe894d6803
                                                                • Opcode Fuzzy Hash: f2ee806fe1732934217616a102293e8abfd5bbf4007fcbcc62c51e73a07e361b
                                                                • Instruction Fuzzy Hash: B2518330C44299EEEB11CBE8D9197EDBFB89F16314F148189E660EE1C1C3B5478ACB65
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: d
                                                                • API String ID: 0-2564639436
                                                                • Opcode ID: 63e7e76ab78d54733117a4f10f0141304726f6154476d6233d163c9c47096227
                                                                • Instruction ID: 4253e7a56571ca306f613eada31bc6254f9edd4b0c595c388848568c57c4863a
                                                                • Opcode Fuzzy Hash: 63e7e76ab78d54733117a4f10f0141304726f6154476d6233d163c9c47096227
                                                                • Instruction Fuzzy Hash: 6F630271C04A1C8ACB66EF68C9917EEF775FF56344F1082C6D40A3A241EB31AAD5AF41

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3853 f83fe0-f84015 3855 f8401b-f84022 3853->3855 3856 f842a1-f842b9 3853->3856 3858 f8402d-f84033 3855->3858 3859 f842bf-f842c9 3856->3859 3860 f84554-f8456c 3856->3860 3861 f84039-f84050 3858->3861 3862 f840e4-f840eb 3858->3862 3865 f842da-f842e3 3859->3865 3869 f847f8-f84810 3860->3869 3870 f84572-f84579 3860->3870 3866 f8405b-f84061 3861->3866 3863 f840f6-f840fc 3862->3863 3867 f841c0-f841c7 3863->3867 3868 f84102-f84109 3863->3868 3871 f842e9-f84300 3865->3871 3872 f84397-f8439e 3865->3872 3873 f840cd-f840df 3866->3873 3874 f84063-f840cb call f71dc0 call f71cc0 3866->3874 3875 f841d2-f841d8 3867->3875 3878 f84114-f8411a 3868->3878 3887 f84a36-f84a3d 3869->3887 3888 f84816-f8481d 3869->3888 3880 f84584-f8458a 3870->3880 3881 f8430b-f84311 3871->3881 3877 f843a9-f843af 3872->3877 3873->3858 3874->3866 3883 f841da-f841e1 3875->3883 3884 f84236-f8423f 3875->3884 3885 f84473-f8447a 3877->3885 3886 f843b5-f843bc 3877->3886 3889 f841bb 3878->3889 3890 f84120-f841b6 call f71d90 call f71de0 call f71d10 3878->3890 3891 f8463b-f84642 3880->3891 3892 f84590-f845a7 3880->3892 3893 f84380-f84392 3881->3893 3894 f84313-f8437e call f71dc0 call f71cc0 3881->3894 3897 f841ec-f841f2 3883->3897 3899 f84241-f84245 3884->3899 3900 f84246-f84248 3884->3900 3901 f84485-f8448b 3885->3901 3898 f843c7-f843cd 3886->3898 3908 f84bae-f84bb1 3887->3908 3909 f84a43-f84ba4 call f74c60 call f745b0 call f74a60 call f74550 GetModuleHandleA GetProcAddress call f74e20 call f74670 call f74ff0 call f74670 call f751b0 call f74670 call f75370 call f74690 call f75530 call f74690 call f75610 call f746b0 call f756f0 call f746b0 call fd0910 VirtualProtect * 2 call fd0910 VirtualProtect 3887->3909 3903 f84828-f8482e 3888->3903 3889->3863 3890->3878 3902 f8464d-f84653 3891->3902 3905 f845b2-f845b8 3892->3905 3893->3865 3894->3881 3912 f84234 3897->3912 3913 f841f4-f84232 call f71e00 3897->3913 3914 f8446e 3898->3914 3915 f843d3-f84469 call f71d90 call f71de0 call f71d10 3898->3915 3899->3900 3916 f8424a-f84272 call fd4870 3900->3916 3917 f84274-f84299 call fd4870 3900->3917 3918 f844e9-f844f2 3901->3918 3919 f8448d-f84494 3901->3919 3920 f84659-f84660 3902->3920 3921 f84717-f8471e 3902->3921 3922 f848df-f848e6 3903->3922 3923 f84834-f8484b 3903->3923 3925 f845ba-f84622 call f71dc0 call f71cc0 3905->3925 3926 f84624-f84636 3905->3926 3909->3908 3912->3875 3913->3897 3914->3877 3915->3898 3979 f8429c 3916->3979 3917->3979 3943 f844f9-f844fb 3918->3943 3944 f844f4-f844f8 3918->3944 3939 f8449f-f844a5 3919->3939 3940 f8466b-f84671 3920->3940 3930 f84729-f8472f 3921->3930 3931 f848f1-f848f7 3922->3931 3941 f84856-f8485c 3923->3941 3925->3905 3926->3880 3950 f8478d-f84796 3930->3950 3951 f84731-f84738 3930->3951 3952 f849bb-f849c2 3931->3952 3953 f848fd-f84904 3931->3953 3958 f844e7 3939->3958 3959 f844a7-f844e5 call f71e00 3939->3959 3960 f84712 3940->3960 3961 f84677-f8470d call f71d90 call f71de0 call f71d10 3940->3961 3962 f848c8-f848da 3941->3962 3963 f8485e-f848c6 call f71dc0 call f71cc0 3941->3963 3965 f844fd-f84525 call fd4870 3943->3965 3966 f84527-f8454c call fd4870 3943->3966 3944->3943 3977 f84798-f8479c 3950->3977 3978 f8479d-f8479f 3950->3978 3973 f84743-f84749 3951->3973 3980 f849cd-f849d3 3952->3980 3974 f8490f-f84915 3953->3974 3958->3901 3959->3939 3960->3902 3961->3940 3962->3903 3963->3941 4005 f8454f 3965->4005 3966->4005 3991 f8478b 3973->3991 3992 f8474b-f84789 call f71e00 3973->3992 3993 f8491b-f849b1 call f71d90 call f71de0 call f71d10 3974->3993 3994 f849b6 3974->3994 3977->3978 3996 f847cb-f847f0 call fd4870 3978->3996 3997 f847a1-f847c9 call fd4870 3978->3997 3979->3856 3998 f84a31 3980->3998 3999 f849d5-f849dc 3980->3999 3991->3930 3992->3973 3993->3974 3994->3931 4034 f847f3 3996->4034 3997->4034 3998->3887 4015 f849e7-f849ed 3999->4015 4005->3860 4026 f84a2f 4015->4026 4027 f849ef-f84a2d call f71e00 4015->4027 4026->3980 4027->4015 4034->3869
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: d
                                                                • API String ID: 0-2564639436
                                                                • Opcode ID: 913488bcf320a0c7ce590b7c77bdc0ae1e6249abb924504bd4a163a3d5aa7830
                                                                • Instruction ID: 94af4080e126a2a36acf27d8c8a7c10875baf409ac709d201172bef4b5adb445
                                                                • Opcode Fuzzy Hash: 913488bcf320a0c7ce590b7c77bdc0ae1e6249abb924504bd4a163a3d5aa7830
                                                                • Instruction Fuzzy Hash: F7724971C04A1DCACB11EFA8D8916EEF775FF55344F10828AE40A7A241EB35AA85EF41
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: d
                                                                • API String ID: 0-2564639436
                                                                • Opcode ID: 7a32173caa3b8389e040920657d683e302c86175c525fdcc22848b96201b9c2f
                                                                • Instruction ID: 7fa54bf07af321866a0ffacae8beb6f35ef43019dde00af17951c81060c77992
                                                                • Opcode Fuzzy Hash: 7a32173caa3b8389e040920657d683e302c86175c525fdcc22848b96201b9c2f
                                                                • Instruction Fuzzy Hash: 25D30371C04A188ACB26EF64CD917EEF775FF56344F1082CAD40A7A241EB31AAD5AF41

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5731 382484b-382485a 5732 3824b90 5731->5732 5733 3824860-3824879 VirtualAlloc 5731->5733 5734 3824b96-3824b99 5732->5734 5733->5732 5735 382487f-38248a3 call 38246d4 5733->5735 5736 3824b9c-3824ba1 5734->5736 5739 38248a9-38248be call 382354b 5735->5739 5740 3824b8c-3824b8e 5735->5740 5743 38248c0-38248c7 5739->5743 5740->5736 5744 38248d2-38248d5 5743->5744 5745 38248c9-38248ce 5743->5745 5747 38248d9-3824900 GetCurrentProcess IsWow64Process call 3825239 5744->5747 5745->5743 5746 38248d0 5745->5746 5746->5747 5750 3824990-3824993 5747->5750 5751 3824906-382490b 5747->5751 5752 38249e0-38249e3 5750->5752 5753 3824995-3824998 5750->5753 5754 382492c-3824931 5751->5754 5755 382490d-382491d 5751->5755 5759 38249e9-38249ee 5752->5759 5760 3824a8e-3824a94 5752->5760 5756 382499a-38249b6 5753->5756 5757 38249b8-38249bc 5753->5757 5761 3824933-3824938 5754->5761 5762 3824971-3824974 5754->5762 5758 382491f-3824927 5755->5758 5767 3824a32-3824a3f 5756->5767 5757->5732 5768 38249c2-38249de 5757->5768 5758->5767 5769 3824a10-3824a12 5759->5769 5770 38249f0-3824a0e 5759->5770 5765 3824a9a-3824aa0 5760->5765 5766 3824b2f-3824b32 5760->5766 5761->5755 5771 382493a-382493c 5761->5771 5763 3824976-3824979 5762->5763 5764 382497f-382498e 5762->5764 5763->5732 5763->5764 5764->5758 5772 3824aa2-3824abb 5765->5772 5773 3824ac0-3824ac6 5765->5773 5766->5732 5774 3824b34-3824b55 5766->5774 5767->5734 5768->5767 5775 3824a44-3824a47 5769->5775 5776 3824a14-3824a2d 5769->5776 5770->5767 5771->5755 5777 382493e-3824941 5771->5777 5772->5734 5778 3824ae6-3824aec 5773->5778 5779 3824ac8-3824ae1 5773->5779 5780 3824b77 5774->5780 5781 3824b57-3824b5d 5774->5781 5784 3824a67-3824a6a 5775->5784 5785 3824a49-3824a62 5775->5785 5776->5767 5782 3824943-3824955 5777->5782 5783 3824957-382495a 5777->5783 5788 3824aee-3824b07 5778->5788 5789 3824b0c-3824b12 5778->5789 5779->5734 5787 3824b7c-3824b83 5780->5787 5781->5780 5790 3824b5f-3824b65 5781->5790 5782->5758 5783->5732 5791 3824960-382496f 5783->5791 5784->5732 5786 3824a70-3824a89 5784->5786 5785->5734 5786->5734 5787->5734 5788->5734 5789->5774 5792 3824b14-3824b2d 5789->5792 5790->5780 5793 3824b67-3824b6d 5790->5793 5791->5758 5792->5734 5793->5780 5794 3824b6f-3824b75 5793->5794 5794->5780 5795 3824b85-3824b8a 5794->5795 5795->5787
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,0000011C,?,?,?,?,?,038222C4), ref: 0382486C
                                                                  • Part of subcall function 038246D4: GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03824812), ref: 038246E6
                                                                  • Part of subcall function 038246D4: LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03824812), ref: 038246F3
                                                                • GetCurrentProcess.KERNEL32(038222C4), ref: 038248E0
                                                                • IsWow64Process.KERNEL32(00000000), ref: 038248E7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$AllocCurrentHandleLibraryLoadModuleVirtualWow64
                                                                • String ID: l$ntdl
                                                                • API String ID: 1207166019-924918826
                                                                • Opcode ID: 3a1e98a97158434b5dff6c6ef61e09f0d2a72a77ac41befd8edd7c7e9a9f2ebc
                                                                • Instruction ID: b417377d172f7bc766e77d0d292c2e0e2273367137d7e34e1b606ded4264d1d3
                                                                • Opcode Fuzzy Hash: 3a1e98a97158434b5dff6c6ef61e09f0d2a72a77ac41befd8edd7c7e9a9f2ebc
                                                                • Instruction Fuzzy Hash: 6F8108316047249BEF34EED6E8157793B68FB10714F2484DAEA0ADB2D4D7B486C4CB26

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5849 fcfca5-fcfcbd call fd7e88 5852 fcfcbf-fcfccb 5849->5852 5853 fcfcd0-fcfd06 call fd7e5d call fcffb3 call fd0489 5849->5853 5854 fcfdb9-fcfdc8 5852->5854 5862 fcfd08-fcfd11 call fcff1f 5853->5862 5863 fcfd23-fcfd2c call fd048f 5853->5863 5862->5863 5870 fcfd13-fcfd21 5862->5870 5868 fcfd2e-fcfd37 call fcff1f 5863->5868 5869 fcfd41-fcfd56 call fd05aa call fd7e0a call f8cf50 5863->5869 5868->5869 5876 fcfd39-fcfd40 call fd8191 5868->5876 5882 fcfd5b-fcfd64 call fd05e0 5869->5882 5870->5863 5876->5869 5885 fcfd66-fcfd68 5882->5885 5886 fcfdd0-fcfdde call fd81b7 call fd817b 5882->5886 5887 fcfd6f-fcfd82 call fcffd0 5885->5887 5888 fcfd6a call fd816c 5885->5888 5887->5854 5888->5887
                                                                APIs
                                                                • ___scrt_release_startup_lock.LIBCMT ref: 00FCFCF5
                                                                • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 00FCFD09
                                                                • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 00FCFD2F
                                                                • ___scrt_uninitialize_crt.LIBCMT ref: 00FCFD72
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ___scrt_is_nonwritable_in_current_image$___scrt_release_startup_lock___scrt_uninitialize_crt
                                                                • String ID: VPWh
                                                                • API String ID: 3089971210-353207083
                                                                • Opcode ID: 148f07d0100cd725e0751324ef9cb7d1c0f8333eaef2f00ae1e2409b6a86502a
                                                                • Instruction ID: 4512c5df8b66156517b30f9d55299754b6ff686804249ebc12ea3be931558709
                                                                • Opcode Fuzzy Hash: 148f07d0100cd725e0751324ef9cb7d1c0f8333eaef2f00ae1e2409b6a86502a
                                                                • Instruction Fuzzy Hash: 8621373290835796CA247B64AD07F9EB7539F42370F24013FF8816B2C2DF694C05B1A1

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5906 f83052-f83068 5908 f8306a-f830ca LoadLibraryA CreateThread WaitForSingleObject FreeLibrary 5906->5908 5909 f830ce-f830d1 5906->5909 5908->5909
                                                                APIs
                                                                • LoadLibraryA.KERNELBASE(?), ref: 00F8307F
                                                                • CreateThread.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000), ref: 00F830A2
                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F830B7
                                                                • FreeLibrary.KERNEL32(?), ref: 00F830C4
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Library$CreateFreeLoadObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 2432312608-0
                                                                • Opcode ID: 9c1672dcd954a4f83d6eb9d8c25d89de79ad7d170c47dc90b6ebe4d9314d5204
                                                                • Instruction ID: f15ce5a856f64f3e206c5fc2addde902c0029bff451e58cfacbb802945d7b75e
                                                                • Opcode Fuzzy Hash: 9c1672dcd954a4f83d6eb9d8c25d89de79ad7d170c47dc90b6ebe4d9314d5204
                                                                • Instruction Fuzzy Hash: 27011D7094431C9BDB24DF64DC8CBE97735FB54715F1006C8E6195A2A1CAB16A80DF50

                                                                Control-flow Graph

                                                                APIs
                                                                • EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                • GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                • RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                • LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalHeapSection$AllocateEnterLeaveProcess
                                                                • String ID:
                                                                • API String ID: 1367039788-0
                                                                • Opcode ID: 5310716eae8a13a960fd625e940d504aad1369be694ff119404f0504749fe8c6
                                                                • Instruction ID: 02dfccc3f48b407350a2d2d5a445769f57144e237c58cb201ffbab8fc96f8afd
                                                                • Opcode Fuzzy Hash: 5310716eae8a13a960fd625e940d504aad1369be694ff119404f0504749fe8c6
                                                                • Instruction Fuzzy Hash: B0D09E3260056067DA6036EBB80DE9BAEACFFA576170581DAF205D3155CAA4884987A0

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5911 38246d4-38246f0 GetModuleHandleA 5912 38246f2-38246fd LoadLibraryA 5911->5912 5913 3824706-382470e 5911->5913 5912->5913 5914 38246ff-3824701 5912->5914 5915 3824714-382471f 5913->5915 5916 38247dd 5913->5916 5917 38247e0-38247e5 5914->5917 5915->5916 5918 3824725-382472e 5915->5918 5916->5917 5918->5916 5919 3824734-3824739 5918->5919 5919->5916 5920 382473f-3824743 5919->5920 5920->5916 5921 3824749-382476e 5920->5921 5922 3824770-382477b 5921->5922 5923 38247dc 5921->5923 5924 382477d-3824787 5922->5924 5923->5916 5925 3824789-38247a3 call 3823625 call 3823b60 5924->5925 5926 38247cc-38247da 5924->5926 5931 38247b1-38247c9 5925->5931 5932 38247a5-38247ad 5925->5932 5926->5922 5926->5923 5931->5926 5932->5924 5933 38247af 5932->5933 5933->5926
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdl,0000011C,?,?,?,?,?,?,?,03824812), ref: 038246E6
                                                                • LoadLibraryA.KERNELBASE(ntdl,?,?,?,?,?,?,?,03824812), ref: 038246F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: HandleLibraryLoadModule
                                                                • String ID: ntdl
                                                                • API String ID: 4133054770-3973061744
                                                                • Opcode ID: 97900e54cc8a98b029bb2484d1f834db9651df11440da85d6a1c60dadc7fbcd5
                                                                • Instruction ID: 99cdc49a7a9a83c8d491a4f197a4e8b55e0ffe4a1d515447aa70ace67edd9409
                                                                • Opcode Fuzzy Hash: 97900e54cc8a98b029bb2484d1f834db9651df11440da85d6a1c60dadc7fbcd5
                                                                • Instruction Fuzzy Hash: 9C318039E00A29DFCB24CF9AC490ABDFBB5BF46714F184299D421D7741C7359991CBA0
                                                                APIs
                                                                • __freea.LIBCMT ref: 00FDEF97
                                                                  • Part of subcall function 00FDAC15: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00FCFB1F,00000000,?,00F8322C,00000000,?,00F713A5,00000000), ref: 00FDAC47
                                                                • __freea.LIBCMT ref: 00FDEFAA
                                                                • __freea.LIBCMT ref: 00FDEFB7
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: __freea$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 2243444508-0
                                                                • Opcode ID: 237a1235f4cfa6ef99a478950b169ce7b5e75e1e7d0edc2f3ddd6a742827465a
                                                                • Instruction ID: c71affbeb6d5d7bef3f4a6f59b8f70c1d1af23aef2f753c89dfc95a1fb1ecf79
                                                                • Opcode Fuzzy Hash: 237a1235f4cfa6ef99a478950b169ce7b5e75e1e7d0edc2f3ddd6a742827465a
                                                                • Instruction Fuzzy Hash: 3D518572A00206AFDB25AF61DC45EAB77ABEF44720F1D012AFD08DE341EB74DC50A661
                                                                APIs
                                                                  • Part of subcall function 00FE2A95: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 00FE2AC0
                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00FE2DA5,?,00000000,?,00000000,?), ref: 00FE2FC2
                                                                • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00FE2DA5,?,00000000,?,00000000,?), ref: 00FE2FFE
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: CodeInfoPageValid
                                                                • String ID:
                                                                • API String ID: 546120528-0
                                                                • Opcode ID: 1864041bce0529dc260cf8621c71ab7786aa7b9855f3e156760bedb5906cc626
                                                                • Instruction ID: d736d4edc491b9ec83db8ee3f2b7d033aec26b7bfe22ef307475400b20afd841
                                                                • Opcode Fuzzy Hash: 1864041bce0529dc260cf8621c71ab7786aa7b9855f3e156760bedb5906cc626
                                                                • Instruction Fuzzy Hash: A1514470E043C59EDB20CF36C88D6BABBF9FF80324F14446ED1968B251E6799A05EB50
                                                                APIs
                                                                • LCMapStringEx.KERNELBASE(?,00FDEED2,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 00FDE207
                                                                • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00FDEED2,?,?,-00000008,?,00000000), ref: 00FDE225
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: String
                                                                • String ID:
                                                                • API String ID: 2568140703-0
                                                                • Opcode ID: 2bd9bc40720c9bcf5e31317d99fe9d05bd3926557cd522f7414641b464b7d6ff
                                                                • Instruction ID: 99e42918234745ff38efa92b37f5c003f7748171218dbcce74acf59e93fa55cb
                                                                • Opcode Fuzzy Hash: 2bd9bc40720c9bcf5e31317d99fe9d05bd3926557cd522f7414641b464b7d6ff
                                                                • Instruction Fuzzy Hash: F7F0683280015EBBCF126F90DC05DDE3E2AFF48761F098415FA182A120C636D831BBA0
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000000,00000000,0382518A), ref: 0382353D
                                                                • RtlFreeHeap.NTDLL(00000000), ref: 03823544
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 22e373dd8778722f4a8a25067942322e6a15943ee7dfdf949c165d4cfa3f6375
                                                                • Instruction ID: dedb847f594aba4b7960dcb499cb72eea135957106156b9f263e9bbd2693278b
                                                                • Opcode Fuzzy Hash: 22e373dd8778722f4a8a25067942322e6a15943ee7dfdf949c165d4cfa3f6375
                                                                • Instruction Fuzzy Hash: 47B012745015006FEE6C7BE29A2DF3A3B18BB20703F0440C8F307E1045C6ACC0088620
                                                                APIs
                                                                • GetCPInfo.KERNEL32(FFFFF9B2,?,00000005,00FE2DA5,?), ref: 00FE2B9B
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Info
                                                                • String ID:
                                                                • API String ID: 1807457897-0
                                                                • Opcode ID: f174cdb123ffe36fd642faa906fd448e65963acad28eb4bba2a2ad186a1afd07
                                                                • Instruction ID: 523d492ea26092bc952c12b1e38c9fcf3539632031a3a0440607112e5a9f6b04
                                                                • Opcode Fuzzy Hash: f174cdb123ffe36fd642faa906fd448e65963acad28eb4bba2a2ad186a1afd07
                                                                • Instruction Fuzzy Hash: 01518AB1908198AADB118F2DCC84BF9BB6DFF15324F2401E9E189D7142E335AD85EB60
                                                                APIs
                                                                • stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00FD037B
                                                                  • Part of subcall function 00FD106C: RaiseException.KERNEL32(E06D7363,00000001,00000003,00FD038E,?,?,?,?,00FD038E,?,00FF8484), ref: 00FD10CC
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ExceptionRaisestdext::threads::lock_error::lock_error
                                                                • String ID:
                                                                • API String ID: 3447279179-0
                                                                • Opcode ID: b9429cc482ac1f200c5dd735b1876c418c93a14a48b5093d5fe5927b038d5ccc
                                                                • Instruction ID: 776c4b0651c2c14bcf95839e9431d6652ffa502485ad15faf2ba17ea0935b6c2
                                                                • Opcode Fuzzy Hash: b9429cc482ac1f200c5dd735b1876c418c93a14a48b5093d5fe5927b038d5ccc
                                                                • Instruction Fuzzy Hash: F3F0BB35C0030EB7CB04BAA4ED1BE5D772E5D00350F544136F968961E2EF34EE49B195
                                                                APIs
                                                                • Concurrency::cancel_current_task.LIBCPMTD ref: 00F71477
                                                                  • Part of subcall function 00F83D80: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00F83D89
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                                                                • String ID:
                                                                • API String ID: 2103942186-0
                                                                • Opcode ID: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                                                                • Instruction ID: 237b4c863009354ad31f941a560bd5ac94fe1dd038ffa28f66904c4642d13b26
                                                                • Opcode Fuzzy Hash: 7e938961fb2e67025cdff9c0a0f1d748bbed45857ce640becdc6d9bdc5e37106
                                                                • Instruction Fuzzy Hash: 7AF03C75E01108ABCB14EFACD8816ADF7B1EF49314F14C1AAE80997345E634AF54EB82
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00FCFB1F,00000000,?,00F8322C,00000000,?,00F713A5,00000000), ref: 00FDAC47
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: e582397ffbbf6f98a811a68b616f698fb8dd58cf1c5283c438377e4ba38c0c23
                                                                • Instruction ID: 010f885842d6bf09ff6bf1ef0c5d6c4675baa7066b0ce82aa738204218d8168e
                                                                • Opcode Fuzzy Hash: e582397ffbbf6f98a811a68b616f698fb8dd58cf1c5283c438377e4ba38c0c23
                                                                • Instruction Fuzzy Hash: 28E0E521914A1867D73237759C00B9A3A8B9F023B0F1C0123BD04963D0DBA8CC00B2AB
                                                                APIs
                                                                • VirtualProtect.KERNELBASE(?,00000007,?,?), ref: 00F84B9E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual
                                                                • String ID:
                                                                • API String ID: 544645111-0
                                                                • Opcode ID: c292ab2fda9bae35fe588b4b7facbfecb8e3eb11e50230fcd55e69df09279578
                                                                • Instruction ID: 8d567a350750d86d3ef7f63463993325907f0eed9d206d8bf557c65fdd159c89
                                                                • Opcode Fuzzy Hash: c292ab2fda9bae35fe588b4b7facbfecb8e3eb11e50230fcd55e69df09279578
                                                                • Instruction Fuzzy Hash: 4CD012B6A1410DC7CB209B68EC4C3B27B78FB44316B14118AEA5887112DF725515AF50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: allocator
                                                                • String ID:
                                                                • API String ID: 3447690668-0
                                                                • Opcode ID: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                                                                • Instruction ID: 96f16145bbb31b93e959bd21b00a09526b0116ce06559304cc12290c3cc7530a
                                                                • Opcode Fuzzy Hash: 571f10d42482652b194d7ecda06d937b3b08c569b6719ab49de57ad63638ba45
                                                                • Instruction Fuzzy Hash: 64C09B3011410C5B8704EF88E891D55739D9BC87107004155BC0D4B351DA30FD40C654
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(03825051,0382447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03823ECC), ref: 0382407E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 77ab6e7de062d6b2b954e82643eacd2f07fa4f1227d0d816236dffde4a08b951
                                                                • Instruction ID: 28cef5a4e9dfa7c9beb5b914823e3700ad46c1322d14cd855f24a119958fb8b0
                                                                • Opcode Fuzzy Hash: 77ab6e7de062d6b2b954e82643eacd2f07fa4f1227d0d816236dffde4a08b951
                                                                • Instruction Fuzzy Hash: 43A02238030A008BCA3C23300B2A00E30000E2A3F03220BCCB033C80C8EA28C2800000
                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(00000000,00000001,00003000,00000040), ref: 00F88B81
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 1d2718adff84564bbf65b1cc130972c1ad779f452db0921746e13c0d2c54eb67
                                                                • Instruction ID: 666637451966a3b68774f302fc3da488363bbc85ee0d5e685757fa36915b143d
                                                                • Opcode Fuzzy Hash: 1d2718adff84564bbf65b1cc130972c1ad779f452db0921746e13c0d2c54eb67
                                                                • Instruction Fuzzy Hash: 862128B1C05968CBDB62DF24CD827EDB7B5AF82380F5092C6D40D6A202DB745BC6AF11
                                                                APIs
                                                                  • Part of subcall function 0382407D: GetFileAttributesW.KERNELBASE(03825051,0382447E,?,?,?,?,?,?,?,?,?,?,?,?,?,03823ECC), ref: 0382407E
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 03823F5D
                                                                • FindNextFileW.KERNEL32(03821710,?), ref: 03823FFE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CriticalFindHeapSection$AllocateAttributesEnterFirstLeaveNextProcess
                                                                • String ID: %s%s$%s\%s$%s\*
                                                                • API String ID: 674214967-2064654797
                                                                • Opcode ID: 69b5fcebb9dd790fe8da5aaaf20365f134227368d31c9763d6f602e7fa1de2f6
                                                                • Instruction ID: c8c6f6fcb59eada8ebd34879f899821724dbb75ee7a4c9496ef251d44c48a4e3
                                                                • Opcode Fuzzy Hash: 69b5fcebb9dd790fe8da5aaaf20365f134227368d31c9763d6f602e7fa1de2f6
                                                                • Instruction Fuzzy Hash: 8A31C879A003396BCF61EAD58C55ABDBF699F40210F0801E5EC05DB2D1DB798EC68B51
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00FE54F1
                                                                • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 00FE551A
                                                                • GetACP.KERNEL32 ref: 00FE552F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: ACP$OCP
                                                                • API String ID: 2299586839-711371036
                                                                • Opcode ID: 258709de16e8114839baeee51f478cdc75349f8966cb1a0ddf8a441fc722b23f
                                                                • Instruction ID: 16a3556bb3d890c0498e055a0e7fed39ccdeaa6e6f8eb470feae1183af8966a7
                                                                • Opcode Fuzzy Hash: 258709de16e8114839baeee51f478cdc75349f8966cb1a0ddf8a441fc722b23f
                                                                • Instruction Fuzzy Hash: F121D832A00681E6D730CF57D905B9773A7AB50F7DB6A8424E909CB154F732DE40E350
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • GetUserDefaultLCID.KERNEL32 ref: 00FE573C
                                                                • IsValidCodePage.KERNEL32(00000000), ref: 00FE577A
                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 00FE578D
                                                                • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00FE57D5
                                                                • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00FE57F0
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                • String ID:
                                                                • API String ID: 415426439-0
                                                                • Opcode ID: 4c1f0d333a845b806e6fde4228a1ff9808470f4de920ca89a2dc640ea180dfa5
                                                                • Instruction ID: aaac815689f5eecdb4f7a8f7e51001ba81e8ef3fd555c5aefd31900de94b260d
                                                                • Opcode Fuzzy Hash: 4c1f0d333a845b806e6fde4228a1ff9808470f4de920ca89a2dc640ea180dfa5
                                                                • Instruction Fuzzy Hash: F2518371D00689AFDF10DFA6CC41BAE77B8AF04B14F54442AE910EB191EB74DA40EB61
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0382410D
                                                                • FindNextFileW.KERNEL32(000000FF,?), ref: 03824159
                                                                  • Part of subcall function 03823536: GetProcessHeap.KERNEL32(00000000,00000000,0382518A), ref: 0382353D
                                                                  • Part of subcall function 03823536: RtlFreeHeap.NTDLL(00000000), ref: 03823544
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFindHeap$FirstFreeNextProcess
                                                                • String ID: %s\%s$%s\*
                                                                • API String ID: 1689202581-2848263008
                                                                • Opcode ID: 292533e52c8f9bf733c78fac37688819b91cd6f0a5174a0ee036853cdb10bd0e
                                                                • Instruction ID: 19a9e51c57e3c291bb6a2b4060c809da5b5ee4079ffa4ca840d1fb1e633dbeaf
                                                                • Opcode Fuzzy Hash: 292533e52c8f9bf733c78fac37688819b91cd6f0a5174a0ee036853cdb10bd0e
                                                                • Instruction Fuzzy Hash: 9331AA787003389BCB20EEEACC9466E7FA9AF54740F1440E5D906CB241DB7489C5CB61
                                                                APIs
                                                                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00FE265E
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00FE2752
                                                                • FindClose.KERNEL32(00000000), ref: 00FE2791
                                                                • FindClose.KERNEL32(00000000), ref: 00FE27C4
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID:
                                                                • API String ID: 1164774033-0
                                                                • Opcode ID: 418d5196aeccb9c70ab1980bc9490af7f7e29e13fcde0299e28a319d852575f9
                                                                • Instruction ID: 26b50e1946bf0da41998e8f3a7c741153bcd6df66ca6fff9d44aabe1c8d5396f
                                                                • Opcode Fuzzy Hash: 418d5196aeccb9c70ab1980bc9490af7f7e29e13fcde0299e28a319d852575f9
                                                                • Instruction Fuzzy Hash: 4071F571C052985FDF64EF29DC99AAEB7BDAF05310F1841DAE00997251FB354E81AF10
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00FD04A1
                                                                • IsDebuggerPresent.KERNEL32 ref: 00FD056D
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00FD0586
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00FD0590
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                • String ID:
                                                                • API String ID: 254469556-0
                                                                • Opcode ID: e4a7569fbcb612929a2498853b607ae3299d86090293e1032ab669c19fb55cea
                                                                • Instruction ID: 892e3cad021992268f2b006e4de3b1228a45a3155a3cb4865340cf41dcf27a52
                                                                • Opcode Fuzzy Hash: e4a7569fbcb612929a2498853b607ae3299d86090293e1032ab669c19fb55cea
                                                                • Instruction Fuzzy Hash: B531F8B5D0521C9BDF20EF64DD89BCDBBB8AF08304F1441AAE50DAB250EB749A84DF45
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FE5130
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FE517A
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FE5240
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale$ErrorLast
                                                                • String ID:
                                                                • API String ID: 661929714-0
                                                                • Opcode ID: 1d357226924bf69a1e031b084f103d2bc3c2f362739e5f5080f90b1cd6a8f2d9
                                                                • Instruction ID: c83bdbc33c0b73e079b55842a644d521cd990c62c1f0437a8e831c4f8b857045
                                                                • Opcode Fuzzy Hash: 1d357226924bf69a1e031b084f103d2bc3c2f362739e5f5080f90b1cd6a8f2d9
                                                                • Instruction Fuzzy Hash: 4661D271D106479FDF289F26CD82BAA77AAEF04B18F10407AEA05C6181F778D945EB50
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00FD447B
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00FD4485
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00FD4492
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: 835a2aa3242586fc95bd01856b209a14ed2c46afd722e39ddf12c92d6a03ef93
                                                                • Instruction ID: 84a39ecf89e694f994e3f3a6679fa4fd93f43f2169b3a0198e6254bd710dd06e
                                                                • Opcode Fuzzy Hash: 835a2aa3242586fc95bd01856b209a14ed2c46afd722e39ddf12c92d6a03ef93
                                                                • Instruction Fuzzy Hash: 3831C474D0121C9BCB21DF64DC89B8DBBB9BF08320F5441DAE90CA6250EB749B859F54
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00FD0152
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID:
                                                                • API String ID: 2325560087-0
                                                                • Opcode ID: 2daf146089e8d1c8cb6eb74541d31b5cb586f2dc2a29f9aaad3f5c412a9c71ad
                                                                • Instruction ID: b0de85b7435e612410ad4ebf626aae719cd63cb819b078104485630d15af780e
                                                                • Opcode Fuzzy Hash: 2daf146089e8d1c8cb6eb74541d31b5cb586f2dc2a29f9aaad3f5c412a9c71ad
                                                                • Instruction Fuzzy Hash: BF519DB1D012098FDB15CF64E9857AABBF9FB48320F28812BD509EB361D774D940EB54
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00FE5383
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$InfoLocale
                                                                • String ID:
                                                                • API String ID: 3736152602-0
                                                                • Opcode ID: 269da244f8e35746ea331d294ad59f0b9ff2393d6aa7d8d0ff5b64b30a7e9d66
                                                                • Instruction ID: d8761b81b176ac310ad7206026462a22138876cc5a074490785cb633f72055c7
                                                                • Opcode Fuzzy Hash: 269da244f8e35746ea331d294ad59f0b9ff2393d6aa7d8d0ff5b64b30a7e9d66
                                                                • Instruction Fuzzy Hash: 34210A72900696AFDB189F26DC41B7A73E9EF40759F14007AFD01C6141EB78ED41E750
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • EnumSystemLocalesW.KERNEL32(00FE50DC,00000001), ref: 00FE5028
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2417226690-0
                                                                • Opcode ID: 8171e613bdb78f33a9742a63b156215fc08115973a8ddc306353b010f7f188b0
                                                                • Instruction ID: c5b97fa406bfb895e2b3abe87c751924da14104419feb42086902b4df26e7ad9
                                                                • Opcode Fuzzy Hash: 8171e613bdb78f33a9742a63b156215fc08115973a8ddc306353b010f7f188b0
                                                                • Instruction Fuzzy Hash: F01129366007459FDB289F39C89167AB792FF80768B14442DEA4647740D375B942E780
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00FE52F8,00000000,00000000,?), ref: 00FE558A
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$InfoLocale
                                                                • String ID:
                                                                • API String ID: 3736152602-0
                                                                • Opcode ID: cb98672f4194cda2b0032eeea899b35461ab29e538d513c14c27f7b4d7fcaa31
                                                                • Instruction ID: 6c2ef5a8b9ba866ba10df9c691162a84d56b5852b22db7a0dbae8d4e2b4801b4
                                                                • Opcode Fuzzy Hash: cb98672f4194cda2b0032eeea899b35461ab29e538d513c14c27f7b4d7fcaa31
                                                                • Instruction Fuzzy Hash: CB01DB73A007526BDB285B258C457BB3765DF40B6CF194429ED06A3180EA74FE41E691
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • EnumSystemLocalesW.KERNEL32(00FE532F,00000001), ref: 00FE509B
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2417226690-0
                                                                • Opcode ID: ec17c5172861feb0777fba74009bbffc3c2250fc04f19fb72a8ff4e20b7c0768
                                                                • Instruction ID: cf71b14f58f59c601b301ad13980eacd2276d16cbc659e7b31ed9ad9629416fd
                                                                • Opcode Fuzzy Hash: ec17c5172861feb0777fba74009bbffc3c2250fc04f19fb72a8ff4e20b7c0768
                                                                • Instruction Fuzzy Hash: 36F04C36300B455FCB245F369CC167A7B91EF8076CB04402DFA064B640C6B19C42E750
                                                                APIs
                                                                  • Part of subcall function 00FD49CA: EnterCriticalSection.KERNEL32(-00FFB8A8,?,00FD76D7,00000000,00FF8C40,0000000C,00FD769F,?,?,00FDDB90,?,?,00FDAA8E,00000001,00000364,00000000), ref: 00FD49D9
                                                                • EnumSystemLocalesW.KERNEL32(Function_0006DBBA,00000001,00FF8E30,0000000C,00FDDF92,?), ref: 00FDDBFF
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                • String ID:
                                                                • API String ID: 1272433827-0
                                                                • Opcode ID: 72be4a4521e7d638e6f9e550ec41daab9bcd1797f85137af8cfa7c13de6fb958
                                                                • Instruction ID: 249cc1201dd72be362e36d0aca4660c7e5dbde7b7a45b098db6b1e8903463ebb
                                                                • Opcode Fuzzy Hash: 72be4a4521e7d638e6f9e550ec41daab9bcd1797f85137af8cfa7c13de6fb958
                                                                • Instruction Fuzzy Hash: A8F03772A10308DFDB00EF98E842BAD77B2FB08720F10412BE5049B3A0CBB99900EB51
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • EnumSystemLocalesW.KERNEL32(00FE4EC4,00000001), ref: 00FE4FA2
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2417226690-0
                                                                • Opcode ID: 174f928bdb7e096612c88a1916c3a4971cedc0a75b25ca1f4d6af8b1bd95a2a9
                                                                • Instruction ID: 622c0985410c7ac9c0b93dd3edc4ded24025e543b5044fa6d847779d26886237
                                                                • Opcode Fuzzy Hash: 174f928bdb7e096612c88a1916c3a4971cedc0a75b25ca1f4d6af8b1bd95a2a9
                                                                • Instruction Fuzzy Hash: 67F0E5367002C55BCF04DF3AD84566ABFA4EFC1B20B0A405DEE058F691C675A883E7A0
                                                                APIs
                                                                  • Part of subcall function 00FDA8F0: GetLastError.KERNEL32(?,?,00FD71B7,?,?,?,?,00000003,00FD4382,?,00FD42F1,?,00000000,00FD4500), ref: 00FDA8F4
                                                                  • Part of subcall function 00FDA8F0: SetLastError.KERNEL32(00000000,00000000,00FD4500,?,?,?,?,?,00000000,?,?,00FD459E,00000000,00000000,00000000,00000000), ref: 00FDA996
                                                                • EnumSystemLocalesW.KERNEL32(00FE4EC4,00000001), ref: 00FE4FA2
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2417226690-0
                                                                • Opcode ID: aba31c294d36d63d316b6e76143732b93cd2ba8735ca8a333d37189e64f1103e
                                                                • Instruction ID: c31acfb0656e05fba674628f4e81e569cca5d750519cd2857f8927ebc71b73ca
                                                                • Opcode Fuzzy Hash: aba31c294d36d63d316b6e76143732b93cd2ba8735ca8a333d37189e64f1103e
                                                                • Instruction Fuzzy Hash: BFF0E5367002C55BCF04DF3AD84566ABFA4EFC1B20B0A405DEE058B691C675A882E7A0
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00FD9527,?,20001004,00000000,00000002,?,?,00FD8B19), ref: 00FDE0CA
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: 9e0de6a2da91cdba03d675a327f4decb1c67b0384d0960b1a47d3af7526fdf5b
                                                                • Instruction ID: 90baf4759b3a6b46192134c0198f835db9ce77f355f66151582b629e3bf40933
                                                                • Opcode Fuzzy Hash: 9e0de6a2da91cdba03d675a327f4decb1c67b0384d0960b1a47d3af7526fdf5b
                                                                • Instruction Fuzzy Hash: 3BE01A3250012CBBCB123F61DC08B9E3A2BAB44760F084416FD056A2618BB59920FAA5
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_0006062E,00FCFC56), ref: 00FD0627
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 7f097f58dcfde826304d77c34a2791a67515157b1c9cedfb5fa8cdd0e616614f
                                                                • Instruction ID: a03b9688a2f75591fd2d11fa3317879d9dee2a5bc6b2f6632dd51e93cfa14372
                                                                • Opcode Fuzzy Hash: 7f097f58dcfde826304d77c34a2791a67515157b1c9cedfb5fa8cdd0e616614f
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: HeapProcess
                                                                • String ID:
                                                                • API String ID: 54951025-0
                                                                • Opcode ID: 32282448f6c9d1f74c83478644d77c77e07040f5b8efc23971586a70ba97d542
                                                                • Instruction ID: 5d8a1d550bfd292797a0f03c17986c11f2209bdee4c6b1cf0c818c570b546528
                                                                • Opcode Fuzzy Hash: 32282448f6c9d1f74c83478644d77c77e07040f5b8efc23971586a70ba97d542
                                                                • Instruction Fuzzy Hash: F1A001B461624ACB97408F75AF492193AE9AA49A91B1681ADA405CA1A0EB688450EA11
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation,00000000,00000000,00000000,?,?,?,?,03824574), ref: 03824305
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0382430E
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtQueryObject,?,?,?,?,03824574), ref: 0382431F
                                                                • GetProcAddress.KERNEL32(00000000), ref: 03824322
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,?,?,?,?,03824574), ref: 038243A4
                                                                • GetCurrentProcess.KERNEL32(03824574,00000000,00000000,00000002,?,?,?,?,03824574), ref: 038243C0
                                                                • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03824574), ref: 038243CF
                                                                • CloseHandle.KERNEL32(03824574,?,?,?,?,03824574), ref: 038243FF
                                                                • GetCurrentProcess.KERNEL32(03824574,00000000,00000000,00000001,?,?,?,?,03824574), ref: 0382440D
                                                                • DuplicateHandle.KERNEL32(?,?,00000000,?,?,?,?,03824574), ref: 0382441C
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,03824574), ref: 0382442F
                                                                • CloseHandle.KERNEL32(000000FF), ref: 03824452
                                                                • CloseHandle.KERNEL32(?), ref: 0382445A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Handle$CloseProcess$AddressCriticalCurrentDuplicateHeapModuleProcSection$AllocateEnterLeaveOpen
                                                                • String ID: NtQueryObject$NtQuerySystemInformation$ntdll
                                                                • API String ID: 3110323036-2044536123
                                                                • Opcode ID: 767cd3865ca0d7312808015f5900fce489dfdd587c1310755a5b02a36855d7cf
                                                                • Instruction ID: 0442be469cb53ad7039127d4d9dc54bbd80f7ab394e012e2fc24b8e6d7b5313c
                                                                • Opcode Fuzzy Hash: 767cd3865ca0d7312808015f5900fce489dfdd587c1310755a5b02a36855d7cf
                                                                • Instruction Fuzzy Hash: 46417371A01229AFDB20EBE69C44AAEFFB9EF54710F1441A5F514E3291D774CA84CBA0
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                • String ID: bad locale name
                                                                • API String ID: 3904239083-1405518554
                                                                • Opcode ID: d219d6703ed14bd07c95e15413eee41e55b5341e03ec2a6340488bce3e91380c
                                                                • Instruction ID: 2f4734cc6f42846947b76e9e47697c962282cb0dbb6c09a8463ce6be2f8d3328
                                                                • Opcode Fuzzy Hash: d219d6703ed14bd07c95e15413eee41e55b5341e03ec2a6340488bce3e91380c
                                                                • Instruction Fuzzy Hash: 292154B0904149DBCF04EBA8DD52BBEB771EF45308F14855DE51627382C7795A00E7A2
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __aulldvrm
                                                                • String ID: (null)$(null)$0123456789ABCDEF$0123456789abcdef
                                                                • API String ID: 1302938615-1267642376
                                                                • Opcode ID: 34be6a4d3ac58b3215d880fd3b18ea4094f8f6a68a58ab891a3a8741671691c4
                                                                • Instruction ID: e40ac5eae86e9229159085bec0e655bb3dcd2a01c49f556cfcd91d0621181cdd
                                                                • Opcode Fuzzy Hash: 34be6a4d3ac58b3215d880fd3b18ea4094f8f6a68a58ab891a3a8741671691c4
                                                                • Instruction Fuzzy Hash: 1E917970604356CFCB65CF69C48062AFBE5EF85304F288DAEE49AC7661D770A9C1CB51
                                                                APIs
                                                                • type_info::operator==.LIBVCRUNTIME ref: 00FD3400
                                                                • ___TypeMatch.LIBVCRUNTIME ref: 00FD350E
                                                                • _UnwindNestedFrames.LIBCMT ref: 00FD3660
                                                                • CallUnexpected.LIBVCRUNTIME ref: 00FD367B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 2751267872-393685449
                                                                • Opcode ID: 30845542be202b308f939864f8da3f93651270d53ca1eeee3cba307160cf2fa6
                                                                • Instruction ID: cf8e554caf851cdf00a87d3b4500a28c9e02827dff51be524de8b72a5ae72544
                                                                • Opcode Fuzzy Hash: 30845542be202b308f939864f8da3f93651270d53ca1eeee3cba307160cf2fa6
                                                                • Instruction Fuzzy Hash: BFB16B72C00209EFCF15DFA4D9419AEBBB6BF14320B18455BEA016B312D739DA51EB92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3907804496
                                                                • Opcode ID: f3a5a083c653d2844f09face3b52e3c226b2999653dfad2fe1f83861aa3d3b84
                                                                • Instruction ID: 416baf7c7724477bd77dc05366c502e36b78d8036963b7d1a3358f49a8965f40
                                                                • Opcode Fuzzy Hash: f3a5a083c653d2844f09face3b52e3c226b2999653dfad2fe1f83861aa3d3b84
                                                                • Instruction Fuzzy Hash: 95B1D271E042899FDB11DFABCC81BBE7BB6BF85320F184159E5019B392C7749942EB60
                                                                APIs
                                                                • GetUserDefaultUILanguage.KERNEL32 ref: 03821F90
                                                                • GetKeyboardLayoutList.USER32(00000032,?), ref: 03821FF2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DefaultKeyboardLanguageLayoutListUser
                                                                • String ID: )$- KeyboardLayouts: ( $- SystemLayout %d${%d}
                                                                • API String ID: 167087913-619012376
                                                                • Opcode ID: f2afddd052f992736dfab218cfdd582b3d07be7b1a71be0905fe676aecdf1c01
                                                                • Instruction ID: 401749163d4558d0d3e7c86f139ea238970dea8ff91bc1ded75203f65744dd02
                                                                • Opcode Fuzzy Hash: f2afddd052f992736dfab218cfdd582b3d07be7b1a71be0905fe676aecdf1c01
                                                                • Instruction Fuzzy Hash: 04319E54E082A8AEDB019BE894017FDBF70AF14305F4050D6F558EA282D67D4B89C76A
                                                                APIs
                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,00000000,?,80CADD86,?,00FDDEA3,00000000,00F713A5,00000000,00000000), ref: 00FDDE55
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID: api-ms-$ext-ms-
                                                                • API String ID: 3664257935-537541572
                                                                • Opcode ID: 6d2721631352b9891d97792e1c0b57c3c4806a5669f14a8098d95f4e9b57c4fd
                                                                • Instruction ID: 724923e1548dc7cfb70a74943ab035094473edf7d82ab234dd1d69078051b507
                                                                • Opcode Fuzzy Hash: 6d2721631352b9891d97792e1c0b57c3c4806a5669f14a8098d95f4e9b57c4fd
                                                                • Instruction Fuzzy Hash: 0B219372E40215ABCB219B65DC45B6E376ADF517B0F280112E916AF3D0D770ED01E6E1
                                                                APIs
                                                                • __EH_prolog3.LIBCMT ref: 00FCE51D
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FCE527
                                                                • int.LIBCPMTD ref: 00FCE53E
                                                                  • Part of subcall function 00F746D0: std::_Lockit::_Lockit.LIBCPMT ref: 00F746E6
                                                                  • Part of subcall function 00F746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F74710
                                                                • codecvt.LIBCPMT ref: 00FCE561
                                                                • std::_Facet_Register.LIBCPMT ref: 00FCE578
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FCE598
                                                                • Concurrency::cancel_current_task.LIBCPMTD ref: 00FCE5A5
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                                                • String ID:
                                                                • API String ID: 2133458128-0
                                                                • Opcode ID: 715307ae01969d1faf1a1ab3ea0fde9edd7bdce1c1ed18e380424b4a8d3dc048
                                                                • Instruction ID: 5390e3231c6edc87f962775758fe54d244329ad4cafb267fde987c909d120a95
                                                                • Opcode Fuzzy Hash: 715307ae01969d1faf1a1ab3ea0fde9edd7bdce1c1ed18e380424b4a8d3dc048
                                                                • Instruction Fuzzy Hash: 0911D6B190021A9FCB10ABA4CD46BAE77B5FF84724F14040EF405A7291DFB8AE01EBD1
                                                                APIs
                                                                • __EH_prolog3.LIBCMT ref: 00FCD7AF
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FCD7B9
                                                                • int.LIBCPMTD ref: 00FCD7D0
                                                                  • Part of subcall function 00F746D0: std::_Lockit::_Lockit.LIBCPMT ref: 00F746E6
                                                                  • Part of subcall function 00F746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F74710
                                                                • codecvt.LIBCPMT ref: 00FCD7F3
                                                                • std::_Facet_Register.LIBCPMT ref: 00FCD80A
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FCD82A
                                                                • Concurrency::cancel_current_task.LIBCPMTD ref: 00FCD837
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Registercodecvt
                                                                • String ID:
                                                                • API String ID: 2133458128-0
                                                                • Opcode ID: 77941f2889c0d4ecc28215d97fd363054a10ac7ffe0c1f6e09ed1b8c6b8cff3d
                                                                • Instruction ID: a8a458a7593320a21840524aaad472914a42418171a237b8f8f74b8398ed9899
                                                                • Opcode Fuzzy Hash: 77941f2889c0d4ecc28215d97fd363054a10ac7ffe0c1f6e09ed1b8c6b8cff3d
                                                                • Instruction Fuzzy Hash: A501C07590011A9BCB05FBA0CE46BBEB776AF84720F14001DE4156B292CF789E05FBC1
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00FCF927
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00FCF992
                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00FCF9AF
                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00FCF9EE
                                                                • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00FCFA4D
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00FCFA70
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiStringWide
                                                                • String ID:
                                                                • API String ID: 2829165498-0
                                                                • Opcode ID: 87b5ac35414bf8368d15e31776d265c3c4deade3b00b31b1d52f0ecb7f71a960
                                                                • Instruction ID: 555173b7cc179683bdafb2f4a335531027bca97376fdadf93e2d218c12b25011
                                                                • Opcode Fuzzy Hash: 87b5ac35414bf8368d15e31776d265c3c4deade3b00b31b1d52f0ecb7f71a960
                                                                • Instruction Fuzzy Hash: 8A51937290020BBBDF209FA4CD46FABFBAAEB44750F154139F908DA150D7789D18EB50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: x
                                                                • API String ID: 0-2363233923
                                                                • Opcode ID: 68cf42395b3ba1ebabb164f8e5f189d0ff5fd46011e0ca741d553bfd32a913b9
                                                                • Instruction ID: 8dde3399327905d1b2180376ee8a8165464c06b790dee876c44244ac63520cef
                                                                • Opcode Fuzzy Hash: 68cf42395b3ba1ebabb164f8e5f189d0ff5fd46011e0ca741d553bfd32a913b9
                                                                • Instruction Fuzzy Hash: 7402B178E00219EFCB45CFA8C994AADBBF4FF09305F048496E866EB250D774AA51CF51
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,00FD2FA1,00FD16DC,00FD0672), ref: 00FD2FB8
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00FD2FC6
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00FD2FDF
                                                                • SetLastError.KERNEL32(00000000,00FD2FA1,00FD16DC,00FD0672), ref: 00FD3031
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: c2e19c64026df3b4437278d7f79dd2ba2a4fa04ed52376435d06ba5905ccb9e0
                                                                • Instruction ID: 9424af90be2d38d4a593f88776afa9abe37ec62a2fc2520b6226d3e8efefff01
                                                                • Opcode Fuzzy Hash: c2e19c64026df3b4437278d7f79dd2ba2a4fa04ed52376435d06ba5905ccb9e0
                                                                • Instruction Fuzzy Hash: D101287260D3255E96252B747C8972B375BEF617B4728032BF214953F0EE615C00B246
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,80CADD86,?,?,00000000,00FE8AEC,000000FF,?,00FD80A8,?,?,00FD807C,00000000), ref: 00FD8101
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00FD8113
                                                                • FreeLibrary.KERNEL32(00000000,?,00000000,00FE8AEC,000000FF,?,00FD80A8,?,?,00FD807C,00000000), ref: 00FD8135
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: 8bd45f3246a0ef423b2d8acf51bc9deddbaa6a438ce2f25b0bf4f4f4c2b59eb9
                                                                • Instruction ID: a4104f69227d9b52fc204da596eb0b1e1529d49da2ae0e57c16c8f13127f01ae
                                                                • Opcode Fuzzy Hash: 8bd45f3246a0ef423b2d8acf51bc9deddbaa6a438ce2f25b0bf4f4f4c2b59eb9
                                                                • Instruction Fuzzy Hash: 3B01DB71904569FFCB119F55DC45BAFBBB9FB04B50F04052AF911A2390DFB89801EA61
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00F71E40
                                                                • int.LIBCPMTD ref: 00F71E59
                                                                  • Part of subcall function 00F746D0: std::_Lockit::_Lockit.LIBCPMT ref: 00F746E6
                                                                  • Part of subcall function 00F746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F74710
                                                                • Concurrency::cancel_current_task.LIBCPMTD ref: 00F71E99
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00F71F01
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                • String ID:
                                                                • API String ID: 3053331623-0
                                                                • Opcode ID: b11fb7f49d827e0637260fe8df390f2d31b23dea37b1b1e5a53b84d6df7f95f4
                                                                • Instruction ID: ad173e146807c625240128fe1c7c6ef4a229b016a696fa9d96c83d9c6fe4b674
                                                                • Opcode Fuzzy Hash: b11fb7f49d827e0637260fe8df390f2d31b23dea37b1b1e5a53b84d6df7f95f4
                                                                • Instruction Fuzzy Hash: 9F312FB1D00249DFCB04EF98DD92BEEBBB4BF48310F204219E91567391DB346A44DBA1
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00F71F40
                                                                • int.LIBCPMTD ref: 00F71F59
                                                                  • Part of subcall function 00F746D0: std::_Lockit::_Lockit.LIBCPMT ref: 00F746E6
                                                                  • Part of subcall function 00F746D0: std::_Lockit::~_Lockit.LIBCPMT ref: 00F74710
                                                                • Concurrency::cancel_current_task.LIBCPMTD ref: 00F71F99
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00F72001
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                • String ID:
                                                                • API String ID: 3053331623-0
                                                                • Opcode ID: d21cbf9ebfff945f839db2d59506acfb36fded97efa69a6b8388de72a49201b6
                                                                • Instruction ID: 7a2afa87dbdffa6998bd42697940e82024fc93b8debcab76cd0184a8e11cf7cd
                                                                • Opcode Fuzzy Hash: d21cbf9ebfff945f839db2d59506acfb36fded97efa69a6b8388de72a49201b6
                                                                • Instruction Fuzzy Hash: D9313EB1D04209DFCB04EF98DD82BEEBBB4BF48310F208219E51567391DB346A04DBA1
                                                                APIs
                                                                • __EH_prolog3.LIBCMT ref: 00FCCE44
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00FCCE4F
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00FCCEBD
                                                                  • Part of subcall function 00FCCFA0: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00FCCFB8
                                                                • std::locale::_Setgloballocale.LIBCPMT ref: 00FCCE6A
                                                                • _Yarn.LIBCPMT ref: 00FCCE80
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                                • String ID:
                                                                • API String ID: 1088826258-0
                                                                • Opcode ID: e3c83f3f506ed0f918b7de72f3cf370713db79f66e69169b95671b83358ae4f3
                                                                • Instruction ID: 8a1b87dd346211a11108ee6c592ec7f906a114fbd197745e2ea479dc7207aca0
                                                                • Opcode Fuzzy Hash: e3c83f3f506ed0f918b7de72f3cf370713db79f66e69169b95671b83358ae4f3
                                                                • Instruction Fuzzy Hash: 6101BC75A001169BC706EB20DD9AB7D7B66BF88750B18000DE80617381CFBCAE02EBD5
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00FD4023,00000000,?,00FFB824,?,?,?,00FD41C6,00000004,InitializeCriticalSectionEx,00FEB270,InitializeCriticalSectionEx), ref: 00FD407F
                                                                • GetLastError.KERNEL32(?,00FD4023,00000000,?,00FFB824,?,?,?,00FD41C6,00000004,InitializeCriticalSectionEx,00FEB270,InitializeCriticalSectionEx,00000000,?,00FD3F7D), ref: 00FD4089
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00FD40B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID: api-ms-
                                                                • API String ID: 3177248105-2084034818
                                                                • Opcode ID: 6545da1e57a37ce29f0dfdfae6beb69f3ca17d011b042fb0dd02b176dfb657af
                                                                • Instruction ID: 1796efe8038a745630aaab62ea866f6019c1574f4057d97ddd7b814d4733093b
                                                                • Opcode Fuzzy Hash: 6545da1e57a37ce29f0dfdfae6beb69f3ca17d011b042fb0dd02b176dfb657af
                                                                • Instruction Fuzzy Hash: CBE04831A84248BBDF201B71EC4AB993B559B00B51F584021FF0DE85E1D7F2E850B9D9
                                                                APIs
                                                                • GetConsoleOutputCP.KERNEL32(80CADD86,00000000,00000000,00000000), ref: 00FDF4FA
                                                                  • Part of subcall function 00FE1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00FDEF8D,?,00000000,-00000008), ref: 00FE1F1E
                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00FDF74C
                                                                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00FDF792
                                                                • GetLastError.KERNEL32 ref: 00FDF835
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                • String ID:
                                                                • API String ID: 2112829910-0
                                                                • Opcode ID: 848f314f0be58a77b42a7a902c608a12972e2df3fb8fd97a59ad16497e778ba4
                                                                • Instruction ID: a274b49757718a49a869000fae641b28ed8a79ce8f76f4b88fc3b0cb31fdc0a7
                                                                • Opcode Fuzzy Hash: 848f314f0be58a77b42a7a902c608a12972e2df3fb8fd97a59ad16497e778ba4
                                                                • Instruction Fuzzy Hash: 37D16C75D002489FCB15CFA8D880AEDBBF6FF49314F28412AE916EB355D730A946DB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: AdjustPointer
                                                                • String ID:
                                                                • API String ID: 1740715915-0
                                                                • Opcode ID: a4001410b931a1ee39cd5d337a1b92e8d4fce49394c788578e33cf2abb994e93
                                                                • Instruction ID: 9d64ecd3475e228888acd9b5027afc2059ac7e14bdb4f59766831b71c86a2224
                                                                • Opcode Fuzzy Hash: a4001410b931a1ee39cd5d337a1b92e8d4fce49394c788578e33cf2abb994e93
                                                                • Instruction Fuzzy Hash: 8651C172E04207AFDB299F14D841B6AB7A6EF44320F2C452FEA0647391D735EE41E792
                                                                APIs
                                                                  • Part of subcall function 00FE1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00FDEF8D,?,00000000,-00000008), ref: 00FE1F1E
                                                                • GetLastError.KERNEL32 ref: 00FE22DE
                                                                • __dosmaperr.LIBCMT ref: 00FE22E5
                                                                • GetLastError.KERNEL32(?,?,?,?), ref: 00FE231F
                                                                • __dosmaperr.LIBCMT ref: 00FE2326
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                • String ID:
                                                                • API String ID: 1913693674-0
                                                                • Opcode ID: c0ef2d2cb0f4ba41186d66d6adf62a3929518338e31a0f11ab85a67096b5c6b0
                                                                • Instruction ID: 8682999047a33c90d99e51b6a0eb8020d8b40530a95fc7ec3b5bfd16198c46e0
                                                                • Opcode Fuzzy Hash: c0ef2d2cb0f4ba41186d66d6adf62a3929518338e31a0f11ab85a67096b5c6b0
                                                                • Instruction Fuzzy Hash: 4821F831A04245AFDB60AF668C8196A77AEFF04374314891AF92987240E778ED00FB60
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e506d61ae357927e1bbf69c02be365be4dfe55b417e41ece558b2a09b2e56d75
                                                                • Instruction ID: 6bbdf2fa3ea49702006f29b9e198575e9e5d3c3a52cc91034f5f0252637a99b6
                                                                • Opcode Fuzzy Hash: e506d61ae357927e1bbf69c02be365be4dfe55b417e41ece558b2a09b2e56d75
                                                                • Instruction Fuzzy Hash: A221BE72A08305AFCB21BF75AC81A2A7BABAF4036471C451AF8158F350F774EC00A7A1
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 00FE3226
                                                                  • Part of subcall function 00FE1EBD: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,00FDEF8D,?,00000000,-00000008), ref: 00FE1F1E
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FE325E
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00FE327E
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                • String ID:
                                                                • API String ID: 158306478-0
                                                                • Opcode ID: 24c5a06b2825b6fb0d39e1369f247bda6c844486da7ba15811d4419358623673
                                                                • Instruction ID: b3593750faf5be57e8cfbfbfe3e4c381ed6956e81137b11ae6a1a9cc19fb0526
                                                                • Opcode Fuzzy Hash: 24c5a06b2825b6fb0d39e1369f247bda6c844486da7ba15811d4419358623673
                                                                • Instruction Fuzzy Hash: 681108B29051997FAB112BB75CCDCBF399DDE883B43100515F94293100EA68CE017575
                                                                APIs
                                                                • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00FE6B6B,00000000,00000001,0000000C,00000000,?,00FDF889,00000000,00000000,00000000), ref: 00FE7C52
                                                                • GetLastError.KERNEL32(?,00FE6B6B,00000000,00000001,0000000C,00000000,?,00FDF889,00000000,00000000,00000000,00000000,00000000,?,00FDFE2C,?), ref: 00FE7C5E
                                                                  • Part of subcall function 00FE7C24: CloseHandle.KERNEL32(FFFFFFFE,00FE7C6E,?,00FE6B6B,00000000,00000001,0000000C,00000000,?,00FDF889,00000000,00000000,00000000,00000000,00000000), ref: 00FE7C34
                                                                • ___initconout.LIBCMT ref: 00FE7C6E
                                                                  • Part of subcall function 00FE7BE6: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00FE7C15,00FE6B58,00000000,?,00FDF889,00000000,00000000,00000000,00000000), ref: 00FE7BF9
                                                                • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,00FE6B6B,00000000,00000001,0000000C,00000000,?,00FDF889,00000000,00000000,00000000,00000000), ref: 00FE7C83
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                • String ID:
                                                                • API String ID: 2744216297-0
                                                                • Opcode ID: ca9acbd0fea9445556d5e85f0695c2202d7e6a509d541dd8c3192d33142edc6b
                                                                • Instruction ID: ea0b3e30bebbecf382859870be86eb0b6c96cecf90ce3897c094af2e42addc93
                                                                • Opcode Fuzzy Hash: ca9acbd0fea9445556d5e85f0695c2202d7e6a509d541dd8c3192d33142edc6b
                                                                • Instruction Fuzzy Hash: F4F01C36508299BBCF222FEADC089D93F2AEF483B0F154050FA0985120C636D820FBA1
                                                                APIs
                                                                  • Part of subcall function 03823508: EnterCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 03823512
                                                                  • Part of subcall function 03823508: GetProcessHeap.KERNEL32(00000008,00000208,?,?,038251B7), ref: 0382351B
                                                                  • Part of subcall function 03823508: RtlAllocateHeap.NTDLL(00000000,?,?,038251B7), ref: 03823522
                                                                  • Part of subcall function 03823508: LeaveCriticalSection.KERNEL32(038284D4,?,?,038251B7), ref: 0382352B
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,?,00000005,00000000,00000000), ref: 03822E3D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3012331872.0000000003820000.00000040.00001000.00020000.00000000.sdmp, Offset: 03820000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_3820000_91EE.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalHeapSection$AllocateByteCharEnterLeaveMultiProcessWide
                                                                • String ID: x
                                                                • API String ID: 1990697408-2363233923
                                                                • Opcode ID: 67f057a44c5da11a24bdc1dd5af4744b1d84ba2f1302b92edb7c1aaf07637b8f
                                                                • Instruction ID: e4829fd11f102d61561403e9d17ea44c74dc53216f4932d536d76b6646715b91
                                                                • Opcode Fuzzy Hash: 67f057a44c5da11a24bdc1dd5af4744b1d84ba2f1302b92edb7c1aaf07637b8f
                                                                • Instruction Fuzzy Hash: BE02BD74A0426DEFCF51CFA8C984AADBFF0BB09314F148895E855EB250D774AA81CF61
                                                                APIs
                                                                • __startOneArgErrorHandling.LIBCMT ref: 00FDBC8D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: ErrorHandling__start
                                                                • String ID: pow
                                                                • API String ID: 3213639722-2276729525
                                                                • Opcode ID: 64de55c59242456a32c96a6247673cc069dc71dc9d512d96a3c7c029b38585ab
                                                                • Instruction ID: b8811f86bf434543cee7a6aa4efe38162886360481942c8a60c44772993c2efd
                                                                • Opcode Fuzzy Hash: 64de55c59242456a32c96a6247673cc069dc71dc9d512d96a3c7c029b38585ab
                                                                • Instruction Fuzzy Hash: 83517A62D25146D6CB127F14CD4137A3B92EB40B60F2D495BF49A863A8EF358C81FA86
                                                                APIs
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00FD2DEF
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00FD2EA3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 3480331319-1018135373
                                                                • Opcode ID: 61f1c197eef57bcb9823ec50a3a107c8f336da4ee88f3a6dc9cd29e630b3e4fd
                                                                • Instruction ID: de8de5415c61b4b22c485a56326334f6657bb4dc151408e042bbacdfe4b1a0f1
                                                                • Opcode Fuzzy Hash: 61f1c197eef57bcb9823ec50a3a107c8f336da4ee88f3a6dc9cd29e630b3e4fd
                                                                • Instruction Fuzzy Hash: D3419234E002099BCF10DF69CC84A9EBBB6BF55324F188156E9185B392D735EE05EBD2
                                                                APIs
                                                                • EncodePointer.KERNEL32(00000000,?), ref: 00FD36AB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID: MOC$RCC
                                                                • API String ID: 2118026453-2084237596
                                                                • Opcode ID: 56fc540aafc733019f0ad4193df446d5e600ab507044340d500a4f86614d15e0
                                                                • Instruction ID: 97b2aa88e3c7c98468e604bce4ab6d2590816c631c036dc792b4cbe50f2b3273
                                                                • Opcode Fuzzy Hash: 56fc540aafc733019f0ad4193df446d5e600ab507044340d500a4f86614d15e0
                                                                • Instruction Fuzzy Hash: 1C4129B1D00209AFDF15DF98CD81AEEBBB6BF48310F18415AFA0467355D335AA50EB62
                                                                APIs
                                                                • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00FCC9E8
                                                                • task.LIBCPMTD ref: 00FCC9F6
                                                                Strings
                                                                • }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+, xrefs: 00FCC92A
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.3011453041.0000000000F71000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00F70000, based on PE: true
                                                                • Associated: 00000008.00000002.3011432998.0000000000F70000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011496968.0000000000FE9000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011522429.0000000000FFA000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011541998.0000000000FFB000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                • Associated: 00000008.00000002.3011561910.0000000000FFC000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_f70000_91EE.jbxd
                                                                Similarity
                                                                • API ID: Concurrency::task_continuation_context::task_continuation_contexttask
                                                                • String ID: }{cdef~hijkl/nopqrstuvwx|><B-DEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()_+
                                                                • API String ID: 605201214-2946796713
                                                                • Opcode ID: 83ac98ca8cae3f4929e59c01bf28bd0dd771d6c6f4f0144fb9c23ce612bc32cd
                                                                • Instruction ID: 5072b30df784e4fd6b58e68d2271c1e79d05b91ce1a0cfcacc88573d3f6a9024
                                                                • Opcode Fuzzy Hash: 83ac98ca8cae3f4929e59c01bf28bd0dd771d6c6f4f0144fb9c23ce612bc32cd
                                                                • Instruction Fuzzy Hash: F131F971D0411A9BCB04DF98C992BEEBBB1FF44310F10415EE419B7691D7786A01DBA1